On the flag geometry of simple group of Lie type and multivariate cryptography

We propose some multivariate cryptosystems based on finite BN-pair G defined over the fields Fq. We convert the adjacency graph for maximal flags of the geometry of group G into a finite Tits automaton by special colouring of arrows and treat the largest Schubert cell Sch isomorphic to vector space...

Full description

Saved in:
Bibliographic Details
Date:2015
Main Author: Ustimenko, V.
Format: Article
Language:English
Published: Інститут прикладної математики і механіки НАН України 2015
Series:Algebra and Discrete Mathematics
Online Access:http://dspace.nbuv.gov.ua/handle/123456789/152794
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Digital Library of Periodicals of National Academy of Sciences of Ukraine
Cite this:On the flag geometry of simple group of Lie type and multivariate cryptography / V. Ustimenko // Algebra and Discrete Mathematics. — 2015. — Vol. 19, № 1. — С. 130-144. — Бібліогр.: 18 назв. — англ.

Institution

Digital Library of Periodicals of National Academy of Sciences of Ukraine
Description
Summary:We propose some multivariate cryptosystems based on finite BN-pair G defined over the fields Fq. We convert the adjacency graph for maximal flags of the geometry of group G into a finite Tits automaton by special colouring of arrows and treat the largest Schubert cell Sch isomorphic to vector space over Fq on this variety as a totality of possible initial states and a totality of accepting states at a time. The computation (encryption map) corresponds to some walk in the graph with the starting and ending points in Sch. To make algorithms fast we will use the embedding of geometry for G into Borel subalgebra of corresponding Lie algebra. We also consider the notion of symbolic Tits automata. The symbolic initial state is a string of variables tα∈Fq, where roots α are listed according Bruhat's order, choice of label will be governed by special multivariate expressions in variables tα, where α is a simple root. Deformations of such nonlinear map by two special elements of affine group acting on the plainspace can produce a computable in polynomial time nonlinear transformation. The information on adjacency graph, list of multivariate governing functions will define invertible decomposition of encryption multivariate function. It forms a private key which allows the owner of a public key to decrypt a ciphertext formed by a public user. We also estimate a polynomial time needed for the generation of a public rule.