首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
Cryptanalysis of a combinatorial public key cryptosystem 组合公钥密码系统的密码分析
Q4 MATHEMATICS Pub Date : 2017-01-17 DOI: 10.1515/gcc-2017-0013
V. Roman’kov
Abstract We discuss pitfalls in the security of the combinatorial public key cryptosystem based on Nielsen transformations inspired by the ElGamal cryptosystem proposed by Fine, Moldenhauer and Rosenberger. We introduce three different types of attacks to possible combinatorial public key encryption schemes and apply these attacks to the scheme corresponding to the cryptosystem under discussion. As a result of our observation, we show that under some natural assumptions the scheme is vulnerable to at least one of the proposed attacks.
摘要本文讨论了受Fine、Moldenhauer和Rosenberger提出的ElGamal密码系统启发的基于Nielsen变换的组合公钥密码系统的安全性缺陷。我们对可能的组合公钥加密方案介绍了三种不同类型的攻击,并将这些攻击应用于所讨论的密码系统对应的方案。我们的观察结果表明,在一些自然假设下,该方案容易受到至少一种所提出的攻击。
{"title":"Cryptanalysis of a combinatorial public key cryptosystem","authors":"V. Roman’kov","doi":"10.1515/gcc-2017-0013","DOIUrl":"https://doi.org/10.1515/gcc-2017-0013","url":null,"abstract":"Abstract We discuss pitfalls in the security of the combinatorial public key cryptosystem based on Nielsen transformations inspired by the ElGamal cryptosystem proposed by Fine, Moldenhauer and Rosenberger. We introduce three different types of attacks to possible combinatorial public key encryption schemes and apply these attacks to the scheme corresponding to the cryptosystem under discussion. As a result of our observation, we show that under some natural assumptions the scheme is vulnerable to at least one of the proposed attacks.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"39 1","pages":"125 - 135"},"PeriodicalIF":0.0,"publicationDate":"2017-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80848723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A remark on spherical equations in free metabelian groups 自由亚系群中球方程的一个注释
Q4 MATHEMATICS Pub Date : 2017-01-17 DOI: 10.1515/gcc-2017-0012
E. Timoshenko
Abstract I. Lysenok and A. Ushakov proved that the Diophantine problem for spherical quadric equations in free metabelian groups is solvable. The present paper proves this result by using the Magnus embedding.
I. Lysenok和A. Ushakov证明了自由亚谢群中球面二次方程的Diophantine问题是可解的。本文利用Magnus嵌入证明了这一结果。
{"title":"A remark on spherical equations in free metabelian groups","authors":"E. Timoshenko","doi":"10.1515/gcc-2017-0012","DOIUrl":"https://doi.org/10.1515/gcc-2017-0012","url":null,"abstract":"Abstract I. Lysenok and A. Ushakov proved that the Diophantine problem for spherical quadric equations in free metabelian groups is solvable. The present paper proves this result by using the Magnus embedding.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"2018 1","pages":"155 - 158"},"PeriodicalIF":0.0,"publicationDate":"2017-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87799832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generic hardness of the Boolean satisfiability problem 布尔可满足问题的一般硬度
Q4 MATHEMATICS Pub Date : 2017-01-12 DOI: 10.1515/gcc-2017-0008
A. Rybalov
Abstract It follows from the famous result of Cook about the NP-completeness of the Boolean satisfiability problem that there is no polynomial algorithm for this problem if P ≠ N ⁢ P {Pneq NP} . In this paper, we prove that the Boolean satisfiability problem remains computationally hard on polynomial strongly generic subsets of formulas provided P ≠ N ⁢ P {Pneq NP} and P = B ⁢ P ⁢ P {P=BPP} . Boolean formulas are represented in the natural way by labeled binary trees.
摘要由Cook关于布尔可满足问题的NP完备性的著名结论得出,当P≠N≠P {Pneq NP}时,该问题不存在多项式算法。本文证明了在给定P≠N≠P {Pneq NP}和P=B≠P≠P {P=BPP}的多项式强泛型子集上,布尔可满足性问题在计算上仍然是困难的。布尔公式是用标记二叉树自然表示的。
{"title":"Generic hardness of the Boolean satisfiability problem","authors":"A. Rybalov","doi":"10.1515/gcc-2017-0008","DOIUrl":"https://doi.org/10.1515/gcc-2017-0008","url":null,"abstract":"Abstract It follows from the famous result of Cook about the NP-completeness of the Boolean satisfiability problem that there is no polynomial algorithm for this problem if P ≠ N ⁢ P {Pneq NP} . In this paper, we prove that the Boolean satisfiability problem remains computationally hard on polynomial strongly generic subsets of formulas provided P ≠ N ⁢ P {Pneq NP} and P = B ⁢ P ⁢ P {P=BPP} . Boolean formulas are represented in the natural way by labeled binary trees.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"9 1","pages":"151 - 154"},"PeriodicalIF":0.0,"publicationDate":"2017-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78493494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The isomorphism problem for torsion free nilpotent groups of Hirsch length at most 5 长度不超过5的无扭转幂零群的同构问题
Q4 MATHEMATICS Pub Date : 2017-01-01 DOI: 10.1515/gcc-2017-0004
B. Eick, Ann-Kristin Engel
Abstract We consider the isomorphism problem for the finitely generated torsion free nilpotent groups of Hirsch length at most five. We show how this problem translates to solving an explicitly given set of polynomial equations. Based on this, we introduce a canonical form for each isomorphism type of finitely generated torsion free nilpotent group of Hirsch length at most 5 and, using a variation of our methods, we give an explicit description of its automorphisms.
摘要研究了长度不超过5的有限生成无扭转幂零群的同构问题。我们将展示如何将这个问题转化为求解一组显式给定的多项式方程。在此基础上,我们引入了每一个有限生成的最长为5的无扭转幂零群的同构类型的标准形式,并利用我们的方法的一种变体,给出了它的自同构的显式描述。
{"title":"The isomorphism problem for torsion free nilpotent groups of Hirsch length at most 5","authors":"B. Eick, Ann-Kristin Engel","doi":"10.1515/gcc-2017-0004","DOIUrl":"https://doi.org/10.1515/gcc-2017-0004","url":null,"abstract":"Abstract We consider the isomorphism problem for the finitely generated torsion free nilpotent groups of Hirsch length at most five. We show how this problem translates to solving an explicitly given set of polynomial equations. Based on this, we introduce a canonical form for each isomorphism type of finitely generated torsion free nilpotent group of Hirsch length at most 5 and, using a variation of our methods, we give an explicit description of its automorphisms.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"9 1","pages":"55 - 75"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72769953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pseudo-free families of finite computational elementary abelian p-groups 有限计算初等阿贝尔p群的无伪族
Q4 MATHEMATICS Pub Date : 2017-01-01 DOI: 10.1515/gcc-2017-0001
M. Anokhin
Abstract We initiate the study of (weakly) pseudo-free families of computational elementary abelian p-groups, where p is an arbitrary fixed prime. We restrict ourselves to families of computational elementary abelian p-groups G d {G_{d}} such that for every index d, each element of G d {G_{d}} is represented by a single bit string of length polynomial in the length of d. First, we prove that pseudo-freeness and weak pseudo-freeness for families of computational elementary abelian p-groups are equivalent. Second, we give some necessary and sufficient conditions for a family of computational elementary abelian p-groups to be pseudo-free (provided that at least one of two additional conditions holds). Third, we establish some necessary and sufficient conditions for the existence of pseudo-free families of computational elementary abelian p-groups.
研究了计算初等阿贝尔p群的(弱)伪自由族,其中p是任意固定素数。我们将自己限制在计算初等阿贝尔p群G d {G_{d}}的族上,使得对于每一个指标d, G d {G_{d}}的每一个元素都由d的长度为多项式的单比特串表示。首先,我们证明了计算初等阿贝尔p群族的伪自由和弱伪自由是等价的。其次,我们给出了一类计算初等阿贝尔p群是伪自由的一些充分必要条件(前提是两个附加条件中至少有一个成立)。第三,建立了计算初等阿贝尔p群的无伪族存在的充分必要条件。
{"title":"Pseudo-free families of finite computational elementary abelian p-groups","authors":"M. Anokhin","doi":"10.1515/gcc-2017-0001","DOIUrl":"https://doi.org/10.1515/gcc-2017-0001","url":null,"abstract":"Abstract We initiate the study of (weakly) pseudo-free families of computational elementary abelian p-groups, where p is an arbitrary fixed prime. We restrict ourselves to families of computational elementary abelian p-groups G d {G_{d}} such that for every index d, each element of G d {G_{d}} is represented by a single bit string of length polynomial in the length of d. First, we prove that pseudo-freeness and weak pseudo-freeness for families of computational elementary abelian p-groups are equivalent. Second, we give some necessary and sufficient conditions for a family of computational elementary abelian p-groups to be pseudo-free (provided that at least one of two additional conditions holds). Third, we establish some necessary and sufficient conditions for the existence of pseudo-free families of computational elementary abelian p-groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"78 1","pages":"1 - 18"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88372391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Log-space conjugacy problem in the Grigorchuk group Grigorchuk群的对数空间共轭问题
Q4 MATHEMATICS Pub Date : 2017-01-01 DOI: 10.1515/gcc-2017-0005
A. Myasnikov, S. Vassileva
Abstract In this paper we prove that the conjugacy problem in the Grigorchuk group Γ has log-space complexity.
摘要本文证明了Grigorchuk群Γ中的共轭问题具有对数空间复杂度。
{"title":"Log-space conjugacy problem in the Grigorchuk group","authors":"A. Myasnikov, S. Vassileva","doi":"10.1515/gcc-2017-0005","DOIUrl":"https://doi.org/10.1515/gcc-2017-0005","url":null,"abstract":"Abstract In this paper we prove that the conjugacy problem in the Grigorchuk group Γ has log-space complexity.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"77 - 85"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90111369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Random nilpotent groups, polycyclic presentations, and Diophantine problems 随机幂零群,多环表示和丢番图问题
Q4 MATHEMATICS Pub Date : 2016-12-08 DOI: 10.1515/gcc-2017-0007
A. Garreta, A. Myasnikov, D. Ovchinnikov
Abstract We introduce a model of random finitely generated, torsion-free, 2-step nilpotent groups (in short, τ 2 {tau_{2}} -groups). To do so, we show that these are precisely the groups with presentation of the form 〈 A , C ∣ [ a i , a j ] = ∏ t = 1 m c t λ t , i , j ( 1 ≤ i < j ≤ n ) , [ A , C ] = [ C , C ] = 1 〉 {langle A,Cmid[a_{i},a_{j}]=prod_{t=1}^{m}c_{t}^{lambda_{t,i,j}}(1leq i
摘要引入了一个随机有限生成、无扭转、2步幂零群(即τ 2 {tau_{2}} -群)的模型。为此,我们表明,恰恰是这些组织的演讲形式< A, C∣[我、j] =∏t = 1 m C tλ,i, j(1≤我< j≤n), [A、C] = [C, C] = 1 >{中期 langle A、C [现代{},现代{j}] = prod_ {t = 1} ^ {m} c_ {t} ^ { lambda_ {t i, j}} (1 leq i < j % leq n), [A、C] = [C, C] = 1 纠正},,={1,…,n}{= {现代{1},点,现代{n} }}和C ={1,…,C m} {C = {c_{1}, 点,c_ {m} }}。因此,可以通过固定a和C来选择一个随机的G,然后随机选择整数λ t,i,j {lambda_{t,i,j}},并且对于某些∑{ ell}, λ t,i,j}≤∑{|lambda_{t,i,j}|leqell}。我们证明如果m≥n - 1≥1 {m 组的n - 1 组1},然后下面保持渐近几乎肯定ℓ→∞{魔法 infty}:戒指ℤ{ mathbb {Z}} e-definable在G / G的丢番图问题是不可判定的,G的最大圈标量ℤ{ mathbb {Z}}, G是不能分解的非阿贝尔群的直积,和Z⁢(G) = < C > {Z (G) = langle C 捕杀}。进一步研究了当Z(G)≤Is (G) {Z(G)leqoperatorname{Is}(G^{prime})}时的情形。最后,我们引入了任意幂零阶的随机多环群和随机f.g.幂零群的相似模型。然而,我们很快就会发现,后者也会产生有限群。
{"title":"Random nilpotent groups, polycyclic presentations, and Diophantine problems","authors":"A. Garreta, A. Myasnikov, D. Ovchinnikov","doi":"10.1515/gcc-2017-0007","DOIUrl":"https://doi.org/10.1515/gcc-2017-0007","url":null,"abstract":"Abstract We introduce a model of random finitely generated, torsion-free, 2-step nilpotent groups (in short, τ 2 {tau_{2}} -groups). To do so, we show that these are precisely the groups with presentation of the form 〈 A , C ∣ [ a i , a j ] = ∏ t = 1 m c t λ t , i , j ( 1 ≤ i < j ≤ n ) , [ A , C ] = [ C , C ] = 1 〉 {langle A,Cmid[a_{i},a_{j}]=prod_{t=1}^{m}c_{t}^{lambda_{t,i,j}}(1leq i<j% leq n),,[A,C]=[C,C]=1rangle} , where A = { a 1 , … , a n } {A={a_{1},dots,a_{n}}} and C = { c 1 , … , c m } {C={c_{1},dots,c_{m}}} . Hence, a random G can be selected by fixing A and C, and then randomly choosing integers λ t , i , j {lambda_{t,i,j}} , with | λ t , i , j | ≤ ℓ {|lambda_{t,i,j}|leqell} for some ℓ {ell} . We prove that if m ≥ n - 1 ≥ 1 {mgeq n-1geq 1} , then the following hold asymptotically almost surely as ℓ → ∞ {elltoinfty} : the ring ℤ {mathbb{Z}} is e-definable in G, the Diophantine problem over G is undecidable, the maximal ring of scalars of G is ℤ {mathbb{Z}} , G is indecomposable as a direct product of non-abelian groups, and Z ⁢ ( G ) = 〈 C 〉 {Z(G)=langle Crangle} . We further study when Z ⁢ ( G ) ≤ Is ⁡ ( G ′ ) {Z(G)leqoperatorname{Is}(G^{prime})} . Finally, we introduce similar models of random polycyclic groups and random f.g. nilpotent groups of any nilpotency step, possibly with torsion. We quickly see, however, that the latter yields finite groups a.a.s.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"129 1","pages":"115 - 99"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77257657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Conjugacy search problem and the Andrews–Curtis conjecture 共轭搜索问题与Andrews-Curtis猜想
Q4 MATHEMATICS Pub Date : 2016-09-01 DOI: 10.1515/gcc-2019-2005
Dmitry Panteleev, A. Ushakov
Abstract We develop new computational methods for studying potential counterexamples to the Andrews–Curtis conjecture, in particular, Akbulut–Kurby examples AK ⁡ ( n ) {operatorname{AK}(n)} . We devise a number of algorithms in an attempt to disprove the most interesting counterexample AK ⁡ ( 3 ) {operatorname{AK}(3)} . That includes an efficient implementation of the folding procedure for pseudo-conjugacy graphs, based on the original modification of a classic disjoint-set data structure. To improve metric properties of the search space (the set of balanced presentations of the trivial group), we introduce a new transformation, called an ACM-move, that generalizes the original Andrews–Curtis transformations and discuss details of a practical implementation. To reduce growth of the search space, we introduce a strong equivalence relation on balanced presentations and study the space modulo automorphisms of the underlying free group. We prove that automorphism moves can be applied to Akbulut–Kurby presentations. The improved technique allows us to enumerate balanced presentations AC-equivalent to AK ⁡ ( 3 ) {operatorname{AK}(3)} with relations of lengths up to 20 (previous record was 17).
我们开发了新的计算方法来研究Andrews-Curtis猜想的潜在反例,特别是Akbulut-Kurby样例AK (n) {operatorname{AK}(n)}。我们设计了许多算法,试图反驳最有趣的反例AK (3) {operatorname{AK}(3)}。其中包括基于经典不相交集数据结构的原始修改的伪共轭图的折叠过程的有效实现。为了改进搜索空间(平凡群的平衡表示集合)的度量性质,我们引入了一种新的变换,称为ACM-move,它推广了原始的Andrews-Curtis变换,并讨论了实际实现的细节。为了减少搜索空间的增长,我们在平衡表示上引入了强等价关系,并研究了自由群的空间模自同构。我们证明了自同构移动可以应用于Akbulut-Kurby表示。改进的技术允许我们枚举平衡表示ac -等效于AK (3) {operatorname{AK}(3)},其长度关系可达20(之前的记录是17)。
{"title":"Conjugacy search problem and the Andrews–Curtis conjecture","authors":"Dmitry Panteleev, A. Ushakov","doi":"10.1515/gcc-2019-2005","DOIUrl":"https://doi.org/10.1515/gcc-2019-2005","url":null,"abstract":"Abstract We develop new computational methods for studying potential counterexamples to the Andrews–Curtis conjecture, in particular, Akbulut–Kurby examples AK ⁡ ( n ) {operatorname{AK}(n)} . We devise a number of algorithms in an attempt to disprove the most interesting counterexample AK ⁡ ( 3 ) {operatorname{AK}(3)} . That includes an efficient implementation of the folding procedure for pseudo-conjugacy graphs, based on the original modification of a classic disjoint-set data structure. To improve metric properties of the search space (the set of balanced presentations of the trivial group), we introduce a new transformation, called an ACM-move, that generalizes the original Andrews–Curtis transformations and discuss details of a practical implementation. To reduce growth of the search space, we introduce a strong equivalence relation on balanced presentations and study the space modulo automorphisms of the underlying free group. We prove that automorphism moves can be applied to Akbulut–Kurby presentations. The improved technique allows us to enumerate balanced presentations AC-equivalent to AK ⁡ ( 3 ) {operatorname{AK}(3)} with relations of lengths up to 20 (previous record was 17).","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"20 1","pages":"43 - 60"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/gcc-2019-2005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72537561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The status of polycyclic group-based cryptography: A survey and open problems 基于多环群的密码学的现状:综述和开放问题
Q4 MATHEMATICS Pub Date : 2016-07-20 DOI: 10.1515/gcc-2016-0013
Jonathan Gryak, Delaram Kahrobaei
Abstract Polycyclic groups are natural generalizations of cyclic groups but with more complicated algorithmic properties. They are finitely presented and the word, conjugacy, and isomorphism decision problems are all solvable in these groups. Moreover, the non-virtually nilpotent ones exhibit an exponential growth rate. These properties make them suitable for use in group-based cryptography, which was proposed in 2004 by Eick and Kahrobaei [10]. Since then, many cryptosystems have been created that employ polycyclic groups. These include key exchanges such as non-commutative ElGamal, authentication schemes based on the twisted conjugacy problem, and secret sharing via the word problem. In response, heuristic and deterministic methods of cryptanalysis have been developed, including the length-based and linear decomposition attacks. Despite these efforts, there are classes of infinite polycyclic groups that remain suitable for cryptography. The analysis of algorithms for search and decision problems in polycyclic groups has also been developed. In addition to results for the aforementioned problems we present those concerning polycyclic representations, group morphisms, and orbit decidability. Though much progress has been made, many algorithmic and complexity problems remain unsolved; we conclude with a number of them. Of particular interest is to show that cryptosystems using infinite polycyclic groups are resistant to cryptanalysis on a quantum computer.
多环群是环群的自然推广,但具有更复杂的算法性质。它们是有限表示的,并且词、共轭和同构决策问题在这些组中都是可解的。此外,非几乎零幂的粒子表现出指数增长率。这些属性使它们适合用于基于组的密码学,这是由Eick和Kahrobaei在2004年提出的[10]。从那时起,已经创建了许多使用多环群的密码系统。其中包括密钥交换(如非交换的ElGamal)、基于扭曲共轭问题的身份验证方案以及通过单词问题进行秘密共享。因此,人们开发了启发式和确定性的密码分析方法,包括基于长度的攻击和线性分解攻击。尽管有这些努力,仍然有一些无限多环群仍然适合于密码学。对多环群中搜索和决策问题的算法分析也得到了发展。除了上述问题的结果外,我们还提出了有关多环表示、群态和轨道可决性的结果。尽管取得了很大进展,但许多算法和复杂性问题仍未解决;我们以其中的一些作为结束。特别感兴趣的是证明使用无限多环群的密码系统可以抵抗量子计算机上的密码分析。
{"title":"The status of polycyclic group-based cryptography: A survey and open problems","authors":"Jonathan Gryak, Delaram Kahrobaei","doi":"10.1515/gcc-2016-0013","DOIUrl":"https://doi.org/10.1515/gcc-2016-0013","url":null,"abstract":"Abstract Polycyclic groups are natural generalizations of cyclic groups but with more complicated algorithmic properties. They are finitely presented and the word, conjugacy, and isomorphism decision problems are all solvable in these groups. Moreover, the non-virtually nilpotent ones exhibit an exponential growth rate. These properties make them suitable for use in group-based cryptography, which was proposed in 2004 by Eick and Kahrobaei [10]. Since then, many cryptosystems have been created that employ polycyclic groups. These include key exchanges such as non-commutative ElGamal, authentication schemes based on the twisted conjugacy problem, and secret sharing via the word problem. In response, heuristic and deterministic methods of cryptanalysis have been developed, including the length-based and linear decomposition attacks. Despite these efforts, there are classes of infinite polycyclic groups that remain suitable for cryptography. The analysis of algorithms for search and decision problems in polycyclic groups has also been developed. In addition to results for the aforementioned problems we present those concerning polycyclic representations, group morphisms, and orbit decidability. Though much progress has been made, many algorithmic and complexity problems remain unsolved; we conclude with a number of them. Of particular interest is to show that cryptosystems using infinite polycyclic groups are resistant to cryptanalysis on a quantum computer.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"5 1","pages":"171 - 186"},"PeriodicalIF":0.0,"publicationDate":"2016-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72938907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Knapsack problem for nilpotent groups 幂零群的背包问题
Q4 MATHEMATICS Pub Date : 2016-06-28 DOI: 10.1515/gcc-2017-0006
A. Mishchenko, A. Treier
Abstract In this work we investigate the group version of the well known knapsack problem in the class of nilpotent groups. The main result of this paper is that the knapsack problem is undecidable for any torsion-free group of nilpotency class 2 if the rank of the derived subgroup is at least 316. Also, we extend our result to certain classes of polycyclic groups, linear groups, and nilpotent groups of nilpotency class greater than or equal to 2.
摘要本文研究了幂零群中著名的背包问题的群版本。本文的主要结果是,对于任何幂零2类的无扭转群,如果所导出的子群的秩至少为316,则背包问题是不可判定的。并将所得结果推广到若干类多环群、线性群和幂零类大于或等于2的幂零群。
{"title":"Knapsack problem for nilpotent groups","authors":"A. Mishchenko, A. Treier","doi":"10.1515/gcc-2017-0006","DOIUrl":"https://doi.org/10.1515/gcc-2017-0006","url":null,"abstract":"Abstract In this work we investigate the group version of the well known knapsack problem in the class of nilpotent groups. The main result of this paper is that the knapsack problem is undecidable for any torsion-free group of nilpotency class 2 if the rank of the derived subgroup is at least 316. Also, we extend our result to certain classes of polycyclic groups, linear groups, and nilpotent groups of nilpotency class greater than or equal to 2.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"20 1","pages":"87 - 98"},"PeriodicalIF":0.0,"publicationDate":"2016-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81777061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1