Cryptosystem and Protocol for Transmition of Confidential Data without Any Preliminary Distribution of Secret and Public Keys, Based on the Use of a Commutative Encryption Procedure
- Authors: Korzhik V.I.1, Yakovlev V.A.1, Starostin V.S.1
-
Affiliations:
- The Bonch-Bruevich Saint Petersburg State University of Telecommunications
- Issue: Vol 11, No 6 (2025)
- Pages: 101-107
- Section: INFORMATION TECHNOLOGIES AND TELECOMMUNICATION
- URL: https://journals.rcsi.science/1813-324X/article/view/367947
- DOI: https://doi.org/10.31854/1813-324X-2025-11-6-101-107
- EDN: https://elibrary.ru/UPSBCH
- ID: 367947
Cite item
Full Text
Abstract
About the authors
V. I. Korzhik
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: korzhik.vi@sut.ru
ORCID iD: 0000-0002-8347-6527
V. A. Yakovlev
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: yakovlev.va@sut.ru
ORCID iD: 0009-0007-2861-9605
SPIN-code: 5273-8655
V. S. Starostin
The Bonch-Bruevich Saint Petersburg State University of Telecommunications
Email: starostin.vs@sut.ru
ORCID iD: 0009-0000-2939-1971
SPIN-code: 8998-5162
References
- Шнайер Б. Прикладная криптография. М.: Триумф, 2002.
- Коржик В.И., Яковлев В.А., Старостин В.С., Буйневич М.В. Прогресс в теории прикладной криптографии: обзор и некоторые новые результаты. Часть 2. Бесключевая криптография // Труды учебных заведений связи. 2024. Т. 10. № 6. С. 79–98. doi: 10.31854/1813-32X-2024-10-6-79-98. EDN:HPBOWG
- Korzhik V., Starostin V., Yakovlev V., Kabardov M., Krasov A., Adadurov S. Advance in Keyless Cryptography // In: Ramakrishnan S. (ed.) Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. PP. 97–117. doi: 10.5772/intechopen.104429
- Menezes A.J., van Oorschot P.C., Vanstone S.A. Handbook of Applied Cryptography. Boca Raton, 1997. doi: 10.1201/9780429466335
- Коржик В.И., Яковлев В.А. Основы криптографии. СПб.: Издательский центр "Интермедия", 2016. 296 с. EDN:WEQWMN
- Shor P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer // SIAM Journal on Computing. 1997. Vol. 26. Iss. 5. PP. 1484–1509. doi: 10.1137/S0097539795293172
- Korzhik V.I., Starostin V.S., Kabardov M.M., Gerasimovich A.M., Yakovlev V.A., Zhuvikin A.G. Information-theoretically secure key sharing protocol with constant noiseless public channels // Математические вопросы криптографии. 2021. Т. 12. № 3. С. 125–141. DOI:https://doi.org/10.4213/mvk378
- Mincciancio D., Regev O. Lattice-based Cryptography // In: Bernstein D.J., Buchmann J., Dahmen E. (eds) Post-Quantum Cryptography. Berlin, Heidelberg: Springer, 2009. PP. 147–191. doi: 10.1007/978-3-540-88702-7_5
- Myasnikov A., Shpilrain V., Ushakov A. Non-Commutative Cryptography and Complexity of Groupe-Theoretical Problems. American Mathematical Society, 2011. 385 p. EDN:GPBUOR
- Молдовян А.А., Молдовян Д.Н., Молдовян А.Н. Постквантовые двухключевые криптосхемы на конечных алгебрах // Информатика и автоматизация. 2024. Т. 3. № 4. С. 1246–1276. doi: 10.15622/ia.23.4.12. EDN:YZSVQH
- Duong M.T., Moldovyan A.A., Moldovyan D.N., Nguyen M.H., Do B.T. Structure of quaternion-type algebras and post-quantum structure algorithm // International Journal of Electrical and Computer Engineering. 2025. Vol. 15. Iss. 3. PP. 2965–2976. doi: 10.11591/ijece.v15i3.pp2965-2976
Supplementary files

