Home Some applications of arithmetic groups in cryptography
Article
Licensed
Unlicensed Requires Authentication

Some applications of arithmetic groups in cryptography

  • Delaram Kahrobaei EMAIL logo and Keivan Mallahi-Karai ORCID logo
Published/Copyright: April 17, 2019
Become an author with De Gruyter Brill

Abstract

In this paper, we will offer a new symmetric-key cryptographic scheme which is based on the existence of exponentially distorted subgroups in arithmetic groups. Aside from this, we will also provide new examples of distorted subgroups in SLn([x]) which can be utilized for the same purpose.

MSC 2010: 11F06; 11T71; 22E40

Funding source: Office of Naval Research

Award Identifier / Grant number: N00014-15-1-2164

Award Identifier / Grant number: CCF-1564968

Funding statement: Delaram Kahrobaei is partially supported by a PSC-CUNY grant from the CUNY Research Foundation, the City Tech Foundation, and ONR (Office of Naval Research) grant N00014-15-1-2164. Delaram Kahrobaei has also partially supported by an NSF travel grant CCF-1564968 to IHP in Paris.

References

[1] I. Anshel, M. Anshel and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett. 6 (1999), no. 3–4, 287–291. 10.4310/MRL.1999.v6.n3.a3Search in Google Scholar

[2] E. Artin, Theory of braids, Ann. of Math. (2) 48 (1947), 101–126. 10.2307/1969218Search in Google Scholar

[3] G. Baumslag, B. Fine and X. Xu, Cryptosystems using linear groups, Appl. Algebra Engrg. Comm. Comput. 17 (2006), no. 3–4, 205–217. 10.1007/s00200-006-0003-zSearch in Google Scholar

[4] A. Borel, Introduction aux groupes arithmétiques, Hermann, Paris, 1969. Search in Google Scholar

[5] B. Cavallo, G. Di Crescenzo, D. Kahrobaei and V. Shpilrain, Efficient and secure delegation of group exponentiation to a single server, Radio Frequency Identification—RFIDsec 2015, Lecture Notes in Comput. Sci. 9440, Springer, Cham (2015), 156–173. 10.1007/978-3-319-24837-0_10Search in Google Scholar

[6] I. Chatterji, D. Kahrobaei and N. Y. Lu, Cryptosystems using subgroup distortion, Theoret. Appl. Inform. 29 (2017), 14–24. 10.20904/291-2014Search in Google Scholar

[7] G. Di Crescenzo, D. Kahrobaei, M. Khodjaeva and V. Shpilrain, Efficient and secure delegation to a single malicious server: Exponentiation over non-abelian groups, Mathematical Software—ICMS 2018, Lecture Notes in Comput. Sci. 10931, Springer, Cham (2018), 137–146. 10.1007/978-3-319-96418-8_17Search in Google Scholar

[8] K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J.-s. Kang and C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology—CRYPTO 2000, Lecture Notes in Comput. Sci. 1880, Springer, Berlin (2000), 166–183. 10.1007/3-540-44598-6_10Search in Google Scholar

[9] A. Lubotzky, S. Mozes and M. S. Raghunathan, The word and Riemannian metrics on lattices of semisimple groups, Publ. Math. Inst. Hautes Études Sci. (2000), no. 91, 5–53. 10.1007/BF02698740Search in Google Scholar

[10] G. A. Margulis, Discrete Subgroups of Semisimple Lie Groups, Ergeb. Math. Grenzgeb. (3) 17, Springer, Berlin, 1991. 10.1007/978-3-642-51445-6Search in Google Scholar

[11] T. R. Riley, Navigating in the Cayley graphs of SLN() and SLN(𝔽p), Geom. Dedicata 113 (2005), 215–229. 10.1007/s10711-005-5230-0Search in Google Scholar

[12] A. A. Suslin, The structure of the special linear group over rings of polynomials, Izv. Akad. Nauk SSSR Ser. Mat. 41 (1977), no. 2, 235–252, 477. 10.1070/IM1977v011n02ABEH001709Search in Google Scholar

Received: 2018-03-16
Published Online: 2019-04-17
Published in Print: 2019-05-01

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 27.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/gcc-2019-2002/html
Scroll to top button