Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Anshel is active.

Publication


Featured researches published by Michael Anshel.


the cryptographers track at the rsa conference | 2001

New Key Agreement Protocols in Braid Group Cryptography

Iris Anshel; Michael Anshel; Benji Fisher; Dorian Goldfeld

Key agreement protocols are presented whose security is based on the difficulty of inverting one-way functions derived from hard problems for braid groups. Efficient/low cost algorithms for key transfer/ extraction are presented. Attacks/security parameters are discussed.


technical symposium on computer science education | 2007

Reducing medical errors using secure RFID technology

Michael Anshel; Sarah Levitan

RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. We discuss new encryption methods that address these concerns.


Applicable Algebra in Engineering, Communication and Computing | 2006

A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields

Iris Anshel; Michael Anshel; Dorian Goldfeld

This note introduces Braid–Diffie–Hellman (BDH), a key agreement protocol employing matrices over small finite fields. The method employs colored Burau matrices and a refinement of a Diffie–Hellman type protocol. We discuss the security and examine performance parameters of BDH which permit linear time execution on platforms supporting basic algebraic primitives.


Quantum Information & Computation | 2007

Topological quantum scheme based on quantum walk

Andis Chi-Tung Kwan; Xiangdong Li; Lin Leung; Michael Anshel

Topological quantum computation provides efficiency with fault-tolerant and error-correction to overcome decoherence problem. Here we investigate a class of topological quantum computation device. We discuss a method of constructing topological quantum scheme based on quantum walk for the state space.


Quantum Information & Computation | 2007

A simple secure quantum authorization scheme

Xiaowen Zhang; Xiaowei Xu; Ke Tang; Andis Chi-Tung Kwan; Ping Ji; Lin Leung; Xiangdong Li; Michael Anshel

Based on the law of quantum mechanics we present a simple authorization scheme: Quauth. The description of the scheme is given in details. The authorization is accomplished through a quantum channel by one way communication. We show that eavesdropper gets no information about key no matter how many times s/he is listening on the channel. The scheme is robust against both the passive and active attacks. By induction we prove that the scheme is information theoretically secure.


Mathematics of Data/Image Coding, Compression, and Encryption V, with Applications | 2003

A Fast lattice-based polynomial digital signature system for m-commerce

Xinzhou Wei; Lin Leung; Michael Anshel

The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprises server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRUs Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.


Proceedings of the American Mathematical Society | 1991

Partitions, Egyptian fractions, and free products of finite abelian groups

Michael Anshel; Dorian Goldfeld

Some computational questions concerning free products of finite abelian groups are reduced to questions in additive number theory involving partitions and Egyptian fractions. These in turn are resolved employing the Mathematica TM computer system


Mathematical Research Letters | 1999

An algebraic method for public-key cryptography

Iris Anshel; Michael Anshel; Dorian Goldfeld


Duke Mathematical Journal | 1997

Zeta functions, one-way functions, and pseudorandom number generators

Michael Anshel; Dorian Goldfeld


American Mathematical Monthly | 1993

From the Post-Markov Theorem Through Decision Problems to Public-Key Cryptography

Iris Anshel; Michael Anshel

Collaboration


Dive into the Michael Anshel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaowen Zhang

College of Staten Island

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Qinghai Gao

Farmingdale State College

View shared research outputs
Top Co-Authors

Avatar

Xiangdong Li

New York City College of Technology

View shared research outputs
Top Co-Authors

Avatar

Ke Tang

City University of New York

View shared research outputs
Top Co-Authors

Avatar

Ping Ji

John Jay College of Criminal Justice

View shared research outputs
Top Co-Authors

Avatar

Xiaowei Xu

City University of New York

View shared research outputs
Researchain Logo
Decentralizing Knowledge