Public Key Protocol Based on Amalgamated Free Product
نویسندگان
چکیده
In the spirit of Diffie Hellman the concept of a protocol algebra is introduced using certain amalgamated free product of Braid group (B) and Thompson group (T ) together with a nilpotent subgroup H of index 2
منابع مشابه
Exactness of Reduced Amalgamated Free Product C {algebras
Some completely positive maps on reduced amalgamated free products of C∗–algebras are constructed, showing that every reduced amalgamated free product of exact C∗–algebras is exact. Consequently, every amalgamated free product of exact discrete groups is exact.
متن کاملAmalgamated Free Product over Cartan Subalgebra
Amalgamated free products of von Neumann algebras were first used by S. Popa ([26]) to construct an irreducible inclusion of (non-AFD) type II1 factors with an arbitrary (admissible) Jones index. Further investigation in this direction was made by K. Dykema ([10]) and F. Rădulescu ([27, 29]) based on Voiculescu’s powerful machine ([40, 41, 44]), and F. Boca ([4]) discussed the Haagerup approxim...
متن کاملOn Embeddings of Full Amalgamated Free Product C∗–algebras
An embedding question for full (i.e. universal) amalgamated free products of C∗–algebras is raised, and solved in part. This is used to give a necessary and sufficient condition for the full amalgamated free product of finite dimensional C∗–algebras to be residually finite dimensional.
متن کاملA Functional Cryptosystem Using a Group Action
Many public-key cryptosystems depend on the difficulty of solving a few specific problems such as finding the prime factorization of a composite number and the discrete logarithm problem. While the existing systems depending on the hardness of these problems are considered secure, there is still deep concern about the security of these systems. Shor [8]invented a fast algorithm for prime factor...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1105.1086 شماره
صفحات -
تاریخ انتشار 2011