289
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

A cryptographic application of the Thurston norm

, &
Pages 15-24 | Received 13 Aug 2019, Accepted 09 Jan 2020, Published online: 29 Jan 2020

References

  • J.W. Aaber and N. Dunfield, Closed surface bundles of least volume, Algebr. Geom. Topol. 10(4) (2010), pp. 2315–2342. doi: 10.2140/agt.2010.10.2315
  • Y. Algom-Kfir, E. Hironaka and K. Rafi, Digraphs and cycle polynomials for free-by-cyclic groups, Geom. Topol. 19(2) (2015), pp. 1111–1154. doi: 10.2140/gt.2015.19.1111
  • I. Anshel, M. Anshel and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Let. 6 (1999), pp. 287–291. doi: 10.4310/MRL.1999.v6.n3.a3
  • I. Anshel, D. Atkins, D. Goldfeld and P. Gunnells, WalnutDSATM: A quantum resistant group theoretic digital signature algorithm, 2016. Available at https://www.nist.gov/sites/default/files/documents/2016/10/19/atkins-paper-lwc2016.pdf.
  • G. Baumslag, B. Fine and X. Xu, Cryptosystems using linear groups, Appl. Algebra Eng. Comm. Comput. 17 (2006), pp. 205–2017. doi: 10.1007/s00200-006-0003-z
  • J.C. Birget, S.S. Magliveras and M. Sramka, On public-key cryptosystems based on combinatorial group theory, Tatra Mt. Math. Publ. 33 (2006), pp. 137–148.
  • K. Brown, Trees, valuations, and the Bieri-Neumann-Strebel invariant, Inv. Math. 90 (1987), pp. 479–504. doi: 10.1007/BF01389176
  • B. Cavallo and D. Kahrobaei, Secret sharing using the shortlex order and non-commutative groups, Contemp. Math. 633 (2015), pp. 1–8. AMS. doi: 10.1090/conm/633/12646
  • I. Chatterji, D. Kahrobaei and N.Y. Lu, Cryptosystems using subgroup distortion, Theor. Appl. Inform. 29 (2017), pp. 14–24.
  • S. Dowdall, I. Kapovich and C. Leininger, McMullen polynomials and Lipschitz flows for free-by-cyclic groups, J. Eur. Math. Soc. 19(11) (2017), pp. 3253–3353. doi: 10.4171/JEMS/739
  • B. Eick and D. Kahrobaei, Polycyclic groups: A new platform for cryptography, Technical report (60 citations), 2004. Available at http://math.gr/0411077.
  • A. Fathi, F. Laudenbach, V. Poenaru,  Travaux de Thurston sur les surfaces, Séminaire Orsay. Astérisque, pp. 66–67. Société Mathématique de France, Paris, 1979.
  • R. Flores and D. Kahrobaei, Cryptography with right-angled Artin groups, Theor. Appl. Inform. 28(3) (2016), pp. 8–16.
  • R. Flores, D. Kahrobaei and T. Koberda, Algorithmic problems in right-angled Artin groups: complexity and applications, J. Algebra 519 (2019), pp. 111–129. doi: 10.1016/j.jalgebra.2018.10.023
  • J. Gryak and D. Kahrobaei, The status of the polycyclic group-based cryptography: A survey and open problems, Groups Complex. Cryptol. 8 (2016), pp. 171–186. doi: 10.1515/gcc-2016-0013
  • M. Habeeb, D. Kahrobaei, C. Koupparis and V. Shpilrain, Public key exchange using semidirect product of (SEMI) groups, ACNS 2013, Applied Cryptography and Network Security, LNCS Vol. 7954, 2013, pp. 475–486.
  • M. Habeeb, D. Kahrobaei and V. Shpilrain, A secret sharing scheme based on group-presentation and word problem, Contemp. Math. AMS 582 (2012), pp. 143–150. doi: 10.1090/conm/582/11557
  • D. Hart, D.H. Kim, G. Micheli, A Practical Cryptanalysis of WalnutDSA, LNCS, PKC, Rio de Janeiro, 2018.
  • D. Kahrobaei and B. Khan, A Non-Commutative Generalization of the El Gamal Key Exchange using Polycyclic Groups, Proceeding of IEEE, GLOBECOM, 2006, pp. 1–5.
  • D. Kahrobaei and C. Koupparis, Non-commutative digital signatures using non-commutative groups, Groups Complex. Cryptol. 4 (2012), pp. 377–384. doi: 10.1515/gcc-2012-0019
  • D. Kahrobaei and K. Mallahi-Karai, Some applications of arithmetic groups in cryptography, Groups Complex. Cryptol. 11(1) (2019), pp. 1–9. doi: 10.1515/gcc-2019-2002
  • D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi)groups in public key cryptography, Computability in Europe 2016, LNCS 9709, 2016, pp. 132–141.
  • E. Lanneau and F. Valdez, Computing the Teichmüller polynomial, J. Eur. Math. Soc. (JEMS) 19(12) (2017), pp. 3867–3910. doi: 10.4171/JEMS/756
  • C. T. McMullen, Polynomial invariants for fibered 3-manifolds and Teichm¨uller geodesics for foliations, Ann. Sci. Ecole Norm. Sup. 33(4) (2000), pp. 519–560.
  • F. Levy-dit-Vehel, L. Perret, On the Wagner-Magyarik cryptosystem, in Coding and Cryptography, Ø. Ytrehus, ed., LNCS, Vol. 3969, pp. 316–329, Springer, Berlin, 2006.
  • G. Petrides, Cryptanalysis of the public key cryptosystem based on the word problem on the Grigorchuk groups, Cryptography and Coding, 2003, pp. 234–244.
  • V. Roman'kov, An improved version of the AAG cryptographic protocol, Groups Complex. Cryptol. 11 (2019), pp. 35–42.
  • V. Shpilrain, A. Ushakov, Thompson's Group and Public Key Cryptography, ACNS, New York, 2005.
  • V. Shpilrain and G. Zapata, Combinatorial group theory and public key cryptography, Appl. Algebra Engin. 17 (2006), pp. 291–302. doi: 10.1007/s00200-006-0006-9
  • W.P. Thurston, A norm for the homology of 3-manifolds, Mem. Am. Math. Soc. 59(339) (1986), pp. 99–130. i–vi.
  • B. Tsaban, Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography, J. Cryptology 28(3) (2015), pp. 601–622. doi: 10.1007/s00145-013-9170-9
  • N.R. Wagner and M.R. Magyarik, A Public-Key Cryptosystem Based on the Word Problem, in Advances in Cryptology. CRYPTO 1984, G.R. Blakley, D. Chaum, eds., Lecture Notes in Computer Science, Vol. 196, Springer, Berlin, 1985.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.