Unless the copyright status of the text of this page or section is determined to be compatible with Wikipedia's licenses, the problematic text and revisions or the entire page may be deleted one week after the time of its listing(i.e. after 22:27, 9 February 2026 (UTC)). Until then, this page will be hidden from search engine results until the copyright issue is resolved.
What can I do to resolve the issue?
If you hold the copyright to this text, you can license it in a manner that allows its use on Wikipedia.
To confirm your permission, you can either display a notice to this effect at the site of original publication or send an e-mail from an address associated with the original publication to permissions-enwikimedia.org or a postal letter to the Wikimedia Foundation. These messages must explicitly permit use under CC BY-SA and the GFDL. See Wikipedia:Donating copyrighted materials.
Articles on Wikipedia must be written from a neutral point of view and must be verifiable in published third-party sources; consider whether, copyright issues aside, your text is appropriate for Wikipedia.
You may rewrite this page without copyright-infringing material. Your rewrite should be placed on this page, where it will be available for an administrator or clerk to review it at the end of the listing period. Follow this link to create the temporary subpage. Please mention the rewrite upon completion on this article's discussion page.
Simply modifying copyrighted text is not sufficient to avoid copyright infringement—if the original copyright violation cannot be cleanly removed or the article reverted to a prior version, it is best to write the article from scratch. (See Wikipedia:Close paraphrasing.)
For license compliance, any content used from the original article must be properly attributed; if you use content from the original, please leave a note at the top of your rewrite saying as much. You may duplicate non-infringing text that you had contributed yourself.
It is always a good idea, if rewriting, to identify the point where the copyrighted content was imported to Wikipedia and to check to make sure that the contributor did not add content imported from other sources. When closing investigations, clerks and administrators may find other copyright problems than the one identified. If this material is in the proposed rewrite and cannot be easily removed, the rewrite may not be usable.
Place {{copyvio/bottom}} at the end of the portion you want to blank. If nominating the entire page, please place this template at the top of the page, set the "fullpage" parameter to "yes", and place {{copyvio/bottom}} at the very end of the article.
Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and where computations are performed by ruler and compass constructions.[1] The difficulty or impossibility of solving certain geometric problems like trisection of an angle using ruler and compass only is the basis for the various protocols in geometric cryptography. This field of study was suggested by Mike Burmester, Ronald L. Rivest and Adi Shamir in 1996.[1] Though the cryptographic methods based on geometry have practically no real life applications, they are of use as pedagogic tools for the elucidation of other more complex cryptographic protocols.[1] Geometric cryptography may have applications in the future once current mainstream encryption methods are made obsolete by quantum computing.[2]
A geometric one-way function
Some of the geometric cryptographic methods are based on the impossibility of trisecting an angle using ruler and compass. Given an arbitrary angle, there is a straightforward ruler and compass construction for finding the triple of the given angle. But there is no ruler and compass construction for finding the angle which is exact one-third of an arbitrary angle. Hence the function which assigns the triple of an angle to a given angle can be thought of as a one-way function, the only constructions allowed being ruler and compass constructions.
A geometric identification protocol
A geometric identification protocol has been suggested based on the one-way function indicated above.
Assume that Alice wishes to establish a means of proving her identity later to Bob.
Initialization: Alice publishes a copy of an angle YA which is constructed by Alice as the triple of an angle XA she has constructed at random. Because trisecting an angle is impossible Alice is confident that she is the only one who knows XA.
Identification Protocol:
Alice gives Bob a copy of an angle R which she has constructed as the triple of an angle K that she has selected at random.
Bob flips a coin and tells Alice the result.
If Bob says "heads" Alice gives Bob a copy of the angle K and Bob checks that 3*K = R.
If Bob says "tails" Alice gives Bob a copy of the angle L = K + XA and Bob checks that 3*L = R + YA.
The four steps are repeated t times independently. Bob accepts Alice's proof of identity only if all t checks are successful.
This protocol is an interactive proof of knowledge of the angle XA (the identity of Alice) with error 2−t. The protocol is also zero-knowledge.
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.