{"id":"https://openalex.org/W3073667118","doi":"https://doi.org/10.3390/sym12091389","title":"Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem","display_name":"Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem","publication_year":2020,"publication_date":"2020-08-20","ids":{"openalex":"https://openalex.org/W3073667118","doi":"https://doi.org/10.3390/sym12091389","mag":"3073667118"},"language":"en","primary_location":{"id":"doi:10.3390/sym12091389","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091389","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1389/pdf?version=1597919172","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/12/9/1389/pdf?version=1597919172","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067826577","display_name":"Aleksejus Mihalkovich","orcid":"https://orcid.org/0000-0002-8661-3021"},"institutions":[{"id":"https://openalex.org/I172574986","display_name":"Kaunas University of Technology","ror":"https://ror.org/01me6gb93","country_code":"LT","type":"education","lineage":["https://openalex.org/I172574986"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Aleksejus Mihalkovich","raw_affiliation_strings":["Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania"],"raw_orcid":"https://orcid.org/0000-0002-8661-3021","affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania","institution_ids":["https://openalex.org/I172574986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019879500","display_name":"Eligijus Sakalauskas","orcid":"https://orcid.org/0000-0002-4620-4469"},"institutions":[{"id":"https://openalex.org/I172574986","display_name":"Kaunas University of Technology","ror":"https://ror.org/01me6gb93","country_code":"LT","type":"education","lineage":["https://openalex.org/I172574986"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Eligijus Sakalauskas","raw_affiliation_strings":["Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania"],"raw_orcid":"https://orcid.org/0000-0002-4620-4469","affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania","institution_ids":["https://openalex.org/I172574986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089971857","display_name":"K\u0119stutis Luk\u0161ys","orcid":"https://orcid.org/0000-0003-1619-8720"},"institutions":[{"id":"https://openalex.org/I172574986","display_name":"Kaunas University of Technology","ror":"https://ror.org/01me6gb93","country_code":"LT","type":"education","lineage":["https://openalex.org/I172574986"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Kestutis Luksys","raw_affiliation_strings":["Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania"],"raw_orcid":"https://orcid.org/0000-0003-1619-8720","affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, Kaunas University of Technology, Studentu str. 50-324, 44249 Kaunas, Lithuania","institution_ids":["https://openalex.org/I172574986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067826577"],"corresponding_institution_ids":["https://openalex.org/I172574986"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.7283,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.70799654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"12","issue":"9","first_page":"1389","last_page":"1389"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6283721923828125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6005136966705322},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5267443060874939},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5173611044883728},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5112624168395996},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.48490840196609497},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.46927180886268616},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44369977712631226},{"id":"https://openalex.org/keywords/nondeterministic-algorithm","display_name":"Nondeterministic algorithm","score":0.4118739366531372},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3477674722671509},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2726525664329529},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.25044381618499756},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22872987389564514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1753169596195221}],"concepts":[{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6283721923828125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6005136966705322},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5267443060874939},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5173611044883728},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5112624168395996},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.48490840196609497},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.46927180886268616},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44369977712631226},{"id":"https://openalex.org/C176181172","wikidata":"https://www.wikidata.org/wiki/Q3490301","display_name":"Nondeterministic algorithm","level":2,"score":0.4118739366531372},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3477674722671509},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2726525664329529},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25044381618499756},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22872987389564514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1753169596195221}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym12091389","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091389","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1389/pdf?version=1597919172","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b1d5be6564eb4c98969c15c9d119521f","is_oa":true,"landing_page_url":"https://doaj.org/article/b1d5be6564eb4c98969c15c9d119521f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 12, Iss 9, p 1389 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/12/9/1389/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym12091389","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym12091389","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12091389","pdf_url":"https://www.mdpi.com/2073-8994/12/9/1389/pdf?version=1597919172","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W22300245","https://openalex.org/W1510717485","https://openalex.org/W1522107660","https://openalex.org/W1569499052","https://openalex.org/W1573095851","https://openalex.org/W1598269861","https://openalex.org/W1761303171","https://openalex.org/W1803201356","https://openalex.org/W1821087317","https://openalex.org/W1976904648","https://openalex.org/W1990324913","https://openalex.org/W1996360405","https://openalex.org/W2010414622","https://openalex.org/W2036378739","https://openalex.org/W2048499339","https://openalex.org/W2099172492","https://openalex.org/W2137147061","https://openalex.org/W2156186849","https://openalex.org/W2166566648","https://openalex.org/W2560054270","https://openalex.org/W2594051042","https://openalex.org/W2765326117","https://openalex.org/W2793284218","https://openalex.org/W2899082768","https://openalex.org/W2912382050","https://openalex.org/W2978730517","https://openalex.org/W2991067220","https://openalex.org/W3034470636","https://openalex.org/W4232836212","https://openalex.org/W6630755419","https://openalex.org/W6758613757","https://openalex.org/W7038926044"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2953298321","https://openalex.org/W2503581178","https://openalex.org/W1913041503"],"abstract_inverted_index":{"In":[0],"this":[1,28],"paper":[2],"we":[3,154,167,194],"present":[4],"a":[5,32,124,128,169],"cryptographic":[6,74],"primitive":[7,13,29],"based":[8,71,132],"on":[9,31,72,88,133,144,205],"non-commutative":[10],"cryptography.":[11,78],"This":[12],"is":[14,115],"used":[15,56],"for":[16,127,151,179],"key":[17,129,202],"exchange":[18,130,203],"protocol":[19,66,131],"(KEP)":[20],"construction.":[21],"We":[22,104],"prove":[23,195],"that":[24,196],"the":[25,80,145,156,173,188,197,200],"security":[26,81,198],"of":[27,82,107,111,158,172,187,199],"relies":[30,204],"nondeterministic":[33],"polynomial":[34],"complete":[35],"(NP-Complete)":[36],"decisional":[37,208],"problem.":[38,209],"Recently":[39],"there":[40],"are":[41,54,70,99],"no":[42],"known":[43],"quantum":[44,102],"cryptanalysis":[45],"algorithms":[46],"effectively":[47],"solving":[48],"NP-Complete":[49,89,207],"problems.":[50],"So":[51],"far,":[52],"KEPs":[53],"widely":[55],"in":[57,63,160],"secure":[58,67],"communication":[59],"channel":[60],"creation,":[61],"e.g.,":[62],"hypertext":[64],"transfer":[65],"(https://)":[68],"and":[69,91,148,176,181,191],"traditional":[73],"primitives":[75],"representing":[76],"commutative":[77],"However,":[79],"these":[83],"protocols":[84],"does":[85],"not":[86,116],"rely":[87],"problems":[90],"hence,":[92],"according":[93],"to":[94,101,118,122,164],"P.":[95],"W.":[96],"Shorr,":[97],"they":[98],"vulnerable":[100],"cryptanalysis.":[103],"use":[105],"one":[106],"seven":[108],"non-commuting":[109],"groups":[110],"order":[112,157],"16":[113],"which":[114],"isomorphic":[117],"any":[119],"other":[120],"group":[121,126,146],"define":[123,168],"platform":[125],"previously":[134],"considered":[135],"matrix":[136,175],"power":[137,183],"function":[138],"(MPF).":[139],"By":[140],"investigating":[141],"basic":[142],"properties":[143,186],"M16":[147],"their":[149],"implementation":[150],"our":[152],"goals":[153],"fix":[155],"actions":[159],"MPF":[161],"from":[162],"left":[163,180],"right.":[165],"Furthermore,":[166],"special":[170],"form":[171],"base":[174],"separate":[177],"templates":[178,190],"right":[182],"matrices.":[184],"Using":[185],"specified":[189],"Schaeffer":[192],"criteria":[193],"proposed":[201],"an":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
