{"title":"群理论在信息安全中的进一步潜在应用","authors":"B. Fine, M. Kreuzer, G. Rosenberger","doi":"10.1080/23799927.2021.1931455","DOIUrl":null,"url":null,"abstract":"Group theory, specifically the combinatorial group theory of finitely presented groups,has been utilized effectively in cryptology. Several new public key cryptosystems have been developed and this has ushered a new area in cryptography called group based cryptography. Braid groups have been suggested as possible platforms and this has led to what is called braid group cryptography. This has also had a profound effect on theoretical group theory as techniques have been found to analyse these group-based cryptosystems.The basic idea is that a finitely presented group can be described by a finite amount of data.This provides techniques to enormously compress and hide information. This suggests that we have only barely scraped the surface of using finitely presented groups for data control, security and storage. For example, we describe a far-reaching extension for controlling access to files which could be relevant in medical records.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2021.1931455","citationCount":"0","resultStr":"{\"title\":\"Further potential applications of group theory in information security\",\"authors\":\"B. Fine, M. Kreuzer, G. Rosenberger\",\"doi\":\"10.1080/23799927.2021.1931455\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Group theory, specifically the combinatorial group theory of finitely presented groups,has been utilized effectively in cryptology. Several new public key cryptosystems have been developed and this has ushered a new area in cryptography called group based cryptography. Braid groups have been suggested as possible platforms and this has led to what is called braid group cryptography. This has also had a profound effect on theoretical group theory as techniques have been found to analyse these group-based cryptosystems.The basic idea is that a finitely presented group can be described by a finite amount of data.This provides techniques to enormously compress and hide information. This suggests that we have only barely scraped the surface of using finitely presented groups for data control, security and storage. For example, we describe a far-reaching extension for controlling access to files which could be relevant in medical records.\",\"PeriodicalId\":37216,\"journal\":{\"name\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2021-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1080/23799927.2021.1931455\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/23799927.2021.1931455\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Mathematics: Computer Systems Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23799927.2021.1931455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Further potential applications of group theory in information security
Group theory, specifically the combinatorial group theory of finitely presented groups,has been utilized effectively in cryptology. Several new public key cryptosystems have been developed and this has ushered a new area in cryptography called group based cryptography. Braid groups have been suggested as possible platforms and this has led to what is called braid group cryptography. This has also had a profound effect on theoretical group theory as techniques have been found to analyse these group-based cryptosystems.The basic idea is that a finitely presented group can be described by a finite amount of data.This provides techniques to enormously compress and hide information. This suggests that we have only barely scraped the surface of using finitely presented groups for data control, security and storage. For example, we describe a far-reaching extension for controlling access to files which could be relevant in medical records.