Abstract
The paper proposes a methodology to generate family of expander graphs based on Two Predecessor Single Attractor Cellular Automata (TPSA-CA). The construction is finally applied to develop a one-way function whose security lies on the combinatorial properties of the expander graph. It is shown that while the forward transformation of the one-way function is computationally efficient the inverse operation appears to be intractable. Such a one-way function can be an ideal candidate for one-way functions and thus help to develop fast and secure key establishment protocols.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Goldreich, O.: Candidate One-Way Functions Based on Expander Graphs. Cryptology ePrint Archive, Report 2000/063 (2000)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory (22), 644–654 (1976)
Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata Theory and its Application, ch. 4, vol. 1. IEEE Computer Society Press, Los Alamitos (1997)
Linial, N., Wigderson, A.: Expander graphs and their applications (2003)
Nielsen, M.A.: Introduction to expander graphs (2005)
Lubotzky, A., Phillips, R., Sarnak, P.: Ramanujan graphs. Combinatorica 8(3), 261–277 (1988)
Margulis, G.A.: Explicit constructions of expanders. Problemy Peredači Informacii 9(4), 71–80 (1973)
Margulis, G.A.: Explicit group-theoretic constructions of combinatorial schemes and their applications in the construction of expanders and concentrators. Problemy Peredachi Informatsii 24(1), 51–60 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mukhopadhyay, D., RoyChowdhury, D. (2006). Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography. In: El Yacoubi, S., Chopard, B., Bandini, S. (eds) Cellular Automata. ACRI 2006. Lecture Notes in Computer Science, vol 4173. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861201_74
Download citation
DOI: https://doi.org/10.1007/11861201_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40929-8
Online ISBN: 978-3-540-40932-8
eBook Packages: Computer ScienceComputer Science (R0)