Copyright-problem.svg
An editor has launched a copyright investigation involving this article. The text under investigation is currently hidden from public view, but is accessible in the page history . Please do not remove this notice or restore blanked content until the issue is resolved by an administrator, copyright clerk, or volunteer response agent.

The purported copyright violation copies text from https://people.csail.mit.edu/rivest/pubs/BRS97.pdf  ( Copyvios report ); as such, this page has been listed on the copyright problems noticeboard.

Contents

  • A geometric one-way function
  • A geometric identification protocol
  • See also
  • References

Unless the copyright status of the text of this page or section is determined to be compatible with Wikipedia's licenses, the problematic text and revisions or the entire page may be deleted one week after the time of its listing (i.e. after 22:27, 9 February 2026 (UTC)). Until then, this page will be hidden from search engine results until the copyright issue is resolved.

What can I do to resolve the issue?

  • If you hold the copyright to this text, you can license it in a manner that allows its use on Wikipedia.
    1. You must permit the use of your material under the terms of the Creative Commons Attribution-Sharealike 4.0 International License (CC BY-SA 4.0) and the GNU Free Documentation License (GFDL) (unversioned, with no invariant sections, front-cover texts, or back-cover texts).
    2. Explain your intent to license the content on this article's discussion page.
    3. To confirm your permission, you can either display a notice to this effect at the site of original publication or send an e-mail from an address associated with the original publication to permissions-enAt sign blue.svgwikimedia.org or a postal letter to the Wikimedia Foundation. These messages must explicitly permit use under CC BY-SA and the GFDL. See Wikipedia:Donating copyrighted materials.
    4. Articles on Wikipedia must be written from a neutral point of view and must be verifiable in published third-party sources; consider whether, copyright issues aside, your text is appropriate for Wikipedia.
  • You can demonstrate that this text is in the public domain or is already under a license suitable for Wikipedia. Explain this on this article's discussion page, with reference to evidence. Wikipedia:Public domain and Wikipedia:Compatibly licensed may assist in determining the status.
  • You may rewrite this page without copyright-infringing material. Your rewrite should be placed on this page, where it will be available for an administrator or clerk to review it at the end of the listing period. Follow this link to create the temporary subpage. Please mention the rewrite upon completion on this article's discussion page.
    • Simply modifying copyrighted text is not sufficient to avoid copyright infringement—if the original copyright violation cannot be cleanly removed or the article reverted to a prior version, it is best to write the article from scratch. (See Wikipedia:Close paraphrasing.)
    • For license compliance, any content used from the original article must be properly attributed; if you use content from the original, please leave a note at the top of your rewrite saying as much. You may duplicate non-infringing text that you had contributed yourself.
    • It is always a good idea, if rewriting, to identify the point where the copyrighted content was imported to Wikipedia and to check to make sure that the contributor did not add content imported from other sources. When closing investigations, clerks and administrators may find other copyright problems than the one identified. If this material is in the proposed rewrite and cannot be easily removed, the rewrite may not be usable.

Steps to list an article at Wikipedia:Copyright problems:
  1. Add the following to the bottom of Wikipedia:Copyright problems/2026 February 2: * {{subst:article-cv|Geometric cryptography}} from https://people.csail.mit.edu/rivest/pubs/BRS97.pdf
  2. Add the following template to the talk page of the contributor of the material: {{subst:Nothanks-web|pg=Geometric cryptography|url=https://people.csail.mit.edu/rivest/pubs/BRS97.pdf
  3. Place {{ copyvio/bottom }} at the end of the portion you want to blank. If nominating the entire page, please place this template at the top of the page, set the "fullpage" parameter to "yes", and place {{ copyvio/bottom }} at the very end of the article.
Question book-new.svg
This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources:  "Geometric cryptography"  –  news · newspapers · books · scholar · JSTOR
(April 2023) ( Learn how and when to remove this message )

Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and where computations are performed by ruler and compass constructions. [1] The difficulty or impossibility of solving certain geometric problems like trisection of an angle using ruler and compass only is the basis for the various protocols in geometric cryptography. This field of study was suggested by Mike Burmester, Ronald L. Rivest and Adi Shamir in 1996. [1] Though the cryptographic methods based on geometry have practically no real life applications, they are of use as pedagogic tools for the elucidation of other more complex cryptographic protocols. [1] Geometric cryptography may have applications in the future once current mainstream encryption methods are made obsolete by quantum computing. [2]

A geometric one-way function

Some of the geometric cryptographic methods are based on the impossibility of trisecting an angle using ruler and compass. Given an arbitrary angle, there is a straightforward ruler and compass construction for finding the triple of the given angle. But there is no ruler and compass construction for finding the angle which is exact one-third of an arbitrary angle. Hence the function which assigns the triple of an angle to a given angle can be thought of as a one-way function, the only constructions allowed being ruler and compass constructions.

A geometric identification protocol

A geometric identification protocol has been suggested based on the one-way function indicated above.

Assume that Alice wishes to establish a means of proving her identity later to Bob.

Initialization: Alice publishes a copy of an angle YA which is constructed by Alice as the triple of an angle XA she has constructed at random. Because trisecting an angle is impossible Alice is confident that she is the only one who knows XA.

Identification Protocol:

  1. Alice gives Bob a copy of an angle R which she has constructed as the triple of an angle K that she has selected at random.
  2. Bob flips a coin and tells Alice the result.
  3. If Bob says "heads" Alice gives Bob a copy of the angle K and Bob checks that 3*K = R.
  4. If Bob says "tails" Alice gives Bob a copy of the angle L = K + XA and Bob checks that 3*L = R + YA.

The four steps are repeated t times independently. Bob accepts Alice's proof of identity only if all t checks are successful.

This protocol is an interactive proof of knowledge of the angle XA (the identity of Alice) with error 2−t. The protocol is also zero-knowledge.

See also

  • Post-quantum cryptography

References

  1. 1 2 3 Mike Burmester, Ronald L Rivest and Adi Shamir (1997-11-04). "Geometric Cryptography Identification by Angle Trisection" (PDF). US Department of Energy, OSTI. Archived from the original (PDF) on 2001-11-16. Retrieved 2014-06-19.
  2. ↑ Costello, Craig (2019-11-12), "Craig Costello: In the war for information, will quantum computers defeat cryptographers?", TED.com
This page is based on this Wikipedia article
Text is available under the CC BY-SA 4.0 license; additional terms may apply.
Images, videos and audio are available under their respective licenses.