=Paper= {{Paper |id=Vol-3188/short7 |storemode=property |title=Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper) |pdfUrl=https://ceur-ws.org/Vol-3188/short7.pdf |volume=Vol-3188 |authors=Vasyl Ustimenko,Oleksandr Pustovit |dblpUrl=https://dblp.org/rec/conf/cpits/UstimenkoP21a }} ==Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper)== https://ceur-ws.org/Vol-3188/short7.pdf
On Eulerian Transformations and Postquantum Access Control
Protocol-Based Algorithms
Vasyl Ustimenko1,2 and Oleksandr Pustovit2
1
    University of Marie Curie-Sklodowska in Lublin, 5 Plac Marii Curie-Skłodowskiej, Lublin, 20-031, Poland
2
    Institute of Telecommunications and the Global Information Space, 13 Chokolivsky bul., Kyiv, 02000, Ukraine

                 Abstract
                 The paper is dedicated to applications of Noncomutative Cryptography to access control
                 algorithms for Information Systems. The example of usage of the protocol based on
                 multivariate transformations to access control tasks is given. The platforms for such protocols
                 are subsemigroups of affine Cremona semigroup acting on affine space of dimension n with
                 Multicomposition property, i.e. ability to make computation of the composition of n elements
                 from subsemigroup in polynomial time T(n).The implementation of the algorithm is given in
                 the case of platform of Eulerian transformations. The modification of main algorithm is based
                 on the idea of combination of Eulerian Transformations with elements of affine Cremona
                 group of bounded degree and polynomial density.

                 Keywords 1
                 Access control, noncommutative cryptography, multivariate cryptography, multicomposition
                 property, Eulerian transformations, one-time pad.

1. Introduction
    Protocol based approach to control access to information systems in information space is a very
popular one. With the appearance of the first samples of quantum computers it is very important to
investigate potential of this approach. We study new postquantum resistant multivariate protocols
which can substitute unresistable to quantum computer based attacks Diffie-Hellman algorithm.
Current state of research in Postquantum Multivariate Cryptography is presented on the web page of
the future Satellite Conference “Mathematical Aspects of Post Quantum Cryptography” of the
Mathematical Congress 2022 (see https://icm2022.org/satellites). One of the sixth main directions of
the Post Quantum Cryptography is Multivariate Cryptography for which affine Cremona semigroup
named after Luigi Cremona [1] and its multivariate transformations are the main instruments to create
cryptographical algorithms. These transformations are induced by endomorphisms of polynomial ring
 K[ x1 , x 2 ,..., x n ] over commutative ring K. The case K=Fq of finite field is very popular in classical
Multivariate Cryptography. We discover large subgroups of CSn(K), n=2,3,… with the
Multicomposition property (MCP) which means possibility to compute the composition of N arbitrary
chosen elements of CSn(K) in polynomial time T(n). We assume that each element of CSn(K) is given
in its standard polynomial form xi  f i ( x1 , x 2 ,..., x n ), i=1,2,…n.

2. On Multivariate Protocols of Noncommutative CRYPTOGRAPHY and
   Access Control
   Tahoma protocol was introduced in [2]. It uses two semigroups Sn