Abstract
We propose a public-key cryptosystem using the amalgamated free product structure of the modular group and the action on the upper half plane. The main purpose of this paper is to examine possibilities of building public-key cryptosystems using technology from combinatorial group theory. As a possible example of such a system, we offer a new public-key cryptosystem not depending on specific number theoretical problems but on difficulties of solving several problems in algebra.
Preview
Unable to display preview. Download preview PDF.
References
C.Charpes and J Pieprzyk, Attacking the SL2 hashing scheme, Proc. Asiacrypt'94 LNCS 917 (1995) 322–330
D.E.Cohen, Combinatorial Group Theory: A Topological Approach, (Cambridge University Press, Cambridge) (1989)
H.Cohen, A Course in Computational Algebraic Number Theory, Springer, New York, (1996)
J.Kari, A cryptoanalytic observation concerning systems based on language theory, Discr. Appl. Math. 21 (1988) 265–268
J.Kari, Observations concerning a public-key cryptosysytem based on iterated morphisms, Theor. Compt. Sci. 66 (1989) 45–53
N.Koblitz, Introduction to Elliptic Curves and Modular Forms, Springer, New York (1991)
R.C.Lyndon and P.E.Schupp, Combinatorial Group Theory, Springer, New York, (1976)
A.Salomaa, A public-key cryrptosystem based on language theory, Computers and Security, 7 (1988) 83–87
A. Salomaa, Public-Key Cryptography, Springer, Berlin, (1990)
A.Salomaa and S.Yu, On a public-key cryptosystem based on iterated morphisms and substitutions, Theor. Compt. Sci. 48 (1986) 283–296
J-P.Serre, A Course in Arithmetic, Springer, New York (1973)
J-P.Serre, Trees, Springer, New York (1980)
J-P.Tillich and G.Zémor, Hashing with SL2, Proc. Crypto'94, LNCS 839 (1994) 40–49
N.R. Wagner and M.R. Magyarik, A public-key cryptosystems based on the word problem, In Lecture Notes in Computer Science, 196 (1985) 19–37
G.Zémor, Hash functions and Cayley graphs, Designs, Codes and Cryptography 4 (1994) 381–394
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yamamura, A. (1998). Public-key cryptosystems using the modular group. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054026
Download citation
DOI: https://doi.org/10.1007/BFb0054026
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64693-8
Online ISBN: 978-3-540-69105-1
eBook Packages: Springer Book Archive