Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t...Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.展开更多
It is proved that neither G9(Q) nor G11(Q) is a subgroup of K2(Q)which confirms two special cases of a conjecture proposed by Browkin, J. (LectureNotes in Math., 966, Springer-Verlag, New York, Heidelberg, Berlin, 198...It is proved that neither G9(Q) nor G11(Q) is a subgroup of K2(Q)which confirms two special cases of a conjecture proposed by Browkin, J. (LectureNotes in Math., 966, Springer-Verlag, New York, Heidelberg, Berlin, 1982, 1-6).展开更多
is the disjoint union of for all , where is the set of all roots of primitive second degree equations , with reduced discriminant equal to k2m. We study the action of two Hecke groups—the full modular group and the g...is the disjoint union of for all , where is the set of all roots of primitive second degree equations , with reduced discriminant equal to k2m. We study the action of two Hecke groups—the full modular group and the group of linear-fractional transformations on . In particular, we investigate the action of on for finding different orbits.展开更多
基金supported by National Natural Science Foundation of China No.61003262,National Natural Science Foundation of China No.60873237Doctoral Fund of Ministry of Education of China No.20070007071
文摘Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.
文摘It is proved that neither G9(Q) nor G11(Q) is a subgroup of K2(Q)which confirms two special cases of a conjecture proposed by Browkin, J. (LectureNotes in Math., 966, Springer-Verlag, New York, Heidelberg, Berlin, 1982, 1-6).
文摘is the disjoint union of for all , where is the set of all roots of primitive second degree equations , with reduced discriminant equal to k2m. We study the action of two Hecke groups—the full modular group and the group of linear-fractional transformations on . In particular, we investigate the action of on for finding different orbits.