In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a sem...In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect.展开更多
Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleabi...Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleability is taken into account. Many forming works focus on designing non-malleable commitments schemes based on number theory assumptions. In this paper we give a general framework to construct non- interactive and non-malleable commitment scheme with respect to opening based on more general assumptions called q-one way group homomorphisms (q-OWGH). Our scheme is more general since many existing commitment schemes can be deduced from our scheme.展开更多
In this paper, we showed how groups are embedded into wreath products, we gave a simpler proof of the theorem by Audu (1991) (see <a href="#ref1">[1]), also proved that a group can be embedded into the...In this paper, we showed how groups are embedded into wreath products, we gave a simpler proof of the theorem by Audu (1991) (see <a href="#ref1">[1]), also proved that a group can be embedded into the wreath product of a factor group by a normal subgroup and also proved that a factor group can be embedded inside a wreath product and the wreath product of a factor group by a factor group can be embedded into a group. We further showed that when the abstract group in the Universal Embedding Theorem is a p-group, cyclic and simple, the embedding becomes an isomorphism. Examples were given to justify the results.展开更多
There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a p...There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.展开更多
It is known that there exists an isogeny sort of Chevalley groups G (Σ, F) associated to any indecomposable root system Σ and any field F . In this paper the author determines all nontrivial homomorphi...It is known that there exists an isogeny sort of Chevalley groups G (Σ, F) associated to any indecomposable root system Σ and any field F . In this paper the author determines all nontrivial homomorphisms from G(Σ, k) to G(Σ, K) when the root system Σ is of type C n or G 2 , and the fields k and K are finite fields of characteristic p .展开更多
Let q be a prime power. By PL(Fq) the authors mean a projective line over the finite field Fq with the additional point ∞. In this article, the authors parametrize the conjugacy classes of nondegenerate homomorphis...Let q be a prime power. By PL(Fq) the authors mean a projective line over the finite field Fq with the additional point ∞. In this article, the authors parametrize the conjugacy classes of nondegenerate homomorphisms which represent actions of △(3, 3, k) = (u, v: u^3 = v^3 = (uv)^k = 1〉on PL(Fq), where q ≡ ±1(modk). Also, for various values of k, they find the conditions for the existence of coset diagrams depicting the permutation actions of △(3, 3, k) on PL(Fq). The conditions are polynomials with integer coefficients and the diagrams are such that every vertex in them is fixed by (u^-v^-)^k. In this way, they get △(3, 3, k) as permutation groups on PL(Fq).展开更多
In this article, we introduce the notion of fuzzy G-module by defining the group action of G on a fuzzy set of a Z-module M. We establish the cases in which fuzzy submodules also become fuzzy G-submodules. Notions of ...In this article, we introduce the notion of fuzzy G-module by defining the group action of G on a fuzzy set of a Z-module M. We establish the cases in which fuzzy submodules also become fuzzy G-submodules. Notions of a fuzzy prime submodule, fuzzy prime G-submodule, fuzzy semi prime submodule, fuzzy G-semi prime submodule, G-invariant fuzzy submodule and G-invariant fuzzy prime submodule of M are introduced and their properties are described. The homomorphic image and pre-image of fuzzy G-submodules, G-invariant fuzzy submodules and G-invariant fuzzy prime submodules of M are also established.展开更多
In this article, we have described the Todd-Coxeter algorithm. Indeed, the Todd-Coxeter algorithm is a mathematical tool used in the field of group theory. It makes it possible to determine different possible presenta...In this article, we have described the Todd-Coxeter algorithm. Indeed, the Todd-Coxeter algorithm is a mathematical tool used in the field of group theory. It makes it possible to determine different possible presentations of a group, i.e. different ways of expressing its elements and operations. We have also applied this algorithm to a subgroup generated H by G;where we obtained a table of the subgroup, three tables of relators including: Table of the relator aaaa;Table of the relator abab;Table of the relator bbb and a multiplication table aa'bb'. Once the algorithm is complete, the unit of H in G is 6. We have explicitly obtained a homomorphism of G in the group of permutations of H/G which is isomorphic to G6;where we have noticed that it is injective: in fact, an element of the nucleus belongs to the intersection of the xHx−1for x∈G, in particular, it belongs to H;on the other hand, the image of H in G6 is of order 4, so the nucleus is reduced to the neutral element.展开更多
In this paper, we consider the relations among L-fuzzy sets, rough sets and n-ary polygroup theory. Some properties of (normal) TL-fuzzy n-ary subpolygroups of an n-ary polygroup are first obtained. Using the concep...In this paper, we consider the relations among L-fuzzy sets, rough sets and n-ary polygroup theory. Some properties of (normal) TL-fuzzy n-ary subpolygroups of an n-ary polygroup are first obtained. Using the concept of L-fuzzy sets, the notion of ~)-lower and T-upper L-fuzzy rough approximation operators with respect to an L-fuzzy set is introduced and some related properties are presented. Then a new algebraic structure called (normal) TL-fuzzy rough n-ary polygroup is defined and investigated. Also, the (strong) homomorphism of θ-lower and T-upper L-fuzzy rough approximation operators is studied.展开更多
文摘In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect.
基金the National Natural Science Foundations of China (Nos. 60673079 and 60572155)
文摘Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleability is taken into account. Many forming works focus on designing non-malleable commitments schemes based on number theory assumptions. In this paper we give a general framework to construct non- interactive and non-malleable commitment scheme with respect to opening based on more general assumptions called q-one way group homomorphisms (q-OWGH). Our scheme is more general since many existing commitment schemes can be deduced from our scheme.
文摘In this paper, we showed how groups are embedded into wreath products, we gave a simpler proof of the theorem by Audu (1991) (see <a href="#ref1">[1]), also proved that a group can be embedded into the wreath product of a factor group by a normal subgroup and also proved that a factor group can be embedded inside a wreath product and the wreath product of a factor group by a factor group can be embedded into a group. We further showed that when the abstract group in the Universal Embedding Theorem is a p-group, cyclic and simple, the embedding becomes an isomorphism. Examples were given to justify the results.
基金National Natural Science Foundation of China(No.90104005)
文摘There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.
文摘It is known that there exists an isogeny sort of Chevalley groups G (Σ, F) associated to any indecomposable root system Σ and any field F . In this paper the author determines all nontrivial homomorphisms from G(Σ, k) to G(Σ, K) when the root system Σ is of type C n or G 2 , and the fields k and K are finite fields of characteristic p .
文摘Let q be a prime power. By PL(Fq) the authors mean a projective line over the finite field Fq with the additional point ∞. In this article, the authors parametrize the conjugacy classes of nondegenerate homomorphisms which represent actions of △(3, 3, k) = (u, v: u^3 = v^3 = (uv)^k = 1〉on PL(Fq), where q ≡ ±1(modk). Also, for various values of k, they find the conditions for the existence of coset diagrams depicting the permutation actions of △(3, 3, k) on PL(Fq). The conditions are polynomials with integer coefficients and the diagrams are such that every vertex in them is fixed by (u^-v^-)^k. In this way, they get △(3, 3, k) as permutation groups on PL(Fq).
文摘In this article, we introduce the notion of fuzzy G-module by defining the group action of G on a fuzzy set of a Z-module M. We establish the cases in which fuzzy submodules also become fuzzy G-submodules. Notions of a fuzzy prime submodule, fuzzy prime G-submodule, fuzzy semi prime submodule, fuzzy G-semi prime submodule, G-invariant fuzzy submodule and G-invariant fuzzy prime submodule of M are introduced and their properties are described. The homomorphic image and pre-image of fuzzy G-submodules, G-invariant fuzzy submodules and G-invariant fuzzy prime submodules of M are also established.
文摘In this article, we have described the Todd-Coxeter algorithm. Indeed, the Todd-Coxeter algorithm is a mathematical tool used in the field of group theory. It makes it possible to determine different possible presentations of a group, i.e. different ways of expressing its elements and operations. We have also applied this algorithm to a subgroup generated H by G;where we obtained a table of the subgroup, three tables of relators including: Table of the relator aaaa;Table of the relator abab;Table of the relator bbb and a multiplication table aa'bb'. Once the algorithm is complete, the unit of H in G is 6. We have explicitly obtained a homomorphism of G in the group of permutations of H/G which is isomorphic to G6;where we have noticed that it is injective: in fact, an element of the nucleus belongs to the intersection of the xHx−1for x∈G, in particular, it belongs to H;on the other hand, the image of H in G6 is of order 4, so the nucleus is reduced to the neutral element.
基金The second author is supported by National Natural Science Foundation of China (Grant Nos. 60774049, 60875034), Natural Science Foundation of Education Committee of Hubei Province, China (Grant Nos. D20092901, Q20092907, D20082903, B200529001) and Natural Science Foundation of Hubei Province, China (Grant No. 2008CDB341)
文摘In this paper, we consider the relations among L-fuzzy sets, rough sets and n-ary polygroup theory. Some properties of (normal) TL-fuzzy n-ary subpolygroups of an n-ary polygroup are first obtained. Using the concept of L-fuzzy sets, the notion of ~)-lower and T-upper L-fuzzy rough approximation operators with respect to an L-fuzzy set is introduced and some related properties are presented. Then a new algebraic structure called (normal) TL-fuzzy rough n-ary polygroup is defined and investigated. Also, the (strong) homomorphism of θ-lower and T-upper L-fuzzy rough approximation operators is studied.