{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:56:48Z","timestamp":1754157408838,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper attempts to construct a public\u2010key coding system using grey generation and braid group.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1\u2010AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving dis<jats:italic>per se<\/jats:italic> logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.<\/jats:p><\/jats:sec>","DOI":"10.1108\/20439371211273285","type":"journal-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:11:26Z","timestamp":1350907886000},"page":"419-426","source":"Crossref","is-referenced-by-count":0,"title":["Public\u2010key coding system based on grey generation and braid group"],"prefix":"10.1108","volume":"2","author":[{"given":"Li","family":"Shouwei","sequence":"first","affiliation":[]},{"given":"Mei","family":"Qiang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720071089600_b1","doi-asserted-by":"crossref","unstructured":"Andrew, A.M. (2011), \u201cWhy the world is grey\u201d, Grey Systems: Theory and Application, Vol. 1 No. 2, pp. 112\u201016.","DOI":"10.1108\/20439371111163738"},{"key":"key2022020720071089600_b2","unstructured":"Cao, Y. and He, W.\u2010H. (2004), \u201cAnalysis and implementation of key exchange protocol based on braid groups\u201d, Computer Technology and Development of China, No. 14, p. 12."},{"key":"key2022020720071089600_b3","unstructured":"Chen, X.F. and Wang, Y.M. (2004), \u201cA survey of public key cryptography\u201d, Journal of China Institute of Communications, Vol. 25 No. 8, pp. 109\u201018."},{"key":"key2022020720071089600_b5","unstructured":"Deng, J.L. (1989), \u201cIntroduction to grey system theory\u201d, The Journal of Grey System, Vol. 1 No. 1, pp. 1\u201024."},{"key":"key2022020720071089600_b6","doi-asserted-by":"crossref","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.S. and Park, C. (2000), \u201cNew public\u2010key cryptosystem using braid groups\u201d, Proceedings of the CRYPTO 2000, Springer, Berlin, pp. 166\u201083.","DOI":"10.1007\/3-540-44598-6_10"},{"key":"key2022020720071089600_b7","unstructured":"Liu, L.X. (2002), \u201cData key protocols in application of electronic commerce\u201d, Control Engineering of China, Vol. 9 No. 5, pp. 15\u201016."},{"key":"key2022020720071089600_b8","unstructured":"Liu, S. and Lin, Y. (2011), Grey Systems: Theory and Applications, Springer, Berlin."},{"key":"key2022020720071089600_b9","unstructured":"Luo, B.M. (2003), \u201cProtection of personal data and its private rights in internet\u201d, Modern Information of China, Vol. 23 No. 9, pp. 54\u20106."},{"key":"key2022020720071089600_b10","unstructured":"Niu, L. (2002), \u201cApplication of braid group in public key system\u201d, Master thesis, Peking University, Beijing."},{"key":"key2022020720071089600_frd1","doi-asserted-by":"crossref","unstructured":"Deng, J.L. (1982), \u201cControl problems of grey system\u201d, System & Control Letters, Vol. 1 No. 2, pp. 288\u201094.","DOI":"10.1016\/S0167-6911(82)80025-X"},{"key":"key2022020720071089600_frd2","doi-asserted-by":"crossref","unstructured":"Xiao, X.P. and Peng, K.K. (2011), \u201cResearch on generalized non\u2010equidistance GM(1,1) model based on matrix analysis\u201d, Grey Systems: Theory and Application, Vol. 1 No. 1, pp. 87\u201096.","DOI":"10.1108\/20439371111106759"}],"container-title":["Grey Systems: Theory and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/20439371211273285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/20439371211273285\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/20439371211273285\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:52:41Z","timestamp":1753401161000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/gs\/article\/2\/3\/419-426\/69247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,10,26]]}},"alternative-id":["10.1108\/20439371211273285"],"URL":"https:\/\/doi.org\/10.1108\/20439371211273285","relation":{},"ISSN":["2043-9377"],"issn-type":[{"type":"print","value":"2043-9377"}],"subject":[],"published":{"date-parts":[[2012,10,26]]}}}