Groups Complexity Cryptology最新文献

筛选
英文 中文
Group-theoretic orbit decidability 群论轨道可决性
Groups Complexity Cryptology Pub Date : 2014-12-01 DOI: 10.1515/gcc-2014-0012
E. Ventura
{"title":"Group-theoretic orbit decidability","authors":"E. Ventura","doi":"10.1515/gcc-2014-0012","DOIUrl":"https://doi.org/10.1515/gcc-2014-0012","url":null,"abstract":"Abstract A recent collection of papers in the last years have given a renovated interest to the notion of orbit decidability. This is a new quite general algorithmic notion, connecting with several classical results, and closely related to the study of the conjugacy problem for extensions of groups. In the present survey we explain several of the classical results closely related to this concept, and we explain the main ideas behind the recent connection with the conjugacy problem made by Bogopolski–Martino–Ventura in [Trans. Amer. Math. Soc. 362 (2010), 2003–2036]. All the consequences up to date, published in several other papers by other authors, are also commented and reviewed.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"62 1","pages":"133 - 148"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86011882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reflections on some aspects of infinite groups 关于无限群若干方面的思考
Groups Complexity Cryptology Pub Date : 2014-11-01 DOI: 10.1515/gcc-2014-0008
B. Fine, A. Gaglione, G. Rosenberger, D. Spellman
{"title":"Reflections on some aspects of infinite groups","authors":"B. Fine, A. Gaglione, G. Rosenberger, D. Spellman","doi":"10.1515/gcc-2014-0008","DOIUrl":"https://doi.org/10.1515/gcc-2014-0008","url":null,"abstract":"Abstract In this paper we survey and reflect upon several aspects of the theory of infinite finitely generated and finitely presented groups that were originally motivated by work of Gilbert Baumslag. All but the last of the topics we have chosen are all related in one way or another to the theory of limit groups and the solution of the Tarski problems. These include the residually free and fully residually free properties and the big powers condition; Baumslag doubles and extensions of centralizers; residually-𝒳 groups and extensions of results of Benjamin Baumslag and finally the relationship between CT and CSA groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"81 - 91"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84133204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the covering number of small symmetric groups and some sporadic simple groups 关于小对称群和一些零星单群的覆盖数
Groups Complexity Cryptology Pub Date : 2014-09-08 DOI: 10.1515/gcc-2016-0010
L. Kappe, Daniela Nikolova-Popova, Eric Swartz
{"title":"On the covering number of small symmetric groups and some sporadic simple groups","authors":"L. Kappe, Daniela Nikolova-Popova, Eric Swartz","doi":"10.1515/gcc-2016-0010","DOIUrl":"https://doi.org/10.1515/gcc-2016-0010","url":null,"abstract":"Abstract A set of proper subgroups is a cover for a group if its union is the whole group. The minimal number of subgroups needed to cover G is called the covering number of G, denoted by σ ⁢ ( G ) ${sigma(G)}$ . Determining σ ⁢ ( G ) ${sigma(G)}$ is an open problem for many nonsolvable groups. For symmetric groups S n ${S_{n}}$ , Maróti determined σ ⁢ ( S n ) ${sigma(S_{n})}$ for odd n with the exception of n = 9 ${n=9}$ and gave estimates for n even. In this paper we determine σ ⁢ ( S n ) ${sigma(S_{n})}$ for n = 8 , 9 , 10 , 12 ${n=8,9,10,12}$ . In addition we find the covering number for the Mathieu group M 12 ${M_{12}}$ and improve an estimate given by Holmes for the Janko group J 1 ${J_{1}}$ .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"287 1","pages":"135 - 154"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73571181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Quantum algorithm for discrete logarithm problem for matrices over finite group rings 有限群环上矩阵离散对数问题的量子算法
Groups Complexity Cryptology Pub Date : 2014-05-01 DOI: 10.1515/gcc-2014-0003
A. Myasnikov, A. Ushakov
{"title":"Quantum algorithm for discrete logarithm problem for matrices over finite group rings","authors":"A. Myasnikov, A. Ushakov","doi":"10.1515/gcc-2014-0003","DOIUrl":"https://doi.org/10.1515/gcc-2014-0003","url":null,"abstract":"Abstract. We propose a polynomial time quantum algorithm for solving the discrete logarithm problem (DLP) in matrices over finite group rings. The hardness of this problem was recently employed in the design of a key-exchange protocol proposed by D. Kahrobaei, C. Koupparis and V. Shpilrain [Groups Complex. Cryptol. 5 (2013), 97–115]. Our result implies that the Kahrobaei–Koupparis–Shpilrain protocol does not belong to the realm of post-quantum cryptography.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"31 - 36"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83755146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Group extensions with special properties 将具有特殊属性的扩展分组
Groups Complexity Cryptology Pub Date : 2014-04-16 DOI: 10.1515/gcc-2015-0005
A. Distler, B. Eick
{"title":"Group extensions with special properties","authors":"A. Distler, B. Eick","doi":"10.1515/gcc-2015-0005","DOIUrl":"https://doi.org/10.1515/gcc-2015-0005","url":null,"abstract":"Abstract Given a group G and a G-module A, we show how to determine up to isomorphism the extensions E of A by G so that A embeds as smallest non-trivial term of the derived series or of the lower central series into E.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"61 1","pages":"1 - 10"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80629267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized small cancellation presentations for automatic groups 自动群的广义小消去表示
Groups Complexity Cryptology Pub Date : 2014-01-21 DOI: 10.1515/gcc-2014-0007
R. Gilman
{"title":"Generalized small cancellation presentations for automatic groups","authors":"R. Gilman","doi":"10.1515/gcc-2014-0007","DOIUrl":"https://doi.org/10.1515/gcc-2014-0007","url":null,"abstract":"Abstract By a result of Gersten and Short finite presentations satisfying the usual non-metric small cancellation conditions present biautomatic groups. We show that in the case in which all pieces have length 1, a generalization of the C(3)-T(6) condition yields a larger collection of biautomatic groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1978 1","pages":"101 - 93"},"PeriodicalIF":0.0,"publicationDate":"2014-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90267321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Friends and relatives of BS(1,2) BS的亲友(1,2)
Groups Complexity Cryptology Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0006
C. F. Miller III
{"title":"Friends and relatives of BS(1,2)","authors":"C. F. Miller III","doi":"10.1515/gcc-2014-0006","DOIUrl":"https://doi.org/10.1515/gcc-2014-0006","url":null,"abstract":"Algorithms, constructions and examples are of central interest in combinatorial and geometric group theory. Teaching experience and, more recently, preparing a historical essay have led me to think the familiar group BS(1, 2) is an example of fundamental importance. The purpose of this note is to make a case for this point of view.We recall several interesting constructions and important examples of groups related to BS(1, 2), and indicate why certain of these groups played a key role in showing the word problem for nitely presented groups is unsolvable.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"32 1","pages":"73 - 80"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77527001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diophantine cryptography in free metabelian groups: Theoretical base 自由亚元群中的丢番图密码学:理论基础
Groups Complexity Cryptology Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0011
A. Myasnikov, V. Roman’kov
{"title":"Diophantine cryptography in free metabelian groups: Theoretical base","authors":"A. Myasnikov, V. Roman’kov","doi":"10.1515/gcc-2014-0011","DOIUrl":"https://doi.org/10.1515/gcc-2014-0011","url":null,"abstract":"Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"60 1","pages":"103 - 120"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84771729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decoy-based information security 基于诱饵的信息安全
Groups Complexity Cryptology Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0010
V. Shpilrain
{"title":"Decoy-based information security","authors":"V. Shpilrain","doi":"10.1515/gcc-2014-0010","DOIUrl":"https://doi.org/10.1515/gcc-2014-0010","url":null,"abstract":"Abstract In this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"34 1","pages":"149 - 155"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75637955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Palindromic width of wreath products, metabelian groups, and max-n solvable groups 环圈产物、亚元群和最大n可解群的回文宽度
Groups Complexity Cryptology Pub Date : 2013-07-18 DOI: 10.1515/gcc-2014-0009
T. Riley, Andrew W. Sale
{"title":"Palindromic width of wreath products, metabelian groups, and max-n solvable groups","authors":"T. Riley, Andrew W. Sale","doi":"10.1515/gcc-2014-0009","DOIUrl":"https://doi.org/10.1515/gcc-2014-0009","url":null,"abstract":"Abstract A group has finite palindromic width if there exists n such that every element can be expressed as a product of n or fewer palindromic words. We show that if G has finite palindromic width with respect to some generating set, then so does G≀ℤ r $G wr mathbb {Z}^{r}$ . We also give a new, self-contained proof that finitely generated metabelian groups have finite palindromic width. Finally, we show that solvable groups satisfying the maximal condition on normal subgroups (max-n) have finite palindromic width.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"124 1","pages":"121 - 132"},"PeriodicalIF":0.0,"publicationDate":"2013-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88004798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信