Groups Complexity Cryptology最新文献

筛选
英文 中文
Cryptanalysis of a hash function, and the modular subset sum problem 哈希函数的密码分析,以及模子集和问题
Groups Complexity Cryptology Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-2001
C. Monico
{"title":"Cryptanalysis of a hash function, and the modular subset sum problem","authors":"C. Monico","doi":"10.1515/gcc-2019-2001","DOIUrl":"https://doi.org/10.1515/gcc-2019-2001","url":null,"abstract":"Abstract Recently, Shpilrain and Sosnovski proposed a hash function based on composition of affine maps. In this paper, we show that this hash function with its proposed parameters is not weak collision resistant, for plaintexts of size at least 1.9MB (about 2 24 {2^{24}} bits). Our approach is to reduce the preimage problem to a (very) high density instance of the Random Modular Subset Sum Problem, for which we give an algorithm capable of solving instances of the resulting size. Specifically, given plaintexts of about 1.9MB, we were able to produce other plaintexts of the same size with the same hash value in about 13 hours each, on average.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"17 1","pages":"17 - 23"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77009205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Frontmatter
Groups Complexity Cryptology Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-frontmatter1
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2019-frontmatter1","DOIUrl":"https://doi.org/10.1515/gcc-2019-frontmatter1","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88926880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of 2-dimensional projective linear groups by the group order and the set of numbers of its elements of each order 二维射影线性群的群阶识别及其每阶元素的个数集合
Groups Complexity Cryptology Pub Date : 2018-11-01 DOI: 10.1515/gcc-2018-0011
Alireza Khalili Asboei
{"title":"Recognition of 2-dimensional projective linear groups by the group order and the set of numbers of its elements of each order","authors":"Alireza Khalili Asboei","doi":"10.1515/gcc-2018-0011","DOIUrl":"https://doi.org/10.1515/gcc-2018-0011","url":null,"abstract":"Abstract In a finite group G, let π e ⁢ ( G ) {pi_{e}(G)} be the set of orders of elements of G, let s k {s_{k}} denote the number of elements of order k in G, for each k ∈ π e ⁢ ( G ) {kinpi_{e}(G)} , and then let nse ⁡ ( G ) {operatorname{nse}(G)} be the unordered set { s k : k ∈ π e ⁢ ( G ) } {{s_{k}:kinpi_{e}(G)}} . In this paper, it is shown that if | G | = | L 2 ⁢ ( q ) | {lvert Grvert=lvert L_{2}(q)rvert} and nse ⁡ ( G ) = nse ⁡ ( L 2 ⁢ ( q ) ) {operatorname{nse}(G)=operatorname{nse}(L_{2}(q))} for some prime-power q, then G is isomorphic to L 2 ⁢ ( q ) {L_{2}(q)} .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"12 1","pages":"111 - 118"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79527366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frontmatter
Groups Complexity Cryptology Pub Date : 2018-11-01 DOI: 10.1515/gcc-2018-frontmatter2
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2018-frontmatter2","DOIUrl":"https://doi.org/10.1515/gcc-2018-frontmatter2","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78562958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two general schemes of algebraic cryptography 代数密码学的两个一般方案
Groups Complexity Cryptology Pub Date : 2018-10-11 DOI: 10.1515/gcc-2018-0009
V. Roman’kov
{"title":"Two general schemes of algebraic cryptography","authors":"V. Roman’kov","doi":"10.1515/gcc-2018-0009","DOIUrl":"https://doi.org/10.1515/gcc-2018-0009","url":null,"abstract":"Abstract In this paper, we introduce two general schemes of algebraic cryptography. We show that many of the systems and protocols considered in literature that use two-sided multiplications are specific cases of the first general scheme. In a similar way, we introduce the second general scheme that joins systems and protocols based on automorphisms or endomorphisms of algebraic systems. Also, we discuss possible applications of the membership search problem in algebraic cryptanalysis. We show how an efficient decidability of the underlined membership search problem for an algebraic system chosen as the platform can be applied to show a vulnerability of both schemes. Our attacks are based on the linear or on the nonlinear decomposition method, which complete each other. We give a couple of examples of systems and protocols known in the literature that use one of the two introduced schemes with their cryptanalysis. Mostly, these protocols simulate classical cryptographic schemes, such as Diffie–Hellman, Massey–Omura and ElGamal in algebraic setting. Furthermore, we show that, in many cases, one can break the schemes without solving the algorithmic problems on which the assumptions are based.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"20 1","pages":"83 - 98"},"PeriodicalIF":0.0,"publicationDate":"2018-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80824720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Garside theory and subsurfaces: Some examples in braid groups Garside理论与次曲面:编织群中的一些例子
Groups Complexity Cryptology Pub Date : 2018-07-04 DOI: 10.1515/gcc-2019-2007
S. Schleimer, B. Wiest
{"title":"Garside theory and subsurfaces: Some examples in braid groups","authors":"S. Schleimer, B. Wiest","doi":"10.1515/gcc-2019-2007","DOIUrl":"https://doi.org/10.1515/gcc-2019-2007","url":null,"abstract":"Abstract Garside-theoretical solutions to the conjugacy problem in braid groups depend on the determination of a characteristic subset of the conjugacy class of any given braid, e.g. the sliding circuit set. It is conjectured that, among rigid braids with a fixed number of strands, the size of this set is bounded by a polynomial in the length of the braids. In this paper we suggest a more precise bound: for rigid braids with N strands and of Garside length L, the sliding circuit set should have at most C⋅LN-2{Ccdot L^{N-2}} elements, for some constant C. We construct a family of braids which realise this potential worst case. Our example braids suggest that having a large sliding circuit set is a geometric property of braids, as our examples have multiple subsurfaces with large subsurface projection; thus they are “almost reducible” in multiple ways, and act on the curve graph with small translation distance.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"119 1","pages":"61 - 75"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79267070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On finitely generated submonoids of virtually free groups 虚自由群的有限生成子半群
Groups Complexity Cryptology Pub Date : 2018-05-21 DOI: 10.1515/gcc-2018-0008
Pedro V. Silva, A. Zakharov
{"title":"On finitely generated submonoids of virtually free groups","authors":"Pedro V. Silva, A. Zakharov","doi":"10.1515/gcc-2018-0008","DOIUrl":"https://doi.org/10.1515/gcc-2018-0008","url":null,"abstract":"Abstract We prove that it is decidable whether or not a finitely generated submonoid of a virtually free group is graded, introduce a new geometric characterization of graded submonoids in virtually free groups as quasi-geodesic submonoids, and show that their word problem is rational (as a relation). We also solve the isomorphism problem for this class of monoids, generalizing earlier results for submonoids of free monoids. We also prove that the classes of graded monoids, regular monoids and Kleene monoids coincide for submonoids of free groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"43 1","pages":"63 - 82"},"PeriodicalIF":0.0,"publicationDate":"2018-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74186401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Groups whose word problems are not semilinear 文字问题不是半线性的组
Groups Complexity Cryptology Pub Date : 2018-04-25 DOI: 10.1515/gcc-2018-0010
R. Gilman, Robert P. Kropholler, S. Schleimer
{"title":"Groups whose word problems are not semilinear","authors":"R. Gilman, Robert P. Kropholler, S. Schleimer","doi":"10.1515/gcc-2018-0010","DOIUrl":"https://doi.org/10.1515/gcc-2018-0010","url":null,"abstract":"Abstract Suppose that G is a finitely generated group and WP ⁡ ( G ) {operatorname{WP}(G)} is the formal language of words defining the identity in G. We prove that if G is a virtually nilpotent group that is not virtually abelian, the fundamental group of a finite volume hyperbolic three-manifold, or a right-angled Artin group whose graph lies in a certain infinite class, then WP ⁡ ( G ) {operatorname{WP}(G)} is not a multiple context-free language.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"21 1","pages":"53 - 62"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77943612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Orderable groups, elementary theory, and the Kaplansky conjecture 可序群,基本理论,和卡普兰斯基猜想
Groups Complexity Cryptology Pub Date : 2018-04-25 DOI: 10.1515/gcc-2018-0005
B. Fine, A. Gaglione, G. Rosenberger, D. Spellman
{"title":"Orderable groups, elementary theory, and the Kaplansky conjecture","authors":"B. Fine, A. Gaglione, G. Rosenberger, D. Spellman","doi":"10.1515/gcc-2018-0005","DOIUrl":"https://doi.org/10.1515/gcc-2018-0005","url":null,"abstract":"Abstract We show that each of the classes of left-orderable groups and orderable groups is a quasivariety with undecidable theory. In the case of orderable groups, we find an explicit set of universal axioms. We then consider the relationship with the Kaplansky group rings conjecture and show that 𝒦 {{mathcal{K}}} , the class of groups which satisfy the conjecture, is the model class of a set of universal sentences in the language of group theory. We also give a characterization of when two groups in 𝒦 {{mathcal{K}}} or more generally two torsion-free groups are universally equivalent.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"31 1","pages":"43 - 52"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81694530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical private-key fully homomorphic encryption in rings 环中实用的私钥全同态加密
Groups Complexity Cryptology Pub Date : 2018-04-19 DOI: 10.1515/gcc-2018-0006
A. Gribov, Delaram Kahrobaei, V. Shpilrain
{"title":"Practical private-key fully homomorphic encryption in rings","authors":"A. Gribov, Delaram Kahrobaei, V. Shpilrain","doi":"10.1515/gcc-2018-0006","DOIUrl":"https://doi.org/10.1515/gcc-2018-0006","url":null,"abstract":"Abstract We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate on encrypted data without decrypting it. Still, we show that our method allows for a third party search on encrypted data.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"36 1","pages":"17 - 27"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74379043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信