首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
A class of hash functions based on the algebraic eraser™ 一类基于代数橡皮擦的哈希函数
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0004
Iris Anshel, Derek Atkins, D. Goldfeld, P. Gunnells
Abstract This paper introduces a novel braid based cryptographic hash function candidate which is suitable for use in low resource environments. It is shown that the new hash function performed extremely well on a range of cryptographic test suites.
摘要本文介绍了一种适合于低资源环境下使用的基于辫状结构的候选密码散列函数。结果表明,新的哈希函数在一系列加密测试套件上执行得非常好。
{"title":"A class of hash functions based on the algebraic eraser™","authors":"Iris Anshel, Derek Atkins, D. Goldfeld, P. Gunnells","doi":"10.1515/gcc-2016-0004","DOIUrl":"https://doi.org/10.1515/gcc-2016-0004","url":null,"abstract":"Abstract This paper introduces a novel braid based cryptographic hash function candidate which is suitable for use in low resource environments. It is shown that the new hash function performed extremely well on a range of cryptographic test suites.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"33 1","pages":"1 - 7"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83643975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A nonlinear decomposition attack 非线性分解攻击
Q4 MATHEMATICS Pub Date : 2016-01-01 DOI: 10.1515/gcc-2016-0017
V. Roman’kov
Abstract This paper introduces a new type of attack, termed a nonlinear decomposition attack, against two known group-based key agreement protocols, namely, protocol based on extensions of (semi)groups by endomorphisms introduced by Kahrobaei, Shpilrain et al., and the noncommutative Diffie–Hellman protocol introduced by Ko, Lee et al. This attack works efficiently in the case when finitely generated nilpotent (more generally, polycyclic) groups are used as platforms. This attack is based on a deterministic algorithm that finds the secret shared key from the public data in both the protocols under consideration. Furthermore, we show that in this case one can break the schemes without solving the algorithmic problems on which the assumptions are based. The efficacy of the attack depends on the platform group, so it requires a more thorough analysis in each particular case.
摘要针对Kahrobaei, Shpilrain等人提出的基于自同态的(半)群扩展协议和Ko, Lee等人提出的非交换Diffie-Hellman协议这两种已知的基于群的密钥协议,提出了一种新的攻击类型,称为非线性分解攻击。当使用有限生成的幂零(更普遍的是多环)群作为平台时,这种攻击有效。这种攻击基于一种确定性算法,该算法从所考虑的两种协议中的公共数据中找到秘密共享密钥。此外,我们表明,在这种情况下,可以在不解决假设所基于的算法问题的情况下打破方案。攻击的效果取决于平台组,因此需要对每个特定情况进行更彻底的分析。
{"title":"A nonlinear decomposition attack","authors":"V. Roman’kov","doi":"10.1515/gcc-2016-0017","DOIUrl":"https://doi.org/10.1515/gcc-2016-0017","url":null,"abstract":"Abstract This paper introduces a new type of attack, termed a nonlinear decomposition attack, against two known group-based key agreement protocols, namely, protocol based on extensions of (semi)groups by endomorphisms introduced by Kahrobaei, Shpilrain et al., and the noncommutative Diffie–Hellman protocol introduced by Ko, Lee et al. This attack works efficiently in the case when finitely generated nilpotent (more generally, polycyclic) groups are used as platforms. This attack is based on a deterministic algorithm that finds the secret shared key from the public data in both the protocols under consideration. Furthermore, we show that in this case one can break the schemes without solving the algorithmic problems on which the assumptions are based. The efficacy of the attack depends on the platform group, so it requires a more thorough analysis in each particular case.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"34 1","pages":"197 - 207"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79876598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Key agreement under tropical parallels 热带地区的关键协议
Q4 MATHEMATICS Pub Date : 2015-11-01 DOI: 10.1515/gcc-2015-0013
J. Chauvet, É. Mahé
Abstract A semiring is an algebraic structure satisfying the usual axioms for a not necessarily commutative ring, but without the requirement that addition be invertible. Aside from rings, well-studied instances in cryptographic applications include the Boolean semiring and the tropical semiring. The latter, in particular, behaves to a large extent like a field and exhibits interesting properties in the cryptographic context. This short note explores a GPU-based highly parallel implementation of a protocol recently proposed by Grigoriev and Shpilrain [Comm. Algebra 42 (2014), 2624–2632], in the context of Diffie–Hellman key agreements.
半环是一种代数结构,它不一定满足交换环的一般公理,但不要求加法可逆。除了环之外,密码学应用中得到充分研究的实例还包括布尔半环和热带半环。特别是后者,在很大程度上表现得像一个字段,并在密码学上下文中显示出有趣的特性。这篇短文探讨了Grigoriev和Shpilrain最近在Diffie-Hellman密钥协议的背景下提出的基于gpu的高度并行实现协议[Comm. Algebra 42(2014), 2624-2632]。
{"title":"Key agreement under tropical parallels","authors":"J. Chauvet, É. Mahé","doi":"10.1515/gcc-2015-0013","DOIUrl":"https://doi.org/10.1515/gcc-2015-0013","url":null,"abstract":"Abstract A semiring is an algebraic structure satisfying the usual axioms for a not necessarily commutative ring, but without the requirement that addition be invertible. Aside from rings, well-studied instances in cryptographic applications include the Boolean semiring and the tropical semiring. The latter, in particular, behaves to a large extent like a field and exhibits interesting properties in the cryptographic context. This short note explores a GPU-based highly parallel implementation of a protocol recently proposed by Grigoriev and Shpilrain [Comm. Algebra 42 (2014), 2624–2632], in the context of Diffie–Hellman key agreements.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"20 1","pages":"195 - 198"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87915976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public-key cryptosystem based on invariants of diagonalizable groups 基于可对角群不变量的公钥密码系统
Q4 MATHEMATICS Pub Date : 2015-07-28 DOI: 10.1515/gcc-2017-0003
M. Jurás, F. Marko, A. Zubkov
Abstract We develop a public-key cryptosystem based on invariants of diagonalizable groups and investigate properties of such a cryptosystem first over finite fields, then over number fields and finally over finite rings. We consider the security of these cryptosystem and show that it is necessary to restrict the set of parameters of the system to prevent various attacks (including linear algebra attacks and attacks based on the Euclidean algorithm).
摘要建立了一个基于可对角群不变量的公钥密码系统,研究了该密码系统在有限域、数域和有限环上的性质。我们考虑了这些密码系统的安全性,并表明有必要限制系统的参数集,以防止各种攻击(包括线性代数攻击和基于欧几里得算法的攻击)。
{"title":"Public-key cryptosystem based on invariants of diagonalizable groups","authors":"M. Jurás, F. Marko, A. Zubkov","doi":"10.1515/gcc-2017-0003","DOIUrl":"https://doi.org/10.1515/gcc-2017-0003","url":null,"abstract":"Abstract We develop a public-key cryptosystem based on invariants of diagonalizable groups and investigate properties of such a cryptosystem first over finite fields, then over number fields and finally over finite rings. We consider the security of these cryptosystem and show that it is necessary to restrict the set of parameters of the system to prevent various attacks (including linear algebra attacks and attacks based on the Euclidean algorithm).","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"151 1","pages":"31 - 54"},"PeriodicalIF":0.0,"publicationDate":"2015-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88872899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hydra group doubles are not residually finite 九头蛇群双精度不是剩余有限的
Q4 MATHEMATICS Pub Date : 2015-07-09 DOI: 10.1515/gcc-2016-0015
K. Pueschel
Abstract In 2013, Kharlampovich, Myasnikov, and Sapir constructed the first examples of finitely presented residually finite groups with large Dehn functions. Given any recursive function f, they produce a finitely presented residually finite group with Dehn function dominating f. There are no known elementary examples of finitely presented residually finite groups with super-exponential Dehn function. Dison and Riley’s hydra groups can be used to construct a sequence of groups for which the Dehn function of the kth group is equivalent to the kth Ackermann function. Kharlampovich, Myasnikov, and Sapir asked whether or not these groups are residually finite. We show that these constructions do not produce residually finite groups.
2013年,Kharlampovich, Myasnikov和Sapir构造了具有大Dehn函数的有限呈现剩余有限群的第一个例子。给定任意递归函数f,它们产生一个以Dehn函数支配f的有限呈现剩余有限群。目前还没有已知的具有超指数Dehn函数的有限呈现剩余有限群的初等例子。Dison和Riley的九头蛇群可以用来构造一个群序列,其中第k群的Dehn函数等价于第k群的Ackermann函数。Kharlampovich, Myasnikov和Sapir问这些群是否剩余有限。我们证明了这些构造不会产生剩余有限群。
{"title":"Hydra group doubles are not residually finite","authors":"K. Pueschel","doi":"10.1515/gcc-2016-0015","DOIUrl":"https://doi.org/10.1515/gcc-2016-0015","url":null,"abstract":"Abstract In 2013, Kharlampovich, Myasnikov, and Sapir constructed the first examples of finitely presented residually finite groups with large Dehn functions. Given any recursive function f, they produce a finitely presented residually finite group with Dehn function dominating f. There are no known elementary examples of finitely presented residually finite groups with super-exponential Dehn function. Dison and Riley’s hydra groups can be used to construct a sequence of groups for which the Dehn function of the kth group is equivalent to the kth Ackermann function. Kharlampovich, Myasnikov, and Sapir asked whether or not these groups are residually finite. We show that these constructions do not produce residually finite groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"87 1","pages":"163 - 170"},"PeriodicalIF":0.0,"publicationDate":"2015-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86728200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An application of elementary real analysis to a metabelian group admitting integral polynomial exponents 初等实数分析在含整多项式指数的亚元群中的应用
Q4 MATHEMATICS Pub Date : 2015-05-01 DOI: 10.1515/gcc-2015-0004
A. Gaglione, S. Lipschutz, D. Spellman
Abstract Let G be a free metabelian group of rank r = 2. We introduce a faithful 2×2 real matrix representation of G and extend this to a group G ℤ[θ] $G^{mathbb {Z}[theta ]}$ of 2×2 matrices admitting exponents from the integral polynomial ring ℤ[θ]$mathbb {Z}[theta ]$ . Identifying G with its matrix representation, we show that given γ(θ)∈G ℤ[θ] $gamma (theta )in G^{mathbb {Z}[theta ]}$ and n∈ℤ$nin mathbb {Z}$ , one has that lim θ→n γ(θ)$lim _{theta rightarrow n}gamma (theta )$ exists and lies in G. Furthermore, the maps γ(θ)↦lim θ→n γ(θ)$gamma (theta )mapsto lim _{theta rightarrow n}gamma (theta )$ form a discriminating family of group retractions G ℤ[θ] →G$G^{mathbb {Z}[theta ]}rightarrow G$ as n varies over ℤ. Although not explicitly carried out in this manuscript, it is clear that similar results hold for any countable rank r.
摘要设G为秩为r = 2的自由亚元群。我们引入了G的一个可靠的2×2实矩阵表示,并将其推广到包含整数多项式环(0 [θ] $mathbb {Z}[theta ]$)指数的2×2矩阵群G G [θ] $G^{mathbb {Z}[theta ]}$。用矩阵表示G,证明了给定γ(θ)∈G G [θ] $gamma (theta )in G^{mathbb {Z}[theta ]}$和n∈n $nin mathbb {Z}$,可以证明lim θ→n γ(θ) $lim _{theta rightarrow n}gamma (theta )$存在并且在G中。并且,当n在n上变化时,映射γ(θ)∑lim θ→n γ(θ) $gamma (theta )mapsto lim _{theta rightarrow n}gamma (theta )$形成了一个群缩回的判别族G G [θ]→G $G^{mathbb {Z}[theta ]}rightarrow G$。虽然在本文中没有明确地进行,但很明显,类似的结果适用于任何可数秩r。
{"title":"An application of elementary real analysis to a metabelian group admitting integral polynomial exponents","authors":"A. Gaglione, S. Lipschutz, D. Spellman","doi":"10.1515/gcc-2015-0004","DOIUrl":"https://doi.org/10.1515/gcc-2015-0004","url":null,"abstract":"Abstract Let G be a free metabelian group of rank r = 2. We introduce a faithful 2×2 real matrix representation of G and extend this to a group G ℤ[θ] $G^{mathbb {Z}[theta ]}$ of 2×2 matrices admitting exponents from the integral polynomial ring ℤ[θ]$mathbb {Z}[theta ]$ . Identifying G with its matrix representation, we show that given γ(θ)∈G ℤ[θ] $gamma (theta )in G^{mathbb {Z}[theta ]}$ and n∈ℤ$nin mathbb {Z}$ , one has that lim θ→n γ(θ)$lim _{theta rightarrow n}gamma (theta )$ exists and lies in G. Furthermore, the maps γ(θ)↦lim θ→n γ(θ)$gamma (theta )mapsto lim _{theta rightarrow n}gamma (theta )$ form a discriminating family of group retractions G ℤ[θ] →G$G^{mathbb {Z}[theta ]}rightarrow G$ as n varies over ℤ. Although not explicitly carried out in this manuscript, it is clear that similar results hold for any countable rank r.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"13 1","pages":"59 - 68"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84531997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On convex hulls and the quasiconvex subgroups of Fm×ℤn 关于fmx的凸包和拟凸子群
Q4 MATHEMATICS Pub Date : 2015-05-01 DOI: 10.1515/gcc-2015-0006
Jordan Sahattchieve
Abstract In this paper, we explore a method for forming the convex hull of a subset in a uniquely geodesic metric space due to Brunn and use it to show that with respect to the usual action of Fm×ℤn on Tree ×ℝ n ${mathrm {Tree}times mathbb {R}^n}$ , every quasiconvex subgroup of Fm×ℤn is convex. Further, we show that the Cartan–Hadamard theorem can be used to show that locally convex subsets of complete and connected CAT(0) spaces are convex. Finally, we show that the quasiconvex subgroups of Fm×ℤn are precisely those of the form A×B, where A≤F m ${Ale F_m}$ is finitely generated, and B≤ℤ n ${Ble mathbb {Z}^n}$ .
摘要本文探讨了在唯一测地度量空间中由于Brunn而形成子集凸包的一种方法,并利用该方法证明了关于fmx - (n)在Tree x - (n) ${ mathm {Tree}乘以mathbb {R}^n}$上的通常作用,fmx - (n) n的所有拟凸子群都是凸的。进一步,我们证明了Cartan-Hadamard定理可以用来证明完备连通CAT(0)空间的局部凸子集是凸的。最后,我们证明了fmx _ (n) n的拟凸子群是A×B形式的拟凸子群,其中A≤F m ${Ale F_m}$是有限生成的,并且B≤n ${Ble mathbb {Z}^n}$。
{"title":"On convex hulls and the quasiconvex subgroups of Fm×ℤn","authors":"Jordan Sahattchieve","doi":"10.1515/gcc-2015-0006","DOIUrl":"https://doi.org/10.1515/gcc-2015-0006","url":null,"abstract":"Abstract In this paper, we explore a method for forming the convex hull of a subset in a uniquely geodesic metric space due to Brunn and use it to show that with respect to the usual action of Fm×ℤn on Tree ×ℝ n ${mathrm {Tree}times mathbb {R}^n}$ , every quasiconvex subgroup of Fm×ℤn is convex. Further, we show that the Cartan–Hadamard theorem can be used to show that locally convex subsets of complete and connected CAT(0) spaces are convex. Finally, we show that the quasiconvex subgroups of Fm×ℤn are precisely those of the form A×B, where A≤F m ${Ale F_m}$ is finitely generated, and B≤ℤ n ${Ble mathbb {Z}^n}$ .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"17 1","pages":"69 - 80"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82313848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Symmetries of finite graphs and homology 有限图的对称性与同调
Q4 MATHEMATICS Pub Date : 2015-05-01 DOI: 10.1515/gcc-2015-0003
Benjamin Atchison, E. Turner
Abstract A finite symmetric graph Γ is a pair (Γ,f)$(Gamma ,f)$ , where Γ is a finite graph and f:Γ→Γ$f:Gamma rightarrow Gamma $ is a graph self equivalence or automorphism. We develop several tools for studying such symmetries. In particular, we describe in detail all symmetries with a single edge orbit, we prove that each symmetric graph has a maximal forest that meets each edge orbit in a sequential set of edges – a sequential maximal forest – and we calculate the characteristic polynomial χ f (t)$chi _f(t)$ and the minimal polynomial μ f (t)$mu _f(t)$ of the linear map H 1 (f):H 1 (Γ,ℤ)→H 1 (Γ,ℤ)$H_1(f):H_1(Gamma ,mathbb {Z})rightarrow H_1(Gamma ,mathbb {Z})$ . The calculation is in terms of the quotient graph Γ ¯$overline{Gamma }$ .
有限对称图Γ是一对(Γ,f) $(Gamma ,f)$,其中Γ是一个有限图,f:Γ→Γ $f:Gamma rightarrow Gamma $是一个图的自等价或自同构。我们开发了一些工具来研究这种对称性。特别地,我们详细地描述了具有单个边轨道的所有对称,我们证明了每个对称图都有一个满足序列边集中的每个边轨道的极大森林-一个序列极大森林-我们计算了线性映射h1 (f)的特征多项式χ f (t) $chi _f(t)$和最小多项式μ f (t) $mu _f(t)$: h1 (Γ, 0)→h1 (Γ, 0) $H_1(f):H_1(Gamma ,mathbb {Z})rightarrow H_1(Gamma ,mathbb {Z})$。计算是根据商图Γ¯$overline{Gamma }$。
{"title":"Symmetries of finite graphs and homology","authors":"Benjamin Atchison, E. Turner","doi":"10.1515/gcc-2015-0003","DOIUrl":"https://doi.org/10.1515/gcc-2015-0003","url":null,"abstract":"Abstract A finite symmetric graph Γ is a pair (Γ,f)$(Gamma ,f)$ , where Γ is a finite graph and f:Γ→Γ$f:Gamma rightarrow Gamma $ is a graph self equivalence or automorphism. We develop several tools for studying such symmetries. In particular, we describe in detail all symmetries with a single edge orbit, we prove that each symmetric graph has a maximal forest that meets each edge orbit in a sequential set of edges – a sequential maximal forest – and we calculate the characteristic polynomial χ f (t)$chi _f(t)$ and the minimal polynomial μ f (t)$mu _f(t)$ of the linear map H 1 (f):H 1 (Γ,ℤ)→H 1 (Γ,ℤ)$H_1(f):H_1(Gamma ,mathbb {Z})rightarrow H_1(Gamma ,mathbb {Z})$ . The calculation is in terms of the quotient graph Γ ¯$overline{Gamma }$ .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"102 1","pages":"11 - 30"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78174503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithmic recognition of quasipositive 4-braids of algebraic length three 代数长度为3的拟正4辫的算法识别
Q4 MATHEMATICS Pub Date : 2015-04-24 DOI: 10.1515/gcc-2015-0012
S. Orevkov
Abstract We give an algorithm to decide whether a given braid with four strings is a product of three factors which are conjugates of standard generators of the braid group. The algorithm is of polynomial time. It is based on the Garside theory. We give also a polynomial algorithm to decide if a given braid with any number of strings is a product of two factors which are conjugates of given powers of the standard generators (in my previous paper this problem was solved without polynomial estimates).
摘要给出了一种判定给定的四串编织是否是编织群标准生成子共轭的三个因子乘积的算法。该算法是多项式时间的。它基于Garside理论。我们还给出了一个多项式算法来确定给定的任意数量的字符串的辫是否是两个因子的乘积,这两个因子是标准生成器的给定幂的共轭(在我之前的论文中,这个问题没有多项式估计就解决了)。
{"title":"Algorithmic recognition of quasipositive 4-braids of algebraic length three","authors":"S. Orevkov","doi":"10.1515/gcc-2015-0012","DOIUrl":"https://doi.org/10.1515/gcc-2015-0012","url":null,"abstract":"Abstract We give an algorithm to decide whether a given braid with four strings is a product of three factors which are conjugates of standard generators of the braid group. The algorithm is of polynomial time. It is based on the Garside theory. We give also a polynomial algorithm to decide if a given braid with any number of strings is a product of two factors which are conjugates of given powers of the standard generators (in my previous paper this problem was solved without polynomial estimates).","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"26 1","pages":"157 - 173"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89752754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Thompson's group F is 1-counter graph automatic 汤普森的F组是1计数器自动图
Q4 MATHEMATICS Pub Date : 2015-01-18 DOI: 10.1515/gcc-2016-0001
M. Elder, J. Taback
Abstract It is not known whether Thompson's group F is automatic. With the recent extensions of the notion of an automatic group to graph automatic by Kharlampovich, Khoussainov and Miasnikov and then to 𝒞-graph automatic by the authors, a compelling question is whether F is graph automatic or 𝒞-graph automatic for an appropriate language class 𝒞. The extended definitions allow the use of a symbol alphabet for the normal form language, replacing the dependence on generating set. In this paper we construct a 1-counter graph automatic structure for F based on the standard infinite normal form for group elements.
Thompson的F群是否为自动的尚不清楚。随着最近由Kharlampovich, Khoussainov和Miasnikov将自动群的概念扩展到图形自动,然后由作者扩展到𝒞-graph自动,一个引人注目的问题是,对于适当的语言类来说,F是图形自动的还是𝒞-graph自动的?扩展的定义允许对范式语言使用符号字母表,取代对生成集的依赖。本文基于群元的标准无限范式,构造了F的1-计数器图自动结构。
{"title":"Thompson's group F is 1-counter graph automatic","authors":"M. Elder, J. Taback","doi":"10.1515/gcc-2016-0001","DOIUrl":"https://doi.org/10.1515/gcc-2016-0001","url":null,"abstract":"Abstract It is not known whether Thompson's group F is automatic. With the recent extensions of the notion of an automatic group to graph automatic by Kharlampovich, Khoussainov and Miasnikov and then to 𝒞-graph automatic by the authors, a compelling question is whether F is graph automatic or 𝒞-graph automatic for an appropriate language class 𝒞. The extended definitions allow the use of a symbol alphabet for the normal form language, replacing the dependence on generating set. In this paper we construct a 1-counter graph automatic structure for F based on the standard infinite normal form for group elements.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"113 1","pages":"21 - 33"},"PeriodicalIF":0.0,"publicationDate":"2015-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73940623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1