SLIDE 27 A GENERIC ALGEBRAIC MODEL
FOR THE ANALYSIS OF
CRYPTOGRAPHIC- KEY ASSIGNMENT SCHEMES Speaker: Ridha Khedri Intro. Motivation and Contribution The main idea Mathematical Background Key Structure Key Assignment Schemes Specifying the Akl-Taylor technique Specifying the Chinese Remainder A GENERIC ALGEBRAIC MODEL FOR THE ANALYSIS OF CRYPTOGRAPHIC-KEY ASSIGNMENT SCHEMES
Specifying the Akl-Taylor technique
The key κ2ˆ3 is derived from κ2.
κ2ˆ3 ăd κ2 ð ñ x A key is determined by its exponent & k1 is derived from k2 iff k1 Ď k2, and log ki
log κ “ ti y
repp2 ˆ 3q Ď repp2q ð ñ x Definition of the function rep, and Defini- tion of Ď y Dpc | c P PpI Npq : tt2, 3uu ď tt2uu ˚
k c q
ð ñ x Definition of x ď y for x and y elements of an idempotent commutative semiring y Dpc | c P PpI Npq : tt2, 3uu `
k tt2uu ˚ k c “ tt2uu ˚ k c q
ð ñ x Definition of `
k on the structure F
F y Dpc | c P PpI Npq : tt2, 3uu Y tt2uu ˚
k c “ tt2uu ˚ k c q
ð ù x c “ tt3uu P PpI Npq, and the definition of ˚
k
F y Dpc | c P PpI Npq : tt2, 3uu Y tt2, 3uu “ tt2, 3uu q ð ñ x Idempotence of Y, c P PpI Npq, and Dpc |: true q ” true y true
The above scheme is cluster-secure: pci ă cj ù ñ papciq Ď apcjqqq
Speaker: Ridha Khedri A GENERIC ALGEBRAIC MODEL FOR THE ANALYSIS OF CRYPTO