Standard

Encryption system using the explicit reciprocity law. / Vostokov, Sergey V.; Vostokova, Regina P.

2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 175-176 7779357.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Harvard

Vostokov, SV & Vostokova, RP 2016, Encryption system using the explicit reciprocity law. in 2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016., 7779357, Institute of Electrical and Electronics Engineers Inc., pp. 175-176, 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016, Saint-Petersburg, Russian Federation, 26/09/16. https://doi.org/10.1109/RED.2016.7779357

APA

Vostokov, S. V., & Vostokova, R. P. (2016). Encryption system using the explicit reciprocity law. In 2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016 (pp. 175-176). [7779357] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/RED.2016.7779357

Vancouver

Vostokov SV, Vostokova RP. Encryption system using the explicit reciprocity law. In 2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 175-176. 7779357 https://doi.org/10.1109/RED.2016.7779357

Author

Vostokov, Sergey V. ; Vostokova, Regina P. / Encryption system using the explicit reciprocity law. 2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 175-176

BibTeX

@inproceedings{0a490f41a6cd4fc78cc433be1b2cfce9,
title = "Encryption system using the explicit reciprocity law",
abstract = "In the present paper, we suggest a new method of creating ID-based cryptosystems, which is based on the use the explicit pairing obtained in the papers [1,2]. The classical reciprocity law goes back to Pierre Fermat and is an explicit formula for the product of the power residues in a filed of algebraic numbers. In 1990, on the first congress of mathematics, Hilbert stated the 9th problem and suggested a plan of solving it. His idea was to reduce the problem to finding an explicit formula for the norm residue symbol. This problem was solved completely in 1978 (see [1]). In the present paper, we use the explicit Hilbert pairing for a protocol of authentication without disclosure (see Sec.3).",
author = "Vostokov, {Sergey V.} and Vostokova, {Regina P.}",
year = "2016",
month = dec,
day = "9",
doi = "10.1109/RED.2016.7779357",
language = "English",
pages = "175--176",
booktitle = "2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",
note = "15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016 ; Conference date: 26-09-2016 Through 29-09-2016",

}

RIS

TY - GEN

T1 - Encryption system using the explicit reciprocity law

AU - Vostokov, Sergey V.

AU - Vostokova, Regina P.

PY - 2016/12/9

Y1 - 2016/12/9

N2 - In the present paper, we suggest a new method of creating ID-based cryptosystems, which is based on the use the explicit pairing obtained in the papers [1,2]. The classical reciprocity law goes back to Pierre Fermat and is an explicit formula for the product of the power residues in a filed of algebraic numbers. In 1990, on the first congress of mathematics, Hilbert stated the 9th problem and suggested a plan of solving it. His idea was to reduce the problem to finding an explicit formula for the norm residue symbol. This problem was solved completely in 1978 (see [1]). In the present paper, we use the explicit Hilbert pairing for a protocol of authentication without disclosure (see Sec.3).

AB - In the present paper, we suggest a new method of creating ID-based cryptosystems, which is based on the use the explicit pairing obtained in the papers [1,2]. The classical reciprocity law goes back to Pierre Fermat and is an explicit formula for the product of the power residues in a filed of algebraic numbers. In 1990, on the first congress of mathematics, Hilbert stated the 9th problem and suggested a plan of solving it. His idea was to reduce the problem to finding an explicit formula for the norm residue symbol. This problem was solved completely in 1978 (see [1]). In the present paper, we use the explicit Hilbert pairing for a protocol of authentication without disclosure (see Sec.3).

UR - http://www.scopus.com/inward/record.url?scp=85013843492&partnerID=8YFLogxK

U2 - 10.1109/RED.2016.7779357

DO - 10.1109/RED.2016.7779357

M3 - Conference contribution

AN - SCOPUS:85013843492

SP - 175

EP - 176

BT - 2016 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 15th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2016

Y2 - 26 September 2016 through 29 September 2016

ER -

ID: 38481463