# American Institute of Mathematical Sciences

• Previous Article
On the number of factorizations of $t$ mod $N$ and the probability distribution of Diffie-Hellman secret keys for many users
• AMC Home
• This Issue
• Next Article
A proof of the conjectured run time of the Hafner-McCurley class group algorithm
doi: 10.3934/amc.2021041
Online First

Online First articles are published articles within a journal that have not yet been assigned to a formal issue. This means they do not yet have a volume number, issue number, or page numbers assigned to them, however, they can still be found and cited using their DOI (Digital Object Identifier). Online First publication benefits the research community by making new scientific discoveries known as quickly as possible.

Readers can access Online First articles via the “Online First” tab for the selected journal.

## Cryptographic multilinear maps using pro-p groups

 1 University of York, Deramore Lane, YO10 5GH York, United Kingdom 2 The City University of New York, Queens College, Mathematics and Computer Science Departments and Graduate Center, New York, NY, USA 3 Max-Planck-Institut für Mathematik in den Naturwissenschaften, Inselstraße 22, 04103 Leipzig, Germany

Received  February 2021 Revised  July 2021 Early access September 2021

In [18], the authors show how, to any nilpotent group of class $n$, one can associate a non-interactive key exchange protocol between $n+1$ users. The multilinear commutator maps associated to nilpotent groups play a key role in this protocol. In the present paper, we explore some alternative platforms, such as pro-$p$ groups.

Citation: Delaram Kahrobaei, Mima Stanojkovski. Cryptographic multilinear maps using pro-p groups. Advances in Mathematics of Communications, doi: 10.3934/amc.2021041
##### References:

show all references

##### References:
 [1] Boris Khots, Dmitriy Khots. P-groups applications in genetics. Conference Publications, 2001, 2001 (Special) : 224-228. doi: 10.3934/proc.2001.2001.224 [2] Sikhar Patranabis, Debdeep Mukhopadhyay. Identity-based key aggregate cryptosystem from multilinear maps. Advances in Mathematics of Communications, 2019, 13 (4) : 759-778. doi: 10.3934/amc.2019044 [3] Raf Cluckers, Julia Gordon, Immanuel Halupczok. Motivic functions, integrability, and applications to harmonic analysis on $p$-adic groups. Electronic Research Announcements, 2014, 21: 137-152. doi: 10.3934/era.2014.21.137 [4] Joan-Josep Climent, Juan Antonio López-Ramos. Public key protocols over the ring $E_{p}^{(m)}$. Advances in Mathematics of Communications, 2016, 10 (4) : 861-870. doi: 10.3934/amc.2016046 [5] Jinguo Zhang, Dengyun Yang. Fractional $p$-sub-Laplacian operator problem with concave-convex nonlinearities on homogeneous groups. Electronic Research Archive, 2021, 29 (5) : 3243-3260. doi: 10.3934/era.2021036 [6] Giacomo Micheli. Cryptanalysis of a noncommutative key exchange protocol. Advances in Mathematics of Communications, 2015, 9 (2) : 247-253. doi: 10.3934/amc.2015.9.247 [7] S. R. Bullett and W. J. Harvey. Mating quadratic maps with Kleinian groups via quasiconformal surgery. Electronic Research Announcements, 2000, 6: 21-30. [8] L. F. Cheung, C. K. Law, M. C. Leung. On a class of rotationally symmetric $p$-harmonic maps. Communications on Pure & Applied Analysis, 2017, 16 (6) : 1941-1955. doi: 10.3934/cpaa.2017095 [9] Mohamed Baouch, Juan Antonio López-Ramos, Blas Torrecillas, Reto Schnyder. An active attack on a distributed Group Key Exchange system. Advances in Mathematics of Communications, 2017, 11 (4) : 715-717. doi: 10.3934/amc.2017052 [10] A. Yu. Ol'shanskii and M. V. Sapir. Non-amenable finitely presented torsion-by-cyclic groups. Electronic Research Announcements, 2001, 7: 63-71. [11] Feng Rong. Non-algebraic attractors on $\mathbf{P}^k$. Discrete & Continuous Dynamical Systems, 2012, 32 (3) : 977-989. doi: 10.3934/dcds.2012.32.977 [12] Aihua Fan, Shilei Fan, Lingmin Liao, Yuefei Wang. Minimality of p-adic rational maps with good reduction. Discrete & Continuous Dynamical Systems, 2017, 37 (6) : 3161-3182. doi: 10.3934/dcds.2017135 [13] Tatsuya Arai. The structure of dendrites constructed by pointwise P-expansive maps on the unit interval. Discrete & Continuous Dynamical Systems, 2016, 36 (1) : 43-61. doi: 10.3934/dcds.2016.36.43 [14] Mohammad Sadeq Dousti, Rasool Jalili. FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Advances in Mathematics of Communications, 2015, 9 (4) : 471-514. doi: 10.3934/amc.2015.9.471 [15] Ludovic Rifford. Ricci curvatures in Carnot groups. Mathematical Control & Related Fields, 2013, 3 (4) : 467-487. doi: 10.3934/mcrf.2013.3.467 [16] Sergei V. Ivanov. On aspherical presentations of groups. Electronic Research Announcements, 1998, 4: 109-114. [17] Benjamin Weiss. Entropy and actions of sofic groups. Discrete & Continuous Dynamical Systems - B, 2015, 20 (10) : 3375-3383. doi: 10.3934/dcdsb.2015.20.3375 [18] Neal Koblitz, Alfred Menezes. Another look at generic groups. Advances in Mathematics of Communications, 2007, 1 (1) : 13-28. doi: 10.3934/amc.2007.1.13 [19] Robert McOwen, Peter Topalov. Groups of asymptotic diffeomorphisms. Discrete & Continuous Dynamical Systems, 2016, 36 (11) : 6331-6377. doi: 10.3934/dcds.2016075 [20] Steven T. Piantadosi. Symbolic dynamics on free groups. Discrete & Continuous Dynamical Systems, 2008, 20 (3) : 725-738. doi: 10.3934/dcds.2008.20.725

2020 Impact Factor: 0.935