首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
Group-theoretic orbit decidability 群论轨道可决性
Q4 MATHEMATICS Pub Date : 2014-12-01 DOI: 10.1515/gcc-2014-0012
E. Ventura
Abstract A recent collection of papers in the last years have given a renovated interest to the notion of orbit decidability. This is a new quite general algorithmic notion, connecting with several classical results, and closely related to the study of the conjugacy problem for extensions of groups. In the present survey we explain several of the classical results closely related to this concept, and we explain the main ideas behind the recent connection with the conjugacy problem made by Bogopolski–Martino–Ventura in [Trans. Amer. Math. Soc. 362 (2010), 2003–2036]. All the consequences up to date, published in several other papers by other authors, are also commented and reviewed.
最近几年的一些论文重新引起了人们对轨道可决性概念的兴趣。这是一个新的相当普遍的算法概念,它与几个经典的结果相联系,并与群的扩展共轭问题的研究密切相关。在目前的调查中,我们解释了几个与这个概念密切相关的经典结果,并解释了最近与Bogopolski-Martino-Ventura在[Trans]中提出的共轭问题的联系背后的主要思想。阿米尔。数学。社会科学进展,2003,19(4):332 - 336。所有最新的结果,由其他作者发表在其他几篇论文中,也进行了评论和审查。
{"title":"Group-theoretic orbit decidability","authors":"E. Ventura","doi":"10.1515/gcc-2014-0012","DOIUrl":"https://doi.org/10.1515/gcc-2014-0012","url":null,"abstract":"Abstract A recent collection of papers in the last years have given a renovated interest to the notion of orbit decidability. This is a new quite general algorithmic notion, connecting with several classical results, and closely related to the study of the conjugacy problem for extensions of groups. In the present survey we explain several of the classical results closely related to this concept, and we explain the main ideas behind the recent connection with the conjugacy problem made by Bogopolski–Martino–Ventura in [Trans. Amer. Math. Soc. 362 (2010), 2003–2036]. All the consequences up to date, published in several other papers by other authors, are also commented and reviewed.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"62 1","pages":"133 - 148"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86011882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reflections on some aspects of infinite groups 关于无限群若干方面的思考
Q4 MATHEMATICS Pub Date : 2014-11-01 DOI: 10.1515/gcc-2014-0008
B. Fine, A. Gaglione, G. Rosenberger, D. Spellman
Abstract In this paper we survey and reflect upon several aspects of the theory of infinite finitely generated and finitely presented groups that were originally motivated by work of Gilbert Baumslag. All but the last of the topics we have chosen are all related in one way or another to the theory of limit groups and the solution of the Tarski problems. These include the residually free and fully residually free properties and the big powers condition; Baumslag doubles and extensions of centralizers; residually-𝒳 groups and extensions of results of Benjamin Baumslag and finally the relationship between CT and CSA groups.
摘要本文对无限有限生成和有限呈现群理论的几个方面进行了综述和反思,这些理论最初是由吉尔伯特·鲍姆斯拉格(Gilbert Baumslag)的工作推动的。除了最后一个题目外,我们选择的所有题目都或多或少地与极限群理论和塔斯基问题的解有关。这包括剩余自由和完全剩余自由性质以及大幂次条件;双包渣式和加长式扶正器;残差- f群与Benjamin Baumslag结果的推广,最后给出了CT群与CSA群之间的关系。
{"title":"Reflections on some aspects of infinite groups","authors":"B. Fine, A. Gaglione, G. Rosenberger, D. Spellman","doi":"10.1515/gcc-2014-0008","DOIUrl":"https://doi.org/10.1515/gcc-2014-0008","url":null,"abstract":"Abstract In this paper we survey and reflect upon several aspects of the theory of infinite finitely generated and finitely presented groups that were originally motivated by work of Gilbert Baumslag. All but the last of the topics we have chosen are all related in one way or another to the theory of limit groups and the solution of the Tarski problems. These include the residually free and fully residually free properties and the big powers condition; Baumslag doubles and extensions of centralizers; residually-𝒳 groups and extensions of results of Benjamin Baumslag and finally the relationship between CT and CSA groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"81 - 91"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84133204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the covering number of small symmetric groups and some sporadic simple groups 关于小对称群和一些零星单群的覆盖数
Q4 MATHEMATICS Pub Date : 2014-09-08 DOI: 10.1515/gcc-2016-0010
L. Kappe, Daniela Nikolova-Popova, Eric Swartz
Abstract A set of proper subgroups is a cover for a group if its union is the whole group. The minimal number of subgroups needed to cover G is called the covering number of G, denoted by σ ⁢ ( G ) ${sigma(G)}$ . Determining σ ⁢ ( G ) ${sigma(G)}$ is an open problem for many nonsolvable groups. For symmetric groups S n ${S_{n}}$ , Maróti determined σ ⁢ ( S n ) ${sigma(S_{n})}$ for odd n with the exception of n = 9 ${n=9}$ and gave estimates for n even. In this paper we determine σ ⁢ ( S n ) ${sigma(S_{n})}$ for n = 8 , 9 , 10 , 12 ${n=8,9,10,12}$ . In addition we find the covering number for the Mathieu group M 12 ${M_{12}}$ and improve an estimate given by Holmes for the Janko group J 1 ${J_{1}}$ .
如果群的并集是整群,那么一组适当子群就是群的掩护。覆盖G所需的最小子群数称为G的覆盖数,用σ∑(G) ${sigma(G)}$表示。确定σ _ (G) ${sigma(G)}$是许多不可解群的开放问题。对于对称群S n ${S_{n}}$, Maróti确定了除n=9 ${n=9}$外的奇数n的∑(S n) ${sigma(S_{n})}$,并给出了偶数n的估计。对于n=8,9,10,12 ${n=8,9,10,12}$,我们确定了σ (sn) ${sigma(S_{n})}$。此外,我们找到了Mathieu群M 12 ${M_{12}}$的覆盖数,并改进了Holmes对Janko群J 1 ${J_{1}}$的估计。
{"title":"On the covering number of small symmetric groups and some sporadic simple groups","authors":"L. Kappe, Daniela Nikolova-Popova, Eric Swartz","doi":"10.1515/gcc-2016-0010","DOIUrl":"https://doi.org/10.1515/gcc-2016-0010","url":null,"abstract":"Abstract A set of proper subgroups is a cover for a group if its union is the whole group. The minimal number of subgroups needed to cover G is called the covering number of G, denoted by σ ⁢ ( G ) ${sigma(G)}$ . Determining σ ⁢ ( G ) ${sigma(G)}$ is an open problem for many nonsolvable groups. For symmetric groups S n ${S_{n}}$ , Maróti determined σ ⁢ ( S n ) ${sigma(S_{n})}$ for odd n with the exception of n = 9 ${n=9}$ and gave estimates for n even. In this paper we determine σ ⁢ ( S n ) ${sigma(S_{n})}$ for n = 8 , 9 , 10 , 12 ${n=8,9,10,12}$ . In addition we find the covering number for the Mathieu group M 12 ${M_{12}}$ and improve an estimate given by Holmes for the Janko group J 1 ${J_{1}}$ .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"287 1","pages":"135 - 154"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73571181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Quantum algorithm for discrete logarithm problem for matrices over finite group rings 有限群环上矩阵离散对数问题的量子算法
Q4 MATHEMATICS Pub Date : 2014-05-01 DOI: 10.1515/gcc-2014-0003
A. Myasnikov, A. Ushakov
Abstract. We propose a polynomial time quantum algorithm for solving the discrete logarithm problem (DLP) in matrices over finite group rings. The hardness of this problem was recently employed in the design of a key-exchange protocol proposed by D. Kahrobaei, C. Koupparis and V. Shpilrain [Groups Complex. Cryptol. 5 (2013), 97–115]. Our result implies that the Kahrobaei–Koupparis–Shpilrain protocol does not belong to the realm of post-quantum cryptography.
摘要提出了一种求解有限群环上矩阵离散对数问题的多项式时间量子算法。这个问题的难度最近被用于D. Kahrobaei, C. Koupparis和V. Shpilrain [Groups Complex]提出的密钥交换协议的设计中。密码学,5(2013),97-115。我们的结果表明Kahrobaei-Koupparis-Shpilrain协议不属于后量子密码学领域。
{"title":"Quantum algorithm for discrete logarithm problem for matrices over finite group rings","authors":"A. Myasnikov, A. Ushakov","doi":"10.1515/gcc-2014-0003","DOIUrl":"https://doi.org/10.1515/gcc-2014-0003","url":null,"abstract":"Abstract. We propose a polynomial time quantum algorithm for solving the discrete logarithm problem (DLP) in matrices over finite group rings. The hardness of this problem was recently employed in the design of a key-exchange protocol proposed by D. Kahrobaei, C. Koupparis and V. Shpilrain [Groups Complex. Cryptol. 5 (2013), 97–115]. Our result implies that the Kahrobaei–Koupparis–Shpilrain protocol does not belong to the realm of post-quantum cryptography.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":"31 - 36"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83755146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Group extensions with special properties 将具有特殊属性的扩展分组
Q4 MATHEMATICS Pub Date : 2014-04-16 DOI: 10.1515/gcc-2015-0005
A. Distler, B. Eick
Abstract Given a group G and a G-module A, we show how to determine up to isomorphism the extensions E of A by G so that A embeds as smallest non-trivial term of the derived series or of the lower central series into E.
摘要给定一群G和一个G模a,我们给出了如何确定a与G的扩展E达到同构,使a作为派生级数或下中心级数的最小非平凡项嵌入到E中。
{"title":"Group extensions with special properties","authors":"A. Distler, B. Eick","doi":"10.1515/gcc-2015-0005","DOIUrl":"https://doi.org/10.1515/gcc-2015-0005","url":null,"abstract":"Abstract Given a group G and a G-module A, we show how to determine up to isomorphism the extensions E of A by G so that A embeds as smallest non-trivial term of the derived series or of the lower central series into E.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"61 1","pages":"1 - 10"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80629267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized small cancellation presentations for automatic groups 自动群的广义小消去表示
Q4 MATHEMATICS Pub Date : 2014-01-21 DOI: 10.1515/gcc-2014-0007
R. Gilman
Abstract By a result of Gersten and Short finite presentations satisfying the usual non-metric small cancellation conditions present biautomatic groups. We show that in the case in which all pieces have length 1, a generalization of the C(3)-T(6) condition yields a larger collection of biautomatic groups.
摘要利用Gersten有限表示和Short有限表示的结果,满足通常的非度量小消去条件,得到双自动群。我们证明了在所有片段长度为1的情况下,C(3)-T(6)条件的推广产生了更大的双自动群集合。
{"title":"Generalized small cancellation presentations for automatic groups","authors":"R. Gilman","doi":"10.1515/gcc-2014-0007","DOIUrl":"https://doi.org/10.1515/gcc-2014-0007","url":null,"abstract":"Abstract By a result of Gersten and Short finite presentations satisfying the usual non-metric small cancellation conditions present biautomatic groups. We show that in the case in which all pieces have length 1, a generalization of the C(3)-T(6) condition yields a larger collection of biautomatic groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1978 1","pages":"101 - 93"},"PeriodicalIF":0.0,"publicationDate":"2014-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90267321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Friends and relatives of BS(1,2) BS的亲友(1,2)
Q4 MATHEMATICS Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0006
C. F. Miller III
Algorithms, constructions and examples are of central interest in combinatorial and geometric group theory. Teaching experience and, more recently, preparing a historical essay have led me to think the familiar group BS(1, 2) is an example of fundamental importance. The purpose of this note is to make a case for this point of view.We recall several interesting constructions and important examples of groups related to BS(1, 2), and indicate why certain of these groups played a key role in showing the word problem for nitely presented groups is unsolvable.
算法、构造和实例是组合和几何群论的核心内容。教学经验,以及最近准备一篇历史论文,让我认为熟悉的BS(1,2)组是一个具有根本重要性的例子。这篇笔记的目的是为这一观点做一个论证。我们回顾了几个有趣的结构和与BS相关的组的重要例子(1,2),并指出为什么这些组中的某些组在显示完全呈现的组的单词问题是无法解决的过程中发挥了关键作用。
{"title":"Friends and relatives of BS(1,2)","authors":"C. F. Miller III","doi":"10.1515/gcc-2014-0006","DOIUrl":"https://doi.org/10.1515/gcc-2014-0006","url":null,"abstract":"Algorithms, constructions and examples are of central interest in combinatorial and geometric group theory. Teaching experience and, more recently, preparing a historical essay have led me to think the familiar group BS(1, 2) is an example of fundamental importance. The purpose of this note is to make a case for this point of view.We recall several interesting constructions and important examples of groups related to BS(1, 2), and indicate why certain of these groups played a key role in showing the word problem for nitely presented groups is unsolvable.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"32 1","pages":"73 - 80"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77527001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diophantine cryptography in free metabelian groups: Theoretical base 自由亚元群中的丢番图密码学:理论基础
Q4 MATHEMATICS Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0011
A. Myasnikov, V. Roman’kov
Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.
摘要本文研究了所谓的丢番图密码学(Diophantine cryptoology),它是一种加密方案的集合,其计算安全性假设是基于求解某些丢番图方程的硬度,以及在该领域出现的一些一般思想和技术。特别地,我们研究了群自同态问题的一个有趣的变化,称为双自同态问题。我们证明了这个问题在足够大秩的自由亚群中是不可判定的。我们将这一结果与一些基于群的密码系统的计算安全性假设联系起来。特别地,我们展示了如何改进Grigoriev-Shpilrain协议,得到一个基于双自同态问题的新的计算安全性假设,为安全性提供了更好的理论基础。
{"title":"Diophantine cryptography in free metabelian groups: Theoretical base","authors":"A. Myasnikov, V. Roman’kov","doi":"10.1515/gcc-2014-0011","DOIUrl":"https://doi.org/10.1515/gcc-2014-0011","url":null,"abstract":"Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"60 1","pages":"103 - 120"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84771729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decoy-based information security 基于诱饵的信息安全
Q4 MATHEMATICS Pub Date : 2014-01-01 DOI: 10.1515/gcc-2014-0010
V. Shpilrain
Abstract In this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.
在本调查中,我们讨论了一个新兴的基于诱饵的信息安全概念,或者没有计算假设的安全。特别是,我们将展示如何实现此概念,以便在某些公钥加密协议中提供针对(被动)计算无界对手的安全性。在对称密码学的世界里,基于诱饵的安全性得到了广泛的应用,特别是在将计算委托给另一方的安全方面。我们选择这样一种场景:计算能力有限的一方希望使用RSA协议向计算能力较强的一方发送加密消息,从而在公钥设置中提供另一种诱骗思想的应用。使用典型的RSA参数,基于诱饵的委托计算方法将发送方的效率提高了几个数量级。
{"title":"Decoy-based information security","authors":"V. Shpilrain","doi":"10.1515/gcc-2014-0010","DOIUrl":"https://doi.org/10.1515/gcc-2014-0010","url":null,"abstract":"Abstract In this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"34 1","pages":"149 - 155"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75637955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Palindromic width of wreath products, metabelian groups, and max-n solvable groups 环圈产物、亚元群和最大n可解群的回文宽度
Q4 MATHEMATICS Pub Date : 2013-07-18 DOI: 10.1515/gcc-2014-0009
T. Riley, Andrew W. Sale
Abstract A group has finite palindromic width if there exists n such that every element can be expressed as a product of n or fewer palindromic words. We show that if G has finite palindromic width with respect to some generating set, then so does G≀ℤ r $G wr mathbb {Z}^{r}$ . We also give a new, self-contained proof that finitely generated metabelian groups have finite palindromic width. Finally, we show that solvable groups satisfying the maximal condition on normal subgroups (max-n) have finite palindromic width.
如果有n个元素可以表示为n个或更少的回文词的乘积,则群具有有限回文宽度。我们证明了如果G对于某个发电集具有有限的回文宽度,那么G献祭0 r $G wr mathbb {Z}^{r}$也是如此。我们还给出了有限生成的亚元群具有有限回文宽度的一个新的自包含证明。最后,我们证明了在正规子群(max-n)上满足极大条件的可解群具有有限的回文宽度。
{"title":"Palindromic width of wreath products, metabelian groups, and max-n solvable groups","authors":"T. Riley, Andrew W. Sale","doi":"10.1515/gcc-2014-0009","DOIUrl":"https://doi.org/10.1515/gcc-2014-0009","url":null,"abstract":"Abstract A group has finite palindromic width if there exists n such that every element can be expressed as a product of n or fewer palindromic words. We show that if G has finite palindromic width with respect to some generating set, then so does G≀ℤ r $G wr mathbb {Z}^{r}$ . We also give a new, self-contained proof that finitely generated metabelian groups have finite palindromic width. Finally, we show that solvable groups satisfying the maximal condition on normal subgroups (max-n) have finite palindromic width.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"124 1","pages":"121 - 132"},"PeriodicalIF":0.0,"publicationDate":"2013-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88004798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1