- Research Article
4
- 10.1515/gcc.2009.51
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Benjamin Fine + 2 more
For many groups the structure of finitely generated subgroups is generically simple. That is with asymptotic density equal to one a randomly chosen finitely generated subgroup has a particular well-known and easily analyzed structure. For example a result of D. B. A. Epstein says that a finitely generated subgroup of GL(n, ℝ) is generically a free group. We say that a group G has the generic free group property if any finitely generated subgroup is generically a free group. Further G has the strong generic free group property if given randomly chosen elements g1, . . . , gn in G then generically they are a free basis for the free subgroup they generate. In this paper we show that for any arbitrary free product of finitely generated infinite groups satisfies the strong generic free group property. There are also extensions to more general amalgams - free products with amalgamation and HNN groups. These results have implications in cryptography. In particular several cryptosystems use random choices of subgroups as hard cryptographic problems. In groups with the generic free group property any such cryptosystem may be attackable by a length based attack.
- Research Article
6
- 10.1515/gcc.2009.261
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Stephen R Lakin + 1 more
This paper is concerned with the question of determining which groups have their word problems lying in a given complexity class. Our main results give sufficient conditions for the existence of groups whose word problem is contained in some specified space complexity class but is not contained in some other given space complexity class.
- Research Article
11
- 10.1515/gcc.2009.33
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Vladimir Shpilrain + 1 more
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property P and the information that there are objects with the property P, find at least one particular object with the property P. So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is. In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. Decision problems are problems of the following nature: given a property P and an object O, find out whether or not the object O has the property P. By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability “very close” to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a “brute force attack”, the “1” or “0” bits in Bob’s binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her “brute force attack” program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob’s sequence.
- Research Article
2
- 10.1515/gcc.2009.287
- Jan 1, 2009
- Groups – Complexity – Cryptology
- C Maclachlan
In [1], Borel discussed discrete arithmetic groups arising from quaternion algebras over number fields with particular reference to arithmetic Kleinian and arithmetic Fuchsian groups. In these cases, he described, in each commensurability class, a class of groups which contains all maximal groups. Developing results on embedding commutative orders of the defining number field into maximal or Eichler orders in the defining quaternion algebra, Chinburg and Friedman [2] stated necessary and sufficient conditions for the existence of torsion in this class of groups in terms of the defining arithmetic data. This was more fully explored in the case of Kleinian groups in [3]. In the case of Fuchsian groups, these results on the existence of torsion were extended to obtain formulas for the number of conjugacy classes of finite cyclic subgroups for each group in this class [8, 9]. In this paper, we examine, across the range of arithmetic Fuchsian groups, how widespread torsion is in maximal Fuchsian groups. Some studies in low genus cases (see e.g. [7, 12]) indicate that 2-torsion is very prevalent. The results obtained here substantiate that but we will also obtain maximal arithmetic Fuchsian groups which are torsion-free. The author is grateful to Alan Reid for conversations on parts of this paper.
- Research Article
4
- 10.1515/gcc.2009.181
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Anthony M Gaglione + 2 more
Ben Fine observed that a theorem of Magnus on normal closures of elements in free groups is first order expressible and thus holds in every elementarily free group. This classical theorem, vintage 1931, asserts that if two elements in a free group have the same normal closure, then either they are conjugate or one is conjugate to the inverse of the other in the free group. An examination of a set of sentences capturing this theorem reveals that the sentences are universal-existential. Consequently the theorem holds in the almost locally free groups of Gaglione and Spellman. We give a sufficient condition for the theorem to hold in every fully residually free group as well as a sufficient condition for the theorem to hold, even more generally, in every residually free group.
- Research Article
24
- 10.1515/gcc.2009.199
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Dima Grigoriev + 1 more
We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter would follow from solving the conjugacy search problem in the platform (noncommutative) semigroup, i.e., to recovering X from X –1 AX and A . The platform semigroup that we suggest here is the semigroup of n × n matrices over truncated multivariable polynomials over a ring.
- Research Article
- 10.1515/gcc.2009.143
- Jan 1, 2009
- Groups – Complexity – Cryptology
- Daniella Bak Shnaps