Copy Link
Add to Bookmark
Report

CGC Bulletin 31

eZine's profile picture
Published in 
CGC Bulletin
 · 8 months ago

CGC Bulletin 31


Contents

  1. Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol
  2. Constructive membership testing in black-box classical groups
  3. Exponentially generic subsets of groups
  4. Journal of Mathematical Cryptology July 2010, Vol. 4, No. 1
  5. Solving linear equations over finitely generated abelian groups
  6. Quasigroups in cryptology
  7. Genericity of Filling Elements
  8. Reducible braids and Garside theory
  9. Hurwitz equivalences of positive group generators
  10. Series of representations of Thompson's groups $F$ and $T$
  11. The Dehn function of Baumslag's Metabelian Group
  12. The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
  13. Construction of Curtis-Phan-Tits system in black box classical groups
  14. Statistics and compression of scl
  15. A secret sharing scheme using groups
  16. Nielsen equivalence of generating sets for closed surface groups
  17. Length Functions for Semigroup Embeddings
  18. Space functions of groups
  19. Algebraic C(4) and T(4) groups are bi-automatic
  20. A note on the structure of V(6) maps
  21. Search and witness problems in group theory
  22. Basic results on braid groups
  23. The rate of escape on polycyclic and solvable groups
  24. The conjugacy problem is not solvable in automaton groups
  25. Tutorial on the braid groups
  26. Journal of Mathematical Cryptology Vol. 4, No. 2

Regards,

Boaz Tsaban

Bulletin's webpage: http://www.cs.biu.ac.il/~tsaban/CGC/cgc.html

1. Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol

Natalia Mosina, Alexander Ushakov

We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge. In addition, we provide experimental evidence that our approach is practical and can succeed even for groups with no efficiently computable length function such as braid groups. The novelty of this work is that we are not attacking the protocol by trying to solve an underlying complex algebraic problem, namely, the conjugacy search problem, but use a probabilistic approach, instead.

http://arxiv.org/abs/1006.4850

2. Constructive membership testing in black-box classical groups

Sophie Ambrose, Scott H. Murray, Cheryl E. Praeger and Csaba Schneider

The research described in this note aims at solving the constructive membership problem for the class of quasisimple classical groups. Our algorithms are developed in the black-box group model; that is, they do not require specific characteristics of the representations in which the input groups are given. The elements of a black-box group are represented, not necessarily uniquely, as bit strings of uniform length. We assume the existence of oracles to compute the product of two elements, the inverse of an element, and to test if two strings represent the same element. Solving the constructive membership problem for a black-box group $G$ requires to write every element of $G$ as a word in a given generating set. In practice we write the elements of $G$ as straight-line programs (SLPs) which can be viewed as a compact way of writing words.

http://arxiv.org/abs/1006.5858

3. Exponentially generic subsets of groups

Robert Gilman, Alexei Miasnikov, Denis Osin

In this paper we study the generic, i.e., typical, behavior of finitely generated subgroups of hyperbolic groups and also the generic behavior of the word problem for amenable groups. We show that a random set of elements of a nonelementary word hyperbolic group is very likely to be a set of free generators for a nicely embedded free subgroup. We also exhibit some finitely presented amenable groups for which the restriction of the word problem is unsolvable on every sufficiently large subset of words.

http://arxiv.org/abs/1007.0552

4. Journal of Mathematical Cryptology July 2010, Vol. 4, No. 1

Factor-4 and 6 compression of cyclotomic subgroups of and Koray Karabina

The monodromy pairing and discrete logarithm on the Jacobian of finite graphs Farbod Shokrieh

Common modulus attacks on small private exponent RSA and some fast variants (in practice) M. Jason Hinek and Charles C.Y. Lam

5. Solving linear equations over finitely generated abelian groups

Ren\'e Hartung

We discuss various methods and their effectiveness for solving linear equations over finitely generated abelian groups. More precisely, if $\varphi\colon G\to H$ is a homomorphism of finitely generated abelian groups and $b\in H$, we discuss various algorithms for checking whether $b\in \im\varphi$ holds and if so, for computing a pre-image of $b$ in $G$ together with the kernel of $\varphi$.

http://arxiv.org/abs/1007.2477

6. Quasigroups in cryptology

V.A. Shcherbacov

We give a review of some known published applications of quasigroups in cryptology.

http://arxiv.org/abs/1007.3572

7. Genericity of Filling Elements

Brent B. Solie

An element of a finitely generated non-Abelian free group F(X) is said to be filling if that element has positive translation length in every very small action of F(X) on an $\mathbb{R}$-tree. We give a proof that the set of filling elements of F(X) is exponentially F(X)-generic in the sense of Arzhantseva and Ol'shanskii. We also provide an algebraic sufficient condition for an element to be filling and show that there exists an exponentially F(X)-generic subset of filling elements whose membership problem is solvable in linear time.

http://arxiv.org/abs/1007.4022

8. Reducible braids and Garside theory

Juan Gonzalez-Meneses and Bert Wiest

We show that reducible braids which are, in a Garside-theoretical sense, as simple as possible within their conjugacy class, are also as simple as possible in a geometric sense. More precisely, if a braid belongs to a certain subset of its conjugacy class which we call the stabilized set of sliding circuits, an if it is reducible, then its reducibility is geometrically obvious: it has a round or almost round reducing curve. Moreover, for any given braid, an element of its stabilized set of sliding circuits can be found using the well-known cyclic sliding operation. This leads to a polynomial time algorithm for deciding the Nielsen-Thurston type of any braid, modulo one well-known conjecture on the speed of convergence of the cyclic sliding operation.

http://arxiv.org/abs/1008.0238

9. Hurwitz equivalences of positive group generators

Tetsuya Ito

For a positively presented group G, we provide a criterion for two tuples of positive group generators of G to be Hurwitz equivalent or Hurwitz-conjugation equivalent. We also present an algorithmic approach to solve the Hurwitz equivalence and the Hurwitz search problems by using (complete) positive group presentations. These methods can be applied to study a braid monodromy.

http://arxiv.org/abs/1008.1383

10. Series of representations of Thompson's groups $F$ and $T$

{\L}ukasz Garncarek

We define series of representations of the Thompson's groups $F$ and $T$. We show that they are irreducible and classify them up to unitary equivalence.

http://arxiv.org/abs/1008.1275

11. The Dehn function of Baumslag's Metabelian Group

Martin Kassabov and Tim Riley

Baumslag's group is a finitely presented metabelian group with a Z \wr Z subgroup. There is an analogue with an additional torsion relation in which this subgroup becomes C_m \wr Z. We prove that Baumslag's group has an exponential Dehn function. This contrasts with the torsion analogues which have quadratic Dehn functions.

http://arxiv.org/abs/1008.1966

12. The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks

Hang Dinh, Cris Moore, Alexander Russell

Quantum computers can break the RSA and El Gamal public-key cryptosystems, since they can factor integers and extract discrete logarithms. If we believe that quantum computers will someday become a reality, we would like to have \emph{post-quantum} cryptosystems which can be implemented today with classical computers, but which will remain secure even in the presence of quantum attacks.

In this article we show that the McEliece cryptosystem over rational Goppa codes resists precisely the attacks to which the RSA and El Gamal cryptosystems are vulnerable---namely, those based on generating and measuring coset states. This eliminates the approach of strong Fourier sampling on which almost all known exponential speedups by quantum algorithms are based. Specifically, we show that the natural case of the Hidden Subgroup Problem to which the McEliece cryptosystem reduces cannot be solved by strong Fourier sampling, or by any measurement of a coset state. We start with recent negative results on quantum algorithms for Graph Isomorphism, which are based on particular subgroups of size two, and extend them to subgroups of arbitrary structure, including the automorphism groups of Goppa codes. This allows us to obtain the first rigorous results on the security of the McEliece cryptosystem in the face of quantum adversaries, strengthening its candidacy for post-quantum cryptography. Additionally, we establish a variant of a conjecture of Kempe and Shalev on the subgroups of $S_n$ that can be efficiently reconstructed by quantum Fourier sampling.

http://arxiv.org/abs/1008.2390

13. Construction of Curtis-Phan-Tits system in black box classical groups

Alexandre Borovik and Sukru Yalcinkaya

We present a polynomial time Monte-Carlo algorithm for finite simple black box classical groups of odd characteristic which constructs all root ${\rm{SL}}_2(q)$-subgroups associated with the nodes of the extended Dynkin diagram of the corresponding algebraic group.

http://arxiv.org/abs/1008.2823

14. Statistics and compression of scl

Danny Calegari, Joseph Maher

In a hyperbolic group, a random word of length $n$ in the commutator subgroup has stable commutator length of order $n/\log{n}$. In any finitely generated group, either stable commutator length vanishes identically, or the result of a random walk of length $n$ conditioned to lie in the commutator subgroup has stable commutator length bounded above by order $n/\log{n}$ and below by order $\sqrt{n}$. The upper bounds are obtained by explicit estimates on random words and random geodesics in free and hyperbolic groups. The lower bounds are obtained from properties of the statistical distribution of values of quasimorphisms. One result we prove of independent interest is a central limit theorem for values of the rotation quasimorphism on random walks in semigroups of homeomorphisms of the circle.

http://arxiv.org/abs/1008.4952

15. A secret sharing scheme using groups

Dimitrios Panagopoulos

In this paper a secret sharing scheme based on the word problem in groups is introduced. The security of the scheme and possible variations are discussed in section 2. The article concludes with the suggestion of two categories of platform groups for the implementation of the scheme.

http://arxiv.org/abs/1009.0026

16. Nielsen equivalence of generating sets for closed surface groups

Larsen Louder

Generating sets for closed surfaces are either reducible or Nielsen equivalent to a standard generating set.

http://arxiv.org/abs/1009.0454

17. Length Functions for Semigroup Embeddings

Tara Davis

Following the work done by Olshanskii for groups, we describe, for a given semigroup $S$, which functions $l : S \rightarrow \mathbb{N}$ can be realized up to equivalence as length functions $g \mapsto |g|_{H}$ by embedding $S$ into a finitely generated semigroup $H$. We also, following the work done by Olshanskii and Sapir, provide a complete description of length functions of a given finitely generated semigroup with enumerable set of relations inside a finitely presented semigroup.

http://arxiv.org/abs/1009.2734

18. Space functions of groups

Alexander Olshanskii

We study the interrelation of space functions of groups and the space complexity of the algorithmic word problem in groups.

http://arxiv.org/abs/1009.3580

19. Algebraic C(4) and T(4) groups are bi-automatic

Uri Weiss

S. Gersten and H. Short have proved that if a group has a presentation which satisfies the algebraic C(4) and T(4) small-cancellation condition then the group is automatic. Their proof contains a gap which we aim to close. To do that we distinguish between algebraic small-cancellation conditions and geometric small cancellation conditions (which are conditions on the van Kampen diagrams). We show that, under certain additional requirements, geometric C(4) and T(4) small-cancellation conditions imply bi-automaticity. The additional requirements include a restriction on the labels of edges in minimal van Kampen diagrams. This, together with the so-called barycentric sub-division method proves the theorem.

http://arxiv.org/abs/1009.5531

20. A note on the structure of V(6) maps

Uri Weiss

The purpose of this note is make Theorem 13 in the article "On Biautomaticity of Non-Homogenous Small-Cancellation Groups" more accessible. Restatements of the theorem already appeared in few of the authors' succeeding works but with no details. We wish in this note to give the necessary details to these restatements.

http://arxiv.org/abs/1009.5545

21. Search and witness problems in group theory

Vladimir Shpilrain

Decision problems are problems of the following nature: given a property P and an object O, find out whether or not the object O has the property P. On the other hand, witness problems are: given a property P and an object O with the property P, find a proof of the fact that O indeed has the property P. On the third hand(?!), search problems are of the following nature: given a property P and an object O with the property P, find something "material" establishing the property P; for example, given two conjugate elements of a group, find a conjugator. In this survey our focus is on various search problems in group theory, including the word search problem, the subgroup membership search problem, the conjugacy search problem, and others.

http://arxiv.org/abs/1010.0382

22. Basic results on braid groups

Juan Gonzalez-Meneses

To appear in Annales Math\'ematiques Blaise Pascal. 45 pages, 11 figures

These are Lecture Notes of a course given by the author at the French-Spanish School "Tresses in Pau", held in Pau (France) in October 2009. It is basically an introduction to distinct approaches and techniques that can be used to show results in braid groups. Using these techniques we provide several proofs of well known results in braid groups, namely the correctness of Artin's presentation, that the braid group is torsion free, or that its center is generated by the full twist. We also recall some solutions of the word and conjugacy problems, and that roots of a braid are always conjugate. We also describe the centralizer of a given braid. Most proofs are classical ones, using modern terminology. I have chosen those which I find simpler or more beautiful.

http://arxiv.org/abs/1010.0321

23. The rate of escape on polycyclic and solvable groups

Russ Thompson

We show that the expected distance of a random walk from the origin behaves like n^{1/2} for a class of Abelian-by-cyclic groups. This class contains both polycyclic and non-polycyclic groups; in particular, Sol and the Baumslag-Solitar groups BS(1,q). We also show that there are non-Abelian-by-cyclic polycyclic groups with random walks whose expected distance from the origin behaves like n^{1/2} by considering subgroup distortion in such groups. In addition, we prove a law of iterated logarithm on these groups.

http://arxiv.org/abs/1010.0983

24. Presenting parabolic subgroups

Fran\c{c}ois Dahmani and Vincent Guirardel

Consider a relatively hyperbolic group G. We prove that if G is finitely presented, so are its parabolic subgroups. Moreover, a presentation of the parabolic subgroups can be found algorithmically from a presentation of G, a solution of its word problem, and generating sets of the parabolic subgroups. We also give an algorithm that finds parabolic subgroups in a given recursively enumerable class of groups.

http://arxiv.org/abs/1010.1083

25. The conjugacy problem is not solvable in automaton groups

Zoran Sunic, Enric Ventura

(Free-abelian)-by-free, self-similar groups generated by finite self-similar sets of tree automorphisms that have unsolvable conjugacy problem are constructed. Along the way, orbit undecidable, free subgroups of GL_d(Z), for d > 5, and Aut(F_d), for d > 4 are constructed as well.

http://arxiv.org/abs/1010.1993

26. Tutorial on the braid groups

Dale Rolfsen

This is an introduction to the braid groups, as presented in the summer school and workshop on braid groups at the National University of Singapore in June 2007.

http://arxiv.org/abs/1010.4051

27. Journal of Mathematical Cryptology Vol. 4, No. 2

On secret sharing schemes, matroids and polymatroids
Jaume Mart?-Farr? and Carles Padr?

The power of primes: security of authentication based on a universal hash-function family
Basel Alomair, Andrew Clark, and Radha Poovendran

Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
Natalia Mosina and Alexander Ushakov

On the asymptotic effectiveness of Weil descent attacks
Koray Karabina, Alfred Menezes, Carl Pomerance, and Igor E. Shparlinski

The discrete logarithm problem modulo one: cryptanalysing the Ariffin–Abu cryptosystem
Simon R. Blackburn

http://www.reference-global.com/toc/jmc/2010/4/2?ai=10i&ui=ng6&af=H

---

END OF ISSUE

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT