Journal of Computer and Communications

Volume 4, Issue 12 (October 2016)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

Cryptographic Protocols Based on Nielsen Transformations

HTML  XML Download Download as PDF (Size: 770KB)  PP. 63-107  
DOI: 10.4236/jcc.2016.412004    1,531 Downloads   2,418 Views  Citations

ABSTRACT

We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F.

Share and Cite:

Fine, B. , Moldenhauer, A. and Rosenberger, G. (2016) Cryptographic Protocols Based on Nielsen Transformations. Journal of Computer and Communications, 4, 63-107. doi: 10.4236/jcc.2016.412004.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.