Enviar pesquisa
Carregar
50120130406002
•
0 gostou
•
314 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 7
Baixar agora
Baixar para ler offline
Recomendados
D028036046
D028036046
inventionjournals
RESEARCH ON WIND ENERGY INVESTMENT DECISION MAKING: A CASE STUDY IN JILIN
RESEARCH ON WIND ENERGY INVESTMENT DECISION MAKING: A CASE STUDY IN JILIN
Wireilla
Some results on fuzzy soft multi sets
Some results on fuzzy soft multi sets
IJCI JOURNAL
Indefinite Integral 3
Indefinite Integral 3
Lakshmikanta Satapathy
Fixed point and common fixed point theorems in complete metric spaces
Fixed point and common fixed point theorems in complete metric spaces
Alexander Decker
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
ijcax
Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...
International Journal of Science and Research (IJSR)
Neutrosophic Soft Topological Spaces on New Operations
Neutrosophic Soft Topological Spaces on New Operations
IJSRED
Recomendados
D028036046
D028036046
inventionjournals
RESEARCH ON WIND ENERGY INVESTMENT DECISION MAKING: A CASE STUDY IN JILIN
RESEARCH ON WIND ENERGY INVESTMENT DECISION MAKING: A CASE STUDY IN JILIN
Wireilla
Some results on fuzzy soft multi sets
Some results on fuzzy soft multi sets
IJCI JOURNAL
Indefinite Integral 3
Indefinite Integral 3
Lakshmikanta Satapathy
Fixed point and common fixed point theorems in complete metric spaces
Fixed point and common fixed point theorems in complete metric spaces
Alexander Decker
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
ijcax
Cryptographic system in polynomial residue classes for channels with noise an...
Cryptographic system in polynomial residue classes for channels with noise an...
International Journal of Science and Research (IJSR)
Neutrosophic Soft Topological Spaces on New Operations
Neutrosophic Soft Topological Spaces on New Operations
IJSRED
CS253: Binary Search Trees (2019)
CS253: Binary Search Trees (2019)
Jinho Choi
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
Nurfadhlina Mohd Sharef
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
IJERA Editor
Ijsom19041398886200
Ijsom19041398886200
IJSOM
Basketball Simulation
Basketball Simulation
Zach Blindauer
Gj3611551159
Gj3611551159
IJERA Editor
F0421035039
F0421035039
ijceronline
[ RAYNO ] Phantom Trifold
[ RAYNO ] Phantom Trifold
Olando McCall
حين تصبح السعادة صناعة
حين تصبح السعادة صناعة
dremadhussein
Extra Shots
Extra Shots
holbeau
Gabriel e erik
Gabriel e erik
rafaella1997
20320140503020 2-3
20320140503020 2-3
IAEME Publication
50120140503012
50120140503012
IAEME Publication
20320140503014 2-3
20320140503014 2-3
IAEME Publication
20320140503012
20320140503012
IAEME Publication
20320140501005 2-3
20320140501005 2-3
IAEME Publication
50120130404055
50120130404055
IAEME Publication
20120140504017
20120140504017
IAEME Publication
50120140502003
50120140502003
IAEME Publication
40220140501006
40220140501006
IAEME Publication
30120140503009
30120140503009
IAEME Publication
40220130405011
40220130405011
IAEME Publication
Mais conteúdo relacionado
Mais procurados
CS253: Binary Search Trees (2019)
CS253: Binary Search Trees (2019)
Jinho Choi
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
Nurfadhlina Mohd Sharef
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
IJERA Editor
Ijsom19041398886200
Ijsom19041398886200
IJSOM
Basketball Simulation
Basketball Simulation
Zach Blindauer
Gj3611551159
Gj3611551159
IJERA Editor
F0421035039
F0421035039
ijceronline
Mais procurados
(7)
CS253: Binary Search Trees (2019)
CS253: Binary Search Trees (2019)
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
ORDER INDEPENDENTINCREMENTAL EVOLVING FUZZY GRAMMAR FRAGMENT LEARNER
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
Some common Fixed Point Theorems for compatible - contractions in G-metric ...
Ijsom19041398886200
Ijsom19041398886200
Basketball Simulation
Basketball Simulation
Gj3611551159
Gj3611551159
F0421035039
F0421035039
Destaque
[ RAYNO ] Phantom Trifold
[ RAYNO ] Phantom Trifold
Olando McCall
حين تصبح السعادة صناعة
حين تصبح السعادة صناعة
dremadhussein
Extra Shots
Extra Shots
holbeau
Gabriel e erik
Gabriel e erik
rafaella1997
20320140503020 2-3
20320140503020 2-3
IAEME Publication
50120140503012
50120140503012
IAEME Publication
20320140503014 2-3
20320140503014 2-3
IAEME Publication
20320140503012
20320140503012
IAEME Publication
20320140501005 2-3
20320140501005 2-3
IAEME Publication
50120130404055
50120130404055
IAEME Publication
20120140504017
20120140504017
IAEME Publication
50120140502003
50120140502003
IAEME Publication
40220140501006
40220140501006
IAEME Publication
30120140503009
30120140503009
IAEME Publication
40220130405011
40220130405011
IAEME Publication
30120140501005
30120140501005
IAEME Publication
Movimentostrabalhistasedoutrinassociaisdosculoxix 120827155114-phpapp01
Movimentostrabalhistasedoutrinassociaisdosculoxix 120827155114-phpapp01
Ajudar Pessoas
Funções integradas no sql
Funções integradas no sql
Gelivaldo Filho
Bullyng2
Bullyng2
anfrejo
Gustavo adolfo bécquer
Gustavo adolfo bécquer
Claudia Méndez Falconí
Destaque
(20)
[ RAYNO ] Phantom Trifold
[ RAYNO ] Phantom Trifold
حين تصبح السعادة صناعة
حين تصبح السعادة صناعة
Extra Shots
Extra Shots
Gabriel e erik
Gabriel e erik
20320140503020 2-3
20320140503020 2-3
50120140503012
50120140503012
20320140503014 2-3
20320140503014 2-3
20320140503012
20320140503012
20320140501005 2-3
20320140501005 2-3
50120130404055
50120130404055
20120140504017
20120140504017
50120140502003
50120140502003
40220140501006
40220140501006
30120140503009
30120140503009
40220130405011
40220130405011
30120140501005
30120140501005
Movimentostrabalhistasedoutrinassociaisdosculoxix 120827155114-phpapp01
Movimentostrabalhistasedoutrinassociaisdosculoxix 120827155114-phpapp01
Funções integradas no sql
Funções integradas no sql
Bullyng2
Bullyng2
Gustavo adolfo bécquer
Gustavo adolfo bécquer
Semelhante a 50120130406002
DOUBT INTUITIONISTIC FUZZY IDEALS IN BCK/BCI-ALGEBRAS
DOUBT INTUITIONISTIC FUZZY IDEALS IN BCK/BCI-ALGEBRAS
Wireilla
Doubt intuitionistic fuzzy deals in bckbci algebras
Doubt intuitionistic fuzzy deals in bckbci algebras
ijfls
Integration of sequential scenarios
Integration of sequential scenarios
Mohammed Assiri
A NEW OPERATION ON HEXAGONAL FUZZY NUMBER
A NEW OPERATION ON HEXAGONAL FUZZY NUMBER
ijfls
On intuitionistic fuzzy transportation problem using hexagonal intuitionistic...
On intuitionistic fuzzy transportation problem using hexagonal intuitionistic...
ijfls
Regularisation & Auxiliary Information in OOD Detection
Regularisation & Auxiliary Information in OOD Detection
kirk68
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
ijcax
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
ijcax
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
ijcax
On a certain family of meromorphic p valent functions
On a certain family of meromorphic p valent functions
Alexander Decker
Emerging Approach to Computing Techniques.pptx
Emerging Approach to Computing Techniques.pptx
PoonamKumarSharma
What Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial Intelligence
Jonathan Mugan
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
IJRES Journal
On Series of Fuzzy Numbers
On Series of Fuzzy Numbers
IOSR Journals
Algorithmic approach for solving intuitionistic fuzzy transportation problem
Algorithmic approach for solving intuitionistic fuzzy transportation problem
Navodaya Institute of Technology
A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem
A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem
Navodaya Institute of Technology
Ev4301897903
Ev4301897903
IJERA Editor
Review of generative adversarial nets
Review of generative adversarial nets
SungminYou
OPTIMAL PREDICTION OF THE EXPECTED VALUE OF ASSETS UNDER FRACTAL SCALING EXPO...
OPTIMAL PREDICTION OF THE EXPECTED VALUE OF ASSETS UNDER FRACTAL SCALING EXPO...
mathsjournal
New algorithm for solving mixed intuitionistic fuzzy assignment problem
New algorithm for solving mixed intuitionistic fuzzy assignment problem
Navodaya Institute of Technology
Semelhante a 50120130406002
(20)
DOUBT INTUITIONISTIC FUZZY IDEALS IN BCK/BCI-ALGEBRAS
DOUBT INTUITIONISTIC FUZZY IDEALS IN BCK/BCI-ALGEBRAS
Doubt intuitionistic fuzzy deals in bckbci algebras
Doubt intuitionistic fuzzy deals in bckbci algebras
Integration of sequential scenarios
Integration of sequential scenarios
A NEW OPERATION ON HEXAGONAL FUZZY NUMBER
A NEW OPERATION ON HEXAGONAL FUZZY NUMBER
On intuitionistic fuzzy transportation problem using hexagonal intuitionistic...
On intuitionistic fuzzy transportation problem using hexagonal intuitionistic...
Regularisation & Auxiliary Information in OOD Detection
Regularisation & Auxiliary Information in OOD Detection
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
On a certain family of meromorphic p valent functions
On a certain family of meromorphic p valent functions
Emerging Approach to Computing Techniques.pptx
Emerging Approach to Computing Techniques.pptx
What Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial Intelligence
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
Sequence Entropy and the Complexity Sequence Entropy For 𝒁𝒏Action
On Series of Fuzzy Numbers
On Series of Fuzzy Numbers
Algorithmic approach for solving intuitionistic fuzzy transportation problem
Algorithmic approach for solving intuitionistic fuzzy transportation problem
A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem
A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem
Ev4301897903
Ev4301897903
Review of generative adversarial nets
Review of generative adversarial nets
OPTIMAL PREDICTION OF THE EXPECTED VALUE OF ASSETS UNDER FRACTAL SCALING EXPO...
OPTIMAL PREDICTION OF THE EXPECTED VALUE OF ASSETS UNDER FRACTAL SCALING EXPO...
New algorithm for solving mixed intuitionistic fuzzy assignment problem
New algorithm for solving mixed intuitionistic fuzzy assignment problem
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
apidays
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Último
(20)
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
50120130406002
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 09-15 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME MULTIPARTY KEY AGREEMENT PROTOCOL USING TRIPLE DECOMPOSITION PROBLEM IN DISCRETE HEISENBERG GROUP T.ISAIYARASI Research Scholar, Bharathiar University &Assistant Professor Department of Mathematics, Valliammai Engineering College Tamil Nadu -603203, India Dr.K.SANKARASUBRAMANIAN Research Supervisor, Bharathiar University & Professor, Department of Mathematics,Sri Sairam Engineering College. Tamilnadu-600048, India ABSTRACT A Key Agreement Protocol (KAP) or mechanism is a key establishment technique in which a shared key is derived by two (or more) parties as a function of information contributed by, or associated with each of these such that no party can predetermine resulting value. This paper presents a New Multiparty Key Agreement Protocol using the Triple Decomposition Search Problem .To implement this; the Discrete Heisenberg group is chosen as the platform group. The protocol depends on the hardness of Triple Decomposition Search problem in the Discrete Heisenberg group. Keyword: Discrete Heisenberg group, Key Agreement Protocol, Triple Decomposition Search problem. 1. INTRODUCTION A protocol is a multiparty algorithm, defined by a sequence of steps precisely specifying the actions required of two or more parties in order to achieve a specified objective. Key establishment is a process or protocol whereby a shared secret becomes available to two or more parties, for subsequent cryptographic use. Key establishment may be broadly subdivided into key transport and key agreement. 9
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME A key transport protocol or mechanism is a key establishment technique where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s). A key agreement protocol or mechanism is a key establishment technique in which a shared secret is derived by two (or more) parties as a function of information contributed by ,or associated with ,each of these (ideally) such that no party can predetermine the resuming value. This paper proposes a New Multiparty Key Agreement Protocol using Triple Decomposition Search problem. In order to implement the Triple Decomposition Search Problem, the Discrete Heisenberg group is chosen as the platform group. K parties agree on a common key in K- 1 rounds. The paper is organised in the following manner. In section 2 introduces the discrete Heisenberg group. Section 3 deals with the Triple Decomposition Problem. The Multiparty Key Agreement Protocol using Triple Decomposition Problem is implemented in Section 4 . Section 5 discusses the security of the protocol some of the encryption schemes are presented in Section 6 and Section 7 concludes the paper. 2. INTRODUCTION TO DISCRETE HEISENBERG GROUP The Discrete Heisenberg group ℋ may be described as the set endowed with the following multiplication, where p is a prime ሺݖ ,ݕ ,ݔሻ ሺݓ ,ݒ ,ݑሻ ൌ ሺ ݔ ݑ ݕ ,ݓݕ ݖ ,ݒ ݓሻ ݉ ݀ 3 Z p of all integer triples 2.1. Some Computational Facts about ℋ. The following computational facts about ℋ can be easily derived from the definition of Multiplication above. 2.1.1. Proposition. Let ݊ ,ݓ ,ݒ ,ݑ ,ݖ ,ݕ ,ݔbe any integers. Then the multiplication in ℋ satisfies the following equations: (a) ሺݖ ,ݕ ,ݔሻିଵ ൌ ሺെ ݔ ,ݖݕെ ,ݕെݖሻ ݉ ݀ ሺb) ሺݖ ,ݕ ,ݔሻ ሺݓ ,ݒ ,ݑሻ ሺݖ ,ݕ ,ݔሻିଵ ൌ ሺ ݑ ݓݕെ ݓ ,ݒ ,ݒݖሻ ݉݀ (c) ሾሺݖ ,ݕ ,ݔሻ, ሺݓ ,ݒ ,ݑሻሿ ൌ ሺ ݓݕെ 0 ,0 ,ݒݖሻ ݉ ݀ (d) In particular, ሾሺ0, 1, 0ሻ, ሺ0, 0, 1ሻሿ ൌ ሺ1, 0, 0ሻ. (e) (i)ሺ0 ,0 ,ݔሻ ሺ0, ݖ ,ݕሻ ൌ ሺ ݖ ,ݕ ,ݔሻ݉ ݀ (ii)ሺ0, 0 ,ݕሻ ሺ0, 0, ݖሻ ൌ ሺݖ ,ݕ ,ݖݕሻ ݉ ݀ (iii)ሺ0, 0, ݖሻ ሺ0, 0 ,ݕሻ ൌ ሺ0, ݖ ,ݕሻ ݉ ݀ (f) (i)(1, 0, 0)n = (n, 0, 0) mod p (ii)ሺ0, 1, 0ሻ ൌ ሺ0, ݊, 0ሻ ݉ ݀ (iii)ሺ0, 0, 1ሻ ൌ ሺ0, 0, ݊ሻ ݉݀ 2.1.2. Centre Z [ℋ]: ℋ ଷ Centre of ℋ coincides with ܼ ൈ 0 ൈ 0 where ℋ ൌ ܼ , [H, H] = Z [H]. 2.1.3. Generators of ℋ: Formulae (d)-(f) show that (0, 1, 0) and (0, 0, 1) generate ℋ. Specifically, ሺݖ ,ݕ ,ݔሻ ൌ ሾሺ0, 1, 0ሻ, ሺ0, 0, 1ሻሿ௫ ሺ0, 0, 1ሻ ௭ ሺ0, 1, 0ሻ௬ , ݂ ݈݈ܽ ݎሺݖ ,ݕ ,ݔሻ ݅݊ ℋ. for the next result, we use the ሺିଵሻ non-standard notation ݊ሺଶሻ to stand for ଶ , for any integer‘݊’. 10
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 2.2. Proposition. For any ሺݖ ,ݕ ,ݔሻ ߳ ℋ and any݊ ߳ ܼ, we have ሺݖ ,ݕ ,ݔሻ ൌ ൫݊ ݔ ݊ሺଶሻ ݖ݊ ,ݕ݊ ,ݖݕ൯݉. ݀ 2.3. Proposition. ℋ may be presented as ൏ ߙ, ߚ: ሾߙ, ሾߙ, ߚሿሿ ൌ 1 ൌ ሾߚ, ሾߙ, ߚሿሿ ,with ߙ (resp., ߚ) corresponding to the generator ሺ0, 1, 0ሻ (resp.,ሺ0, 0, 1ሻ). The following results have been already established: 2.3.1. Result 1: Let L be any group, and let ߪ and ߬ be any elements of L satisfying the two relations given above. Then, there is a unique homomorphism ݄ ℋ ՜ ܮ such that ݄ሺ0, 1, 0ሻ ൌ ߪ ܽ݊݀ ݄ሺ0, 0, 1ሻ ൌ ߬ 2.3.2. Result 2: Let σ and τ be any elements of ℋ. There exists a unique endomorphism h of ℋ such that ݄ሺ0, 1, 0ሻ ൌ ߪ ܽ݊݀ ݄ሺ0, 0, 1ሻ ൌ ߬ . 3. THE TRIPLE DECOMPOSITION PROBLEM In order to describe the system in a more general setting we assume the underlying structure is a non-commutative group. 3.1. Definition: A non – commutative group G is an algebraic structure with a binary operation and whose elements satisfy the following axioms. (i)For ܽ, ܾ in ܾ .ܽ , ܩis in ( ܩClosure property) (ii)For ܽ , ܾ , ܿ in .ܽ ܩሺܾ. ܿሻ ൌ ሺܽ. ܾሻ. ܿ (Associative property) (iii)There exists an element ݁ in ܩsuch that for all ܽ in, ܽ . ݁ ൌ ݁ . ܽ ൌ ܽ (iv) For all ܽ in ܩthere exists an element ܽିଵ in G such that ܽ . ܽିଵ ൌ ܽିଵ . ܽ ൌ ݁ (v) In general ܽ. ܾ ് ܾ . ܽ (non –commutativity) 3.2. Definition: For an element g є G let ܥሺ݃ሻ ൌ ሼ ݄ є ݄݃ / ܩൌ ݄݃ ሽ. ܥሺ݃ሻ is called the centralizer of g in G. For a subset ܪൌ ሼ ݃ଵ , ݃ଶ , ݃ଷ … … ݃ ሽof G, define ܥሺ ܪሻ ൌ ܥሺ݃ଵ , ݃ଶ … ݃ ሻ to be the set of elements in G that commute with all ݃ for ݅ ൌ 1 ,2 , … . ݇ (Hence ܥሺܪሻ ൌ ܥሺ݃ଵ ሻ ת ܥሺ݃ଶ ሻ ܥ ת … תሺ݃ ሻ ሻ 3.3. The Protocol: The protocol goes as follows: Alice picks two elementsݔଵ , ݔଶ ∈ , ܩchooses sets ܵ௫ଵ ܽ݊݀ ܵ௫ଶ which are subsets of centralizers of ݔଵ ܽ݊݀ ݔଶ respectively. Alice publishes ܵ௫ଵ ܽ݊݀ ܵ௫ଶ Bob picks two elements ݕଵ , ݕଶ ∈ , ܩchooses sets ܵ௬ଵ ܽ݊݀ ܵ௬ଶ which are subsets of centralizers of ݕଵ ܽ݊݀ ݕଶ respectively. Bob publishes ܵ௬ଵ ܽ݊݀ ܵ௬ଶ Alice chooses random elements ܽଵ ∈ ܽ ,ܩଶ ∈ ܵ௬ଵ , ܽ ଷ ∈ ܵ௬ଶ . ሺ ܽଵ , ܽଶ , ܽ ଷ ሻ is her private key. She sends Bob her public key ሺ ݓ , ݒ , ݑሻ where ݑൌ ܽଵ ݔଵ , ݒൌ ݔଵ ିଵ ܽ ଶ ݔଶ , ݓൌ ݔଶ ିଵ ܽଷ Bob chooses random elements ܾଵ ∈ ܵ௫ଵ , ܾଶ ∈ ܵ௫ଶ ܽ݊݀ ܾଷ ∈ ܩand sets ሺܾଵ , ܾଶ , ܾଷ ሻ as his private key ିଵ He sends Alice his public key ሺ ݎ , ݍ , ሻ where ൌ ܾଵ ݕଵ , ݍൌ ݕଵ ܾଶ ݕଶ , ݎൌ ݕଶ ିଵ ܾଷ Alice computes ܽଵ ܽ ଶ ܽ ݍଷ ݎൌ ܽଵ ܾଵ ܽଶ ܾଶ ܽଷ ܾଷ ൌ ܭ 11
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME Bob computes 3ܾ ݓ 2ܾ ݒ 1ܾ ݑൌ ܽ1 ܾ1 ܽ2 ܾ2 ܽ 3 ܾ3 ൌ ܭ ܭ ൌ ܭ ൌ ܭis their shared secret key The security of the system depends on solving the equations ݑൌ ܽଵ ݔଵ … … … ሺ1ሻ ିଵ ݒൌ ݔଵ ܽଶ ݔଶ … … … ሺ2ሻ ିଵ ݓൌ ݔଶ ܽଷ … … … ሺ3ሻ to get the private key of Alice. Solving equation (2), i.e., decomposing ݒas three elements ି ݔଵ , ܽଶ ܽ݊݀ ݔଶ is known as the triple decomposition problem. In order to apply the triple decomposition, the platform group must satisfy the following properties: P1) The group should be a non commutative group of exponential growth. P2) It should be computationally easy to perform group operations (multiplication and inversion) P3) It should be computationally easy to generate pairs ሺ ܽ , ሼ ܽଵ , … ܽ ሽሻܽ ܽ ݐ݄ܽݐ ݄ܿݑݏ ൌ ܽ ܽ ݂ ݅ ݎൌ 1 … ݇ P4) For a generic set ሼ ݃ଵ … . . ݃ ሽ of elements of the group it should be difficult to compute ܥሺ݃ଵ … . . ݃ ሻ ൌ ܥሺ݃ଵ ሻ ܥ תሺ݃ଶ ሻ ܥ ת … … תሺ݃ ሻ ଵ ଵ P5) Even if ܪଵ ൌ ܥሺ݃ଵ … . . ݃ ሻ and 2ܪൌ ܥሺ ݃ଵ . . . . ݃ ሻ are computed it should be hard to find ݔЄ ܪଵ and ݕЄ ܪଶ and ܽ Є ܪwhere H is some fixed subgroup given by its generating set such that ݕ ܽ ݔൌ ݒfor any ݒЄ ℋ . 4. Implementation of Triple Decomposition Problem in Discrete Heisenberg Group: K parties ܣଵ , ܣଶ … ܣ agree on the following: ܑሻA finite non abelian group (Discrete Heisenberg group ℋ =Zp3) where p is a prime number sufficiently large ܑܑሻ Cyclic subgroupsܩଵ , ܩଶ ܩଷ , of ℋ such thatܩଵ ൌ ൏ ݁ , ݃ଵ , ݃ଶ , ܩଶ ൌ ൏ ݁, ݄ଵ , ݄ଶ andܩଷ ൌ ൏ ݁, ݇ଵ , ݇ଶ . iii)݃ ݄ ് ݄ ݃ , ݅ ൌ 1 ,2 ܽ݊݀ ݆ ൌ 1 ,2 . , ݃ ݇ ് ݇ ݃ , ݅ ൌ 1 ,2 ܽ݊݀ ݆ ൌ 1 ,2 , ݄ ݇ ് ݇ ݄ , ݅ ൌ 1 ,2 ܽ݊݀ ݆ ൌ 1 ,2 The following actions are carried out to arrive at a common shared key: I Round: ܣଵ chooses ܽଵ ܩ אଵ , ܾଵ , ݔଵ ܩ אଶ ܽ݊݀ ܿଵ , ݕଵ ܩ אଷ and computes ିଵ ିଵ ݑଵଵ ൌ ܽଵ ݔଵ , ݒଵଵ ൌ ݔଵ ܾଵ ݕଵ , ݓଵଵ ൌ ݕଵ ܿଵ ܣଶ chooses ܽଶ ܩ אଵ , ܾଶ , ݔଶ ܩ אଶ ܽ݊݀ ܿଶ, ݕଵ ܩ אଷ and computes ିଵ ିଵ ݑଶଵ ൌ ܽଶ ݔଶ , ݒଶଵ ൌ ݔଶ ܾଶ ݕଶ , ݓଶଵ ൌ ݕଶ ܿଶ ܣଷ chooses ܽଷ ܩ אଵ , ܾଷ, ݔଷ ܩ אଶ , ܿଷ , ݕଷ ܩ אଷ and computes ିଵ ିଵ ݑଷଵ ൌ ܽଷ ݔଷ , ݒଷଵ ൌ ݔଷ ܾଷ ݕଷ , ݓଷଵ ൌ ݕଷ ܿଷ … ܣିଵ chooses ܽିଵ ܩ אଵ , ܾିଵ , ݔିଵ ܩ אଶ , ܿିଵ , ݕିଵ ܩ אଷ and computes ିଵ ିଵ ݑሺିଵሻଵ ൌ ܽିଵ ݔିଵ , ݒሺିଵሻଵ ൌ ݔିଵ ܾିଵ ݕିଵ , ݓሺିଵሻଵ ൌ ݕିଵ ܿିଵ ିଵ ܣ chooses ܽ ܩ אଵ , ܾ , ݔ ܩ אଶ , ܿ , ݕ ܩ אଷ and computes ݑଵ ൌ ܽ ݔ , ݒଵ ൌ ݔ ܾ ݕ , ݓଵ ൌ ିଵ ݕ ܿ ܣଵ sends (ݑଵଵ , ݒଵଵ , ݓଵଵ ሻ to ܣଶ 12
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME ܣଶ sends (ݑଶଵ , ݒଶଵ , ݓଶଵ ) to ܣଷ ܣଷ sends (ݑଷଵ , ݒଷଵ , ݓଷଵ ) to A4 … ܣିଵ sends (ݑሺିଵሻଵ , ݒሺିଵሻଵ , ݓሺିଵሻଵ ) to ܣ ܣ sends (ݑଵ , ݒଵ , ݓଵ ) to ܣଵ II Round: ܣଵ computes ݑଵଶ ൌ ܽଵ ݑଵ , ݒଵଶ ൌ ܾଵ ݒଵ , ݓଵଶ ൌ ܿଵ ݓଵ and sends (ݑଵଶ , ݒଵଶ , ݓଵଶ ) to ܣଶ ܣଶ computes ݑଶଶ ൌ ܽଶ ݑଵଵ , ݒଶଶ ൌ ܾଶ ݒଵଵ , ݓଶଶ ൌ ܿଶ ݓଵଵ and ሺݑଶଶ , ݒଶଶ , ݓଶଶ ) to ܣଷ ܣଷ computes ݑଷଶ ൌ ܽଷ ݑଶଵ , ݒଷଶ ൌ ܾଷ ݒଶଵ , ݓଷଶ ൌ ܿଷ ݓଶଵ and sends ሺݑଷଶ , ݒଷଶ , ݓଷଶ ) to ܣସ … ܣ computes ݑଶ ൌ ܽ ݑሺିଵሻଵ , ݒଶ ൌ ܾ ݒሺିଵሻଵ , ݓଶ ൌ ܿ ݓሺିଵሻଶ and sends (ݑଶ , ݒଶ , ݓଶ ) to ݒଷଶ (K-1)st Round: ܣଵ computes ܭଵ ൌ ܽଵ ݑሺିଵሻ ܾଵ ݒሺିଵሻ ܿଵ ݓሺିଵሻ ܣଶ computes ܭଶ ൌ ܽଶ ݑଵሺିଵሻ ܾଶ ݒଵሺିଵሻ ܿଶ ݓଵሺିଵሻ ܣଷ computes ܭଷ ൌ ܽଷ ݑଶሺିଵሻ ܾଷ ݒଶሺିଵሻ ܿଷ ݓଶሺିଵሻ … ܣିଵ computes ܭሺିଵሻ ൌ ܽିଵ ݑሺିଶሻሺିଵሻ ܾିଵ ݒሺିଶሻሺିଵሻ ܿିଵ ݓሺିଶሻሺିଵሻ ܣ computes ܭ ൌ ܽ ݑሺିଵሻሺିଵሻ ܾ ݒሺିଵሻሺିଵሻ ܿ ݓሺିଵሻሺିଶሻ ܭଵ ൌ ܭଶ ൌ ڮൌ ܭ is their common shared key 5. SECURITY ANALYSIS OF THE PROTOCOL An adversary looking forܣଵ’s public key in first round needs to solve the following; ݑଵଵ ൌ ܽଵ ݔଵ Let ݑଵଵ ൌ ሺݑଵ , ݑଶ , ݑଷ ሻ ܽଵ ൌ ሺܽ, ܾ, ܿ ሻ , ݔଵ ൌ ሺݖ ,ݕ ,ݔሻ ݑଵଵ ൌ ሺܽଵ , ܾଵ , ܿଵ ሻ. ሺݔଵ , ݕଵ , ݖଵ ሻ ൌ ሺܽ ݔ ܾ ܾ , ݖ ܿ , ݕ ݖሻ ݑଵ ൌ ܽ ݔ ܾݑ , ݖଶ ൌ ܾ ݑ ,ݕଷ ൌ ܿ . . … … … ݖሺ1ሻ If he wants to solve a1 or x1, he has to solve the system of equations in (1) Similarly he has to solve another set of equations of the same type as in (1) to recover ܽଷ or ݔଷ from ݓଵଵ . ିଵ ݒଵଵ ൌ ݔଵ ܽଶ ݔଶ Let ݒଵଵ ൌ ሺݒଵ , ݒଶ , ݒଷ ሻ, ݔଶ ൌ ሺݔଵ , ݕଵ , ݖଵ ሻ , ܽଶ ൌ ሺܽଵ , ܾଵ , ܿ ଵ ሻ, ሺݒଵ , ݒଶ , ݒଷ ሻ = ሺ ݖ ,ݕ ,ݔሻିଵ . ሺܽଵ , ܾଵ , ܿ ଵ ሻ. ሺ ݔଵ , ݕଵ , ݖଵ ሻ = ሺ ݕ ݖݔ ܽଵ ݔଵ ܾଵ ݖଵ െ ܿݕଵ െ ݖݕଵ െ ݕሺܿ ଵ ݖଵ ሻ, െ ݕ ܾଵ ݕଵ , െ ݖ ܿ ଵ ݖଵ ሻ He has to solve the following system of equations, ݒଵ ൌ െ ݕ ݖݔ ܽଵ ݔଵ ܾଵ ݖଵ െ ݖݕଵ െ ݕሺܿ ଵ ݖଵ ሻ ݒଶ ൌ െ ݕ ܾଵ ݕ ݒଷ ൌ െ ݖ ܿ ଵ ݖଵ Solving for ݒis known as triple decomposition problem. Similar procedure must be done if he wants to solve for the other entities private and public keys. If the adversary looking for A1’s public key in the second round, he has to solve more complicated equations. 13
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 6. ENCRYPTION SCHEME The K entities ܣଵ , ܣଶ , … ܣ may use their common key for encrypting and decrypting the messages. 6.1. Scheme 1: Encryption: If suppose ܣଵ wants to send a message ‘m’ to any of the other entities, he computes ܧൌ ି ܭ ݉ ܭଵ And sends E. Decryption: Since the other entities know the value of K they decrypt as follows, ܦൌ ି ܭଵ ܭ ܧൌ ି ܭଵ ି ܭ ݉ܭଵ ܭൌ ݉ 6.2. Encryption Scheme 2: Apart from having the common key, they may agree on an endomorphism they may use the twisted contumacy search problem for encryption and decryption. : ℋ → ℋ and Encryption: ܣଵ Computes ܧൌ ߮ ݉ ܭሺି ܭଵ ሻ and sends it to others. Decryption: Others have the value of K, they decrypt ܦൌ ି ܭଵ ߮ ܧሺܭሻ ൌ ି ܭܭଵ ݉ ߮ሺି ܭଵ ሻ߮ሺܭሻ ൌ ݉ Encryption Scheme 3: ܣଵ Encrypts the message m by finding ܧൌ ݉ܭand sends to other entities. Since they have the key K, they decrypt ܦൌ ି ܭଵ ܧൌ ି ܭଵ ݉ ܭൌ ݉ 7. CONCLUSION This paper proposes a Multi party Key Agreement protocol using the triple decomposition search problem which is implemented in Discrete Heisenberg group. K parties may arrive at a common shared key in K-1 rounds. This protocol depends on the difficulty of solving triple decomposition search problem in Discrete Heisenberg group. Solving the triple decomposition search problem in the first round itself is a tedious process as discussed in Section 5. It is much more difficult for an adversary to break the system in the second round and so for the remaining rounds, since at each round the public keys of the communicating parties become more complicated to solve. Hence the protocol presented in this paper provides a secure communication over any number of parties. In continuation to this work, this protocol may be made secure against the man – in – middle attack by providing authentication by means of digital signature. REFERENCES [1] [2] [3] A.Joux, A One Round Protocol for tripartite Diffe-Hellman,In W.Bosma ,editor proceedings of Algorithmic Number Theory ,Symposium ,ANTS IV ,volume 1838 of Lecture Notes in Computer Science ,Pages 385 -394 Springer Verlag,2000 Alexei Myansnikov,Vladmir Shpilarain ,Alexander Ushakov, Group Based Cryptography, 2000 Mathematical Subject Classification: 11T71, 20Exx, 20Fxx, 20Hxx, 20P05, 60B15,68P25, 94A60, Atul Chaturvedi, Varun Shukla,Tripartite Key Agreement Protocol using Conjugacy Problem in Braid Groups. International Journal of Computer Applications (0975 – 8887) Volume 31– No.1, October 2011 14
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] Chun-Li Lin, Hung-Min Sun, Michael Steiner and Tzonelih Hwang Three-party Encrypted Key Exchange WithoutServer Public-Keys Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, Member, IEEEg-Min Sun, Michael Steiner and Tzonelih Hwang -New Multiparty Authentication Services and Key Agreement Protocol Ho –Kyu, Hyang –Sook Lee, Young –Ran Lee - Multiparty Authenticated Key Agreement Protocols From Multilinear Forms. Ko et al Public Key Cryptosystem based on Braid Groups , Crypto 2000 LNCS 1880, pp66183 Peter J.Khan, Automorpisms of the Discrete Heisenberg Group, arXiv:math / 0405109VI [math SG]6, May 2004 Rene’ Peralta,Eiji Okamoto,School of information science Some combinatorial problems of importance to Cryptography T.Isaiyarasi, Dr.K.Sankarasubramanian , “A New Multiparty Key Agreement Protocol Using Search Problems in Discrete Heisenberg Group” ,Indian Journal Of Computer Science and Engineering, Volume 3 ,Issue 1 ,Page No.159- 168.EISSn 0976 – 5166 ,Print ISSN : 2231 3850 Vladmir Shplrain and Alexander Ushakov, A new Key Exchange Protocol based on the decomposition problem .2000 Mathematics Subject classification classification 94A60,20F05,20F06,68P5 Vladmir Shplrain and Gabrial Zapata, Using the subgroup membership search problem in public key cryptography, www.sci.ccny.cuny.edu/~shpil/crypmemb.pdf Yesem Kurt, A new key exchange primitive based on the triple decomposition problem eprint.iacr.org/cryptodb/data/paper.pp? Zhaohui Cheng, Luminita Vasiu and Richard Comley proposed Pairing- Based One –Round Tripartite Key Agreement Protocol. Samir Elouaham, Rachid Latif, Boujemaa Nassiri, Azzedine Dliou, Mostafa Laaboubi And Fadel Maoulainine, “Analysis Electrocardiogram Signal Using Ensemble Empirical Mode Decomposition And Time-Frequency Techniques”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 275 - 289, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME. Aarti Bairagi and Shweta Yadav, “A New Parameter Proposed For Route Selection In Routing Protocol For Manet”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 31 - 37, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME Wategaonkar D.N and Deshpande V.S., “On Improvement Of Performance For Transport Protocol Using Sectoring Scheme In WSN”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 275 - 281, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME Saloni Singla And Tripatjot Singh Panag., “Evaluating The Performance Of Manet Routing Protocols”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 125 - 130, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME 15
Baixar agora