ICMS 2018 - Session 6: Post-Quantum Group-based Cryptography


Aim and Scope

The National Security Agency (NSA) in August 2015 announced plans for transition to post-quantum algorithms. Currently, Suite B cryptographic algorithms are specified by the National Institute of Standards and Technology (NIST) and are used by NSA’s Information Assurance Directorate in solutions approved for protecting classified and unclassified National Security Systems (NSS). Below, we announce preliminary plans for transitioning to quantum resistant algorithms Shortly thereafter the National Institute of Standardization and Technology announced a call to select standards for post-quantum public-key cryptosystems. The academic and industrial communities have suggested the following as potentially quantum-resistant primitives: lattice-based, multivariate, code-based, hash-based, isogeny-based, and group-based primitives. Group-based primitives are the topic of our special session. We will invite researchers from computational group theory, cryptography, and quantum computation communities to discuss various problems in group-based cryptography, with an emphasis on problems such as the hidden subgroup problem that cut across all these areas.

Accepted Talks

Alexander Wood, Vladimir Shpilrain, Kayvan Najarian, Ali Mostashari and Delaram Kahrobaei: Private-Key Fully Homomorphic Encryption for Private Classification

Giovanni Di Crescenzo, Delaram Kahrobaei, Matluba Khodjaeva and Vladimir Shpilrain: Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-Abelian Groups

Mariya Bessonov, Dima Grigoriev and Vladimir Shpilrain: A framework for unconditionally secure public-key encryption (with possible decryption errors)

Lucas Barthelemy, Delaram Kahrobaei, Guenael Renault and Zoran Sunic: Quadratic time algorithm for inversion of binary permutation polynomials

Kelsey Horan and Delaram Kahrobaei: The Hidden Subgroup Problem and Post-quantum Group-based Cryptography

Bianca Sosnovski: Recents Developments in Cayley Hash Functions

Jonathan Gryak, Robert Haralick and Delaram Kahrobaei: Cryptanalysis of Group-Theoretic Cryptosystems via Machine Learning

© 2022. All rights reserved.