Author
Listed:
- Raqeeb Rasheed
(Cyber Security Research Group (CSRG), Department of Computer Science, Nottingham Trent University, Clifton Campus, Nottingham NG11 8NS, UK)
- Ali Safaa Sadiq
(Cyber Security Research Group (CSRG), Department of Computer Science, Nottingham Trent University, Clifton Campus, Nottingham NG11 8NS, UK)
- Omprakash Kaiwartya
(Cyber Security Research Group (CSRG), Department of Computer Science, Nottingham Trent University, Clifton Campus, Nottingham NG11 8NS, UK)
Abstract
It is evident that skew polynomials offer promising directions for developing cryptographic schemes. This paper focuses on exploring skew polynomials and studying their properties with the aim of exploring their potential applications in fields such as cryptography and combinatorics. We begin by deriving the concept of resultants for bivariate skew polynomials. Then, we employ the derived resultant to incrementally eliminate indeterminates in skew polynomial systems, utilising both direct and modular approaches. Finally, we discuss some applications of the derived resultant, including cryptographic schemes (such as Diffie–Hellman) and combinatorial identities (such as Pascal’s identity). We start by considering a bivariate skew polynomial system with two indeterminates; our intention is to isolate and eliminate one of the indeterminates to reduce the system to a simpler form (that is, relying only on one indeterminate in this case). The methodology is composed of two main techniques; in the first technique, we apply our definition of a (bivariate) resultant via a Sylvester-style matrix directly from the polynomials’ coefficients, while the second is based on modular methods where we compute the resultant by using evaluation and interpolation approaches. The idea of this second technique is that instead of computing the resultant directly from the coefficients, we propose to evaluate the polynomials at a set of valid points to compute its corresponding set of partial resultants first; then, we can deduce the original resultant by combining all these partial resultants using an interpolation technique by utilising a theorem we have established.
Suggested Citation
Raqeeb Rasheed & Ali Safaa Sadiq & Omprakash Kaiwartya, 2024.
"Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity,"
Mathematics, MDPI, vol. 12(20), pages 1-29, October.
Handle:
RePEc:gam:jmathe:v:12:y:2024:i:20:p:3258-:d:1500970
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:20:p:3258-:d:1500970. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.