Groups Complexity Cryptology最新文献

筛选
英文 中文
Density of Metric Small Cancellation in Finitely Presented Groups 有限表示群中度量小消去的密度
Groups Complexity Cryptology Pub Date : 2020-02-18 DOI: 10.46298/jgcc.2020.12.2.6200
A. Bishop, Michal Ferov
{"title":"Density of Metric Small Cancellation in Finitely Presented Groups","authors":"A. Bishop, Michal Ferov","doi":"10.46298/jgcc.2020.12.2.6200","DOIUrl":"https://doi.org/10.46298/jgcc.2020.12.2.6200","url":null,"abstract":"Small cancellation groups form an interesting class with many desirable\u0000properties. It is a well-known fact that small cancellation groups are generic;\u0000however, all previously known results of their genericity are asymptotic and\u0000provide no information about \"small\" group presentations. In this note, we give\u0000closed-form formulas for both lower and upper bounds on the density of small\u0000cancellation presentations, and compare our results with experimental data.\u0000Comment: 18 pages, 12 figures","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89077683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frontmatter
Groups Complexity Cryptology Pub Date : 2019-11-01 DOI: 10.1515/gcc-2019-frontmatter2
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2019-frontmatter2","DOIUrl":"https://doi.org/10.1515/gcc-2019-frontmatter2","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77806776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On group automorphisms in universal algebraic geometry 关于普遍代数几何中的群自同构
Groups Complexity Cryptology Pub Date : 2019-10-24 DOI: 10.1515/gcc-2019-2008
A. Shevlyakov
{"title":"On group automorphisms in universal algebraic geometry","authors":"A. Shevlyakov","doi":"10.1515/gcc-2019-2008","DOIUrl":"https://doi.org/10.1515/gcc-2019-2008","url":null,"abstract":"Abstract In this paper, we study group equations with occurrences of automorphisms. We describe equational domains in this class of equations. Moreover, we solve a number of open problem posed in universal algebraic geometry.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"35 1","pages":"115 - 121"},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90224165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective construction of covers of canonical Hom-diagrams for equations over torsion-free hyperbolic groups 无扭双曲群上方程正则homs图盖的有效构造
Groups Complexity Cryptology Pub Date : 2019-10-16 DOI: 10.1515/gcc-2019-2010
O. Kharlampovich, A. Myasnikov, Alexander Taam
{"title":"Effective construction of covers of canonical Hom-diagrams for equations over torsion-free hyperbolic groups","authors":"O. Kharlampovich, A. Myasnikov, Alexander Taam","doi":"10.1515/gcc-2019-2010","DOIUrl":"https://doi.org/10.1515/gcc-2019-2010","url":null,"abstract":"Abstract We show that, given a finitely generated group G as the coordinate group of a finite system of equations over a torsion-free hyperbolic group Γ, there is an algorithm which constructs a cover of a canonical solution diagram. The diagram encodes all homomorphisms from G to Γ as compositions of factorizations through Γ-NTQ groups and canonical automorphisms of the corresponding NTQ-subgroups. We also give another characterization of Γ-limit groups as iterated generalized doubles over Γ.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"32 1","pages":"83 - 101"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82935143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ramp secret sharing with cheater identification in presence of rushing cheaters 坡道秘密共享与作弊者识别在匆忙的作弊者面前
Groups Complexity Cryptology Pub Date : 2019-10-16 DOI: 10.1515/gcc-2019-2006
Jyotirmoy Pramanik, A. Adhikari
{"title":"Ramp secret sharing with cheater identification in presence of rushing cheaters","authors":"Jyotirmoy Pramanik, A. Adhikari","doi":"10.1515/gcc-2019-2006","DOIUrl":"https://doi.org/10.1515/gcc-2019-2006","url":null,"abstract":"Abstract Secret sharing allows one to share a piece of information among n participants in a way that only qualified subsets of participants can recover the secret whereas others cannot. Some of these participants involved may, however, want to forge their shares of the secret(s) in order to cheat other participants. Various cheater identifiable techniques have been devised in order to identify such cheaters in secret sharing schemes. On the other hand, Ramp secret sharing schemes are a practically efficient variant of usual secret sharing schemes with reduced share size and some loss in security. Ramp secret sharing schemes have many applications in secure information storage, information-theoretic private information retrieval and secret image sharing due to producing relatively smaller shares. However, to the best of our knowledge, there does not exist any cheater identifiable ramp secret sharing scheme. In this paper we define the security model for cheater identifiable ramp secret sharing schemes and provide two constructions for cheater identifiable ramp secret sharing schemes. In addition, the second construction is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round. Also, we do not make any computational assumptions for the cheaters, i.e., cheaters may be equipped with unlimited time and resources, yet, the cheating probability would be bounded above by a very small positive number.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"79 1","pages":"103 - 113"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Randomized nonlinear software-oriented MDS diffusion layers 随机非线性面向软件的MDS扩散层
Groups Complexity Cryptology Pub Date : 2019-10-15 DOI: 10.1515/gcc-2019-2011
M. R. M. Shamsabad, S. M. Dehnavi, A. M. Rishakani
{"title":"Randomized nonlinear software-oriented MDS diffusion layers","authors":"M. R. M. Shamsabad, S. M. Dehnavi, A. M. Rishakani","doi":"10.1515/gcc-2019-2011","DOIUrl":"https://doi.org/10.1515/gcc-2019-2011","url":null,"abstract":"Abstract MDS diffusion layers are critical components in the design of symmetric ciphers. In this paper, after introducing some new algebraic structures, we provide new MDS matrices over special types of R-modules. With the help of the proposed methodology, we have more flexibility in designing software-oriented diffusion layers. Most notably, we construct randomized and/or nonlinear MDS diffusion layers, based upon the presented theoretical results, and discuss the resistance of the presented diffusion layers against various kinds of cryptanalysis, compared with classical linear diffusion layers.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"15 1","pages":"123 - 131"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80403736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption 在一般整数因子分解难解性假设下构造无伪的有限计算群族
Groups Complexity Cryptology Pub Date : 2019-10-15 DOI: 10.1515/gcc-2019-2009
M. Anokhin
{"title":"Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption","authors":"M. Anokhin","doi":"10.1515/gcc-2019-2009","DOIUrl":"https://doi.org/10.1515/gcc-2019-2009","url":null,"abstract":"Abstract We provide a correct version of Remark 3.5 of the paper mentioned in the title. Also, we fix a typo in Remark 4.4 of that paper.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"11 1","pages":"133 - 134"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75500031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the lattice of subgroups of a free group: complements and rank 自由群的子群的格:补和秩
Groups Complexity Cryptology Pub Date : 2019-05-29 DOI: 10.46298/jgcc.2020.12.1.6059
Jordi Delgado, Pedro V. Silva
{"title":"On the lattice of subgroups of a free group: complements and rank","authors":"Jordi Delgado, Pedro V. Silva","doi":"10.46298/jgcc.2020.12.1.6059","DOIUrl":"https://doi.org/10.46298/jgcc.2020.12.1.6059","url":null,"abstract":"A $vee$-complement of a subgroup $H leqslant mathbb{F}_n$ is a subgroup $K\u0000leqslant mathbb{F}_n$ such that $H vee K = mathbb{F}_n$. If we also ask $K$\u0000to have trivial intersection with $H$, then we say that $K$ is a\u0000$oplus$-complement of $H$. The minimum possible rank of a $vee$-complement\u0000(resp. $oplus$-complement) of $H$ is called the $vee$-corank (resp.\u0000$oplus$-corank) of $H$. We use Stallings automata to study these notions and\u0000the relations between them. In particular, we characterize when complements\u0000exist, compute the $vee$-corank, and provide language-theoretical descriptions\u0000of the sets of cyclic complements. Finally, we prove that the two notions of\u0000corank coincide on subgroups that admit cyclic complements of both kinds.\u0000Comment: 27 pages, 5 figures","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84682301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Key agreement based on automaton groups 基于自动化组的密钥协议
Groups Complexity Cryptology Pub Date : 2019-05-08 DOI: 10.1515/gcc-2019-2012
R. Grigorchuk, D. Grigoriev
{"title":"Key agreement based on automaton groups","authors":"R. Grigorchuk, D. Grigoriev","doi":"10.1515/gcc-2019-2012","DOIUrl":"https://doi.org/10.1515/gcc-2019-2012","url":null,"abstract":"Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group Aff4⁢(ℤ){mathrm{Aff}_{4}(mathbb{Z})}.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"100 1","pages":"77 - 81"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80023970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved version of the AAG cryptographic protocol AAG加密协议的改进版本
Groups Complexity Cryptology Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-2003
V. Roman’kov
{"title":"An improved version of the AAG cryptographic protocol","authors":"V. Roman’kov","doi":"10.1515/gcc-2019-2003","DOIUrl":"https://doi.org/10.1515/gcc-2019-2003","url":null,"abstract":"Abstract An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established. Unlike the original version, that is based on the intractability of the simultaneous conjugacy search problem for the platform group, the proposed version is based on harder simultaneous membership-conjugacy search problems, and the membership problem needs to be solved for a subset of the platform group that can be easily and efficiently built to be very complicated and without any good structure. A number of other hard problems need to be solved first before start solving the simultaneous membership-conjugacy search problem to obtain the exchanged key.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"116 1","pages":"35 - 41"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76185655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信