首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
Memory-saving computation of the pairing final exponentiation on BN curves BN曲线上配对最终幂的内存节省计算
Q4 MATHEMATICS Pub Date : 2016-05-01 DOI: 10.1515/gcc-2016-0006
S. Duquesne, Loubna Ghammam
Abstract Tate pairing computation is made of two steps. The first one, the Miller loop, is an exponentiation in the group of points of an elliptic curve. The second one, the final exponentiation, is an exponentiation in the multiplicative group of a large finite field extension. In this paper, we describe and improve efficient methods for computing the hardest part of this second step for the most popular curves in pairing-based cryptography, namely Barreto–Naehrig curves. We present the methods given in the literature and their complexities. However, the necessary memory resources are not always given whereas it is an important constraint in restricted environments for practical implementations. Therefore, we determine the memory resources required by these known methods and we present new variants which require less memory resources (up to 37 %). Moreover, some of these new variants are providing algorithms which are also more efficient than the original ones.
摘要Tate配对计算分为两个步骤。第一个是米勒环,它是椭圆曲线点群的幂次幂。第二个,最后的幂次,是一个大有限域扩展的乘法群中的幂次。在本文中,我们描述并改进了对基于配对的密码学中最流行的曲线,即Barreto-Naehrig曲线,计算第二步最难部分的有效方法。我们提出了文献中给出的方法及其复杂性。然而,必要的内存资源并不总是给定的,而在实际实现的受限环境中,这是一个重要的约束。因此,我们确定了这些已知方法所需的内存资源,并提出了需要更少内存资源(高达37%)的新变体。此外,其中一些新变体提供的算法也比原始算法更有效。
{"title":"Memory-saving computation of the pairing final exponentiation on BN curves","authors":"S. Duquesne, Loubna Ghammam","doi":"10.1515/gcc-2016-0006","DOIUrl":"https://doi.org/10.1515/gcc-2016-0006","url":null,"abstract":"Abstract Tate pairing computation is made of two steps. The first one, the Miller loop, is an exponentiation in the group of points of an elliptic curve. The second one, the final exponentiation, is an exponentiation in the multiplicative group of a large finite field extension. In this paper, we describe and improve efficient methods for computing the hardest part of this second step for the most popular curves in pairing-based cryptography, namely Barreto–Naehrig curves. We present the methods given in the literature and their complexities. However, the necessary memory resources are not always given whereas it is an important constraint in restricted environments for practical implementations. Therefore, we determine the memory resources required by these known methods and we present new variants which require less memory resources (up to 37 %). Moreover, some of these new variants are providing algorithms which are also more efficient than the original ones.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"27 1","pages":"75 - 90"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77759698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The automorphism group of a finitely generated virtually abelian group 有限生成虚阿贝尔群的自同构群
Q4 MATHEMATICS Pub Date : 2016-05-01 DOI: 10.1515/gcc-2016-0007
B. Eick
Abstract We describe a practical algorithm to compute the automorphism group of a finitely generated virtually abelian group. As application, we describe the automorphism groups of some small-dimensional crystallographic groups.
摘要给出了一种计算有限生成虚阿贝尔群的自同构群的实用算法。作为应用,我们描述了一些小维晶体群的自同构群。
{"title":"The automorphism group of a finitely generated virtually abelian group","authors":"B. Eick","doi":"10.1515/gcc-2016-0007","DOIUrl":"https://doi.org/10.1515/gcc-2016-0007","url":null,"abstract":"Abstract We describe a practical algorithm to compute the automorphism group of a finitely generated virtually abelian group. As application, we describe the automorphism groups of some small-dimensional crystallographic groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"100 1","pages":"35 - 45"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79297509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On irreducible algebraic sets over linearly ordered semilattices 关于线性有序半格上的不可约代数集
Q4 MATHEMATICS Pub Date : 2016-01-15 DOI: 10.1515/gcc-2016-0014
A. Shevlyakov
Abstract Equations over linearly ordered semilattices are studied. For any equation t ⁢ ( X ) = s ⁢ ( X ) ${t(X)=s(X)}$ we find irreducible components of its solution set and compute the average number of irreducible components of all equations in n variables.
研究了线性有序半格上的方程。对于任意方程t¹(X)=s²(X) ${t(X)=s(X)}$,我们找到其解集的不可约分量,并计算所有方程n个变量的不可约分量的平均数。
{"title":"On irreducible algebraic sets over linearly ordered semilattices","authors":"A. Shevlyakov","doi":"10.1515/gcc-2016-0014","DOIUrl":"https://doi.org/10.1515/gcc-2016-0014","url":null,"abstract":"Abstract Equations over linearly ordered semilattices are studied. For any equation t ⁢ ( X ) = s ⁢ ( X ) ${t(X)=s(X)}$ we find irreducible components of its solution set and compute the average number of irreducible components of all equations in n variables.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"187 - 195"},"PeriodicalIF":0.0,"publicationDate":"2016-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77206902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups 广义Heisenberg群中受限共轭问题的PTIME解
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0003
Kenneth R. Blaney, Andrey Nikolaev
Abstract We examine the Anshel–Anshel–Goldfeld key exchange protocol with a generalized Heisenberg group, Hm, as a platform. We show that subgroup-restricted simultaneous conjugacy search problem in Hm can be solved in quasi-quintic time, which allows the computation of the private keys of the parties.
摘要以广义Heisenberg群Hm为平台,研究了anshell - anshell - goldfeld密钥交换协议。我们证明了在拟五次时间内可以解决Hm中子群限制的同时共轭搜索问题,该问题允许计算各方的私钥。
{"title":"A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups","authors":"Kenneth R. Blaney, Andrey Nikolaev","doi":"10.1515/gcc-2016-0003","DOIUrl":"https://doi.org/10.1515/gcc-2016-0003","url":null,"abstract":"Abstract We examine the Anshel–Anshel–Goldfeld key exchange protocol with a generalized Heisenberg group, Hm, as a platform. We show that subgroup-restricted simultaneous conjugacy search problem in Hm can be solved in quasi-quintic time, which allows the computation of the private keys of the parties.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"32 1","pages":"69 - 74"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73798441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Faster Ate pairing computation on Selmer's model of elliptic curves 椭圆曲线Selmer模型的快速配对计算
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0005
Emmanuel Fouotsa, Abdoul Aziz Ciss
Abstract This paper revisits the computation of pairings on a model of elliptic curve called Selmer curves. We extend the work of Zhang, Wang, Wang and Ye [17] to the computation of other variants of the Tate pairing on this curve. Especially, we show that the Selmer model of an elliptic curve presents faster formulas for the computation of the Ate and optimal Ate pairings with respect to Weierstrass elliptic curves. We show how to parallelise the computation of these pairings and we obtained very fast results. We also present an example of optimal pairing on a pairing-friendly Selmer curve of embedding degree k = 12.
摘要本文重新研究了椭圆曲线Selmer曲线模型上的配对计算。我们将Zhang, Wang, Wang和Ye[17]的工作推广到该曲线上Tate对的其他变体的计算。特别地,我们证明了椭圆曲线的Selmer模型提供了关于weerstrass椭圆曲线的Ate和最优Ate配对的更快的计算公式。我们展示了如何并行化这些配对的计算,我们得到了非常快的结果。我们还给出了嵌入度k = 12的配对友好型Selmer曲线上最优配对的一个例子。
{"title":"Faster Ate pairing computation on Selmer's model of elliptic curves","authors":"Emmanuel Fouotsa, Abdoul Aziz Ciss","doi":"10.1515/gcc-2016-0005","DOIUrl":"https://doi.org/10.1515/gcc-2016-0005","url":null,"abstract":"Abstract This paper revisits the computation of pairings on a model of elliptic curve called Selmer curves. We extend the work of Zhang, Wang, Wang and Ye [17] to the computation of other variants of the Tate pairing on this curve. Especially, we show that the Selmer model of an elliptic curve presents faster formulas for the computation of the Ate and optimal Ate pairings with respect to Weierstrass elliptic curves. We show how to parallelise the computation of these pairings and we obtained very fast results. We also present an example of optimal pairing on a pairing-friendly Selmer curve of embedding degree k = 12.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"48 1","pages":"55 - 67"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80606506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A parallel evolutionary approach to solving systems of equations in polycyclic groups 求解多环群方程组的平行进化方法
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0012
M. J. Craven, D. Robertz
Abstract The Anshel–Anshel–Goldfeld (AAG) key exchange protocol is based upon the multiple conjugacy problem for a finitely-presented group. The hardness in breaking this protocol relies on the supposed difficulty in solving the corresponding equations for the conjugating element in the group. Two such protocols based on polycyclic groups as a platform were recently proposed and were shown to be resistant to length-based attack. In this article we propose a parallel evolutionary approach which runs on multicore high-performance architectures. The approach is shown to be more efficient than previous attempts to break these protocols, and also more successful. Comprehensive data of experiments run with a GAP implementation are provided and compared to the results of earlier length-based attacks. These demonstrate that the proposed platform is not as secure as first thought and also show that existing measures of cryptographic complexity are not optimal. A more accurate alternative measure is suggested. Finally, a linear algebra attack for one of the protocols is introduced.
摘要AAG (anshell - anshell - goldfeld)密钥交换协议是基于有限呈现群的多重共轭问题。打破这一协议的困难在于假定求解群中共轭元素的相应方程的困难。最近提出了两种基于多环群作为平台的协议,并证明它们能够抵抗基于长度的攻击。在本文中,我们提出了一种运行在多核高性能架构上的并行进化方法。该方法被证明比以前试图破坏这些协议的尝试更有效,也更成功。提供了使用GAP实现运行的实验的综合数据,并与早期基于长度的攻击的结果进行了比较。这些表明,所提出的平台并不像最初想象的那样安全,也表明现有的加密复杂性度量并不是最优的。提出了一种更准确的替代方法。最后,介绍了其中一种协议的线性代数攻击。
{"title":"A parallel evolutionary approach to solving systems of equations in polycyclic groups","authors":"M. J. Craven, D. Robertz","doi":"10.1515/gcc-2016-0012","DOIUrl":"https://doi.org/10.1515/gcc-2016-0012","url":null,"abstract":"Abstract The Anshel–Anshel–Goldfeld (AAG) key exchange protocol is based upon the multiple conjugacy problem for a finitely-presented group. The hardness in breaking this protocol relies on the supposed difficulty in solving the corresponding equations for the conjugating element in the group. Two such protocols based on polycyclic groups as a platform were recently proposed and were shown to be resistant to length-based attack. In this article we propose a parallel evolutionary approach which runs on multicore high-performance architectures. The approach is shown to be more efficient than previous attempts to break these protocols, and also more successful. Comprehensive data of experiments run with a GAP implementation are provided and compared to the results of earlier length-based attacks. These demonstrate that the proposed platform is not as secure as first thought and also show that existing measures of cryptographic complexity are not optimal. A more accurate alternative measure is suggested. Finally, a linear algebra attack for one of the protocols is introduced.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"44 1","pages":"109 - 125"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75099513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factoring multi-power RSA moduli with primes sharing least or most significant bits 质数共享最小有效位或最高有效位的多幂RSA模的分解
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0002
Omar Akchiche, O. Khadir
Abstract We study the factorization of a balanced multi-power RSA moduli N = prq when the unknown primes p and q share t least or most significant bits. We show that if t ≥ 1/(1+r)log p, then it is possible to compute the prime decomposition of N in polynomial time in log N. This result can be used to mount attacks against several cryptographic protocols that are based on the moduli N.
摘要研究了未知素数p和未知素数q共享最小有效位或最高有效位时平衡多幂RSA模N = prq的分解问题。我们证明,如果t≥1/(1+r)log p,则可以在log N的多项式时间内计算N的素数分解。这个结果可用于对基于模N的几种加密协议进行攻击。
{"title":"Factoring multi-power RSA moduli with primes sharing least or most significant bits","authors":"Omar Akchiche, O. Khadir","doi":"10.1515/gcc-2016-0002","DOIUrl":"https://doi.org/10.1515/gcc-2016-0002","url":null,"abstract":"Abstract We study the factorization of a balanced multi-power RSA moduli N = prq when the unknown primes p and q share t least or most significant bits. We show that if t ≥ 1/(1+r)log p, then it is possible to compute the prime decomposition of N in polynomial time in log N. This result can be used to mount attacks against several cryptographic protocols that are based on the moduli N.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"27 1","pages":"47 - 54"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74168414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computing discrete logarithms using 𝒪((log q)2) operations from {+,-,×,÷,&} 用{+,-,x,÷,&}的操作计算离散对数((log q)2)
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0009
C. Schridde
Abstract Given a computational model with registers of unlimited size that is equipped with the set { + , - , × , ÷ , & } = : 𝖮𝖯 ${{+,-,times,div,&}=:mathsf{OP}}$ of unit cost operations, and given a safe prime number q, we present the first explicit algorithm that computes discrete logarithms in ℤ q * ${mathbb{Z}^{*}_{q}}$ to a base g using only 𝒪 ⁢ ( ( log ⁡ q ) 2 ) ${mathcal{O}((log q)^{2})}$ operations from 𝖮𝖯 ${mathsf{OP}}$ . For a random n-bit prime number q, the algorithm is successful as long as the subgroup of ℤ q * ${mathbb{Z}^{*}_{q}}$ generated by g and the subgroup generated by the element p = 2 ⌊ log 2 ⁡ ( q ) ⌋ ${p=2^{lfloorlog_{2}(q)rfloor}}$ share a subgroup of size at least 2 ( 1 - 𝒪 ⁢ ( log ⁡ n / n ) ) ⁢ n ${2^{(1-mathcal{O}(log n/n))n}}$ .
摘要:给定一个具有无限大小的寄存器的计算模型,该模型具有单位成本运算的{+,-,x, ÷, &} =:𝖮𝖯${{+,-,times,div,&}=:mathsf{OP}}$,并给定一个安全素数q,我们给出了第一个明确的算法,该算法仅使用𝖮𝖯${mathsf{OP}}$的操作中∑((log∑q) 2) ${mathcal{O}((log q)^{2})}$,就可以计算出在∑q * ${mathbb{Z}^{*}_{q}}$到一个基底g的离散对数。对于一个随机的n位素数q,只要由g生成的子群(q * ${mathbb{Z}^{*}_{q}}$)和由元素p = 2生成的子群(⌊log 2 (q)⌋)${p=2^{lfloorlog_{2}(q)rfloor}}$)共享一个大小至少为2 (1 - ≠(log n / n))≠n ${2^{(1-mathcal{O}(log n/n))n}}$的子群,该算法就是成功的。
{"title":"Computing discrete logarithms using 𝒪((log q)2) operations from {+,-,×,÷,&}","authors":"C. Schridde","doi":"10.1515/gcc-2016-0009","DOIUrl":"https://doi.org/10.1515/gcc-2016-0009","url":null,"abstract":"Abstract Given a computational model with registers of unlimited size that is equipped with the set { + , - , × , ÷ , & } = : 𝖮𝖯 ${{+,-,times,div,&}=:mathsf{OP}}$ of unit cost operations, and given a safe prime number q, we present the first explicit algorithm that computes discrete logarithms in ℤ q * ${mathbb{Z}^{*}_{q}}$ to a base g using only 𝒪 ⁢ ( ( log ⁡ q ) 2 ) ${mathcal{O}((log q)^{2})}$ operations from 𝖮𝖯 ${mathsf{OP}}$ . For a random n-bit prime number q, the algorithm is successful as long as the subgroup of ℤ q * ${mathbb{Z}^{*}_{q}}$ generated by g and the subgroup generated by the element p = 2 ⌊ log 2 ⁡ ( q ) ⌋ ${p=2^{lfloorlog_{2}(q)rfloor}}$ share a subgroup of size at least 2 ( 1 - 𝒪 ⁢ ( log ⁡ n / n ) ) ⁢ n ${2^{(1-mathcal{O}(log n/n))n}}$ .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"107 - 91"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76714815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authenticated commutator key agreement protocol 认证换向器密钥协议协议
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0011
A. Ushakov
Abstract The original commutator key agreement (CKA) protocol is a two party anonymous key agreement protocol invented by I. Anshel, M. Anshel and D. Goldfeld. In this paper we propose a modification of the CKA protocol with mutual authentication without introducing any additional computational assumptions. In addition, we propose a new zero-knowledge Feige–Fiat–Shamir-type authentication protocol.
原始交换器密钥协议(CKA)协议是由I. Anshel、M. Anshel和D. Goldfeld发明的一种双方匿名密钥协议。在本文中,我们在不引入任何额外的计算假设的情况下,提出了一种具有相互认证的CKA协议的修改。此外,我们还提出了一种新的零知识Feige-Fiat-Shamir-type认证协议。
{"title":"Authenticated commutator key agreement protocol","authors":"A. Ushakov","doi":"10.1515/gcc-2016-0011","DOIUrl":"https://doi.org/10.1515/gcc-2016-0011","url":null,"abstract":"Abstract The original commutator key agreement (CKA) protocol is a two party anonymous key agreement protocol invented by I. Anshel, M. Anshel and D. Goldfeld. In this paper we propose a modification of the CKA protocol with mutual authentication without introducing any additional computational assumptions. In addition, we propose a new zero-knowledge Feige–Fiat–Shamir-type authentication protocol.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"89 1","pages":"127 - 133"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79392315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generic case complexity of the Graph Isomorphism Problem 图同构问题的一般情形复杂度
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0008
G. A. Noskov, A. Rybalov
Abstract The edge test is a partial algorithm for the Graph Isomorphism Problem based on comparison the number of edges. We perform a probabilistic analysis of the efficiency of the edge test. With the binomial distribution B(n,p) on the set of inputs, we estimate the asymptotic failure probability of the edge test depending on the rate of decay of parameter p. In particular, if p ≤ 1/2, np → λ > 0, then the asymptotic failure probability is nonzero, so that the edge test does not solve generically the Graph Isomorphism Problem. On the other hand, if p ≤ 1/2, np → ∞, then the failure set is negligible and the edge test generically solves the Graph Isomorphism Problem in polynomial time.
摘要边检验是一种基于边数比较的图同构问题的部分算法。我们对边缘测试的效率进行了概率分析。对于输入集上的二项分布B(n,p),我们根据参数p的衰减率估计了边检验的渐近失效概率。特别地,当p≤1/2,np→λ > 0时,则边检验的渐近失效概率不为零,使得边检验不一般地解决图同构问题。另一方面,当p≤1/2,np→∞时,则故障集可以忽略,边检验一般在多项式时间内解决图同构问题。
{"title":"Generic case complexity of the Graph Isomorphism Problem","authors":"G. A. Noskov, A. Rybalov","doi":"10.1515/gcc-2016-0008","DOIUrl":"https://doi.org/10.1515/gcc-2016-0008","url":null,"abstract":"Abstract The edge test is a partial algorithm for the Graph Isomorphism Problem based on comparison the number of edges. We perform a probabilistic analysis of the efficiency of the edge test. With the binomial distribution B(n,p) on the set of inputs, we estimate the asymptotic failure probability of the edge test depending on the rate of decay of parameter p. In particular, if p ≤ 1/2, np → λ > 0, then the asymptotic failure probability is nonzero, so that the edge test does not solve generically the Graph Isomorphism Problem. On the other hand, if p ≤ 1/2, np → ∞, then the failure set is negligible and the edge test generically solves the Graph Isomorphism Problem in polynomial time.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"4 1","pages":"20 - 9"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80330258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1