{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T04:40:11Z","timestamp":1773463211886,"version":"3.50.1"},"reference-count":18,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>There are many group-based cryptosystems in which the security is related to the conjugacy search problem or the simultaneous conjugacy search problem in their underlying platform groups. In this article, we show that some metabelian groups do not provide strong security for these cryptosystems and so they cannot be chosen as platform groups.<\/jats:p>","DOI":"10.1515\/jmc-2023-0036","type":"journal-article","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T10:58:31Z","timestamp":1744628311000},"source":"Crossref","is-referenced-by-count":1,"title":["Investigation of metabelian platform groups for protocols based on (simultaneous) conjugacy search problem"],"prefix":"10.1515","volume":"19","author":[{"given":"Delaram","family":"Kahrobaei","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of York , York , United Kingdom"},{"name":"Departments of Computer Science and Mathematics, Queens College, City University of New York , New York , United States of America"},{"name":"Department of Computer Science and Engineering, Tandon School of Engineering, New York University , New York , United States of America"},{"name":"Initiative for the Theoretical Sciences, Graduate Center, City University of New York , New York , United States of America"}]},{"given":"Carmine","family":"Monetta","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Salerno, IT , Fisciano SA , Italy"}]},{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[{"name":"Laboratoire d'Informatique de Paris 6 (LIP6), Sorbonne University, CNRS, LIP6, PolSys , Paris , France"}]},{"given":"Maria","family":"Tota","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Salerno, IT , Fisciano SA , Italy"}]},{"given":"Martina","family":"Vigorito","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Salerno, IT , Fisciano SA , Italy"}]}],"member":"374","published-online":{"date-parts":[[2025,4,14]]},"reference":[{"key":"2025122009205604433_j_jmc-2023-0036_ref_001","doi-asserted-by":"crossref","unstructured":"Anshel I, Anshel M, Goldfeld D. An algebraic method for public-key cryptography. Math Res Let. 1999;6:287\u201391.","DOI":"10.4310\/MRL.1999.v6.n3.a3"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_002","doi-asserted-by":"crossref","unstructured":"Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;2:463\u201374.","DOI":"10.7551\/mitpress\/12274.003.0047"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_003","unstructured":"Eick B, Kahrobaei D. Polycyclic groups: A new platform for cryptology?. 2004. arXiv:math\/0411077v1 [math.GR]."},{"key":"2025122009205604433_j_jmc-2023-0036_ref_004","doi-asserted-by":"crossref","unstructured":"Ko KH, Lee SJ, Cheon JH, Han JW, Kang J, Park C. New public-key cryptosystem using braid groups. Adv Cryptol CRYPTO 2000;1880:166\u201383.","DOI":"10.1007\/3-540-44598-6_10"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_005","unstructured":"Monetta C, Tortora A. The multiple conjugacy search problem in virtually nilpotent polycyclic groups. Adv Group Theory Appl. 2022;13:61\u201370."},{"key":"2025122009205604433_j_jmc-2023-0036_ref_006","doi-asserted-by":"crossref","unstructured":"Kotov M, Ushakov A. Analysis of a certain polycyclic-group-based cryptosystem. J Math Cryptol. 2015;9:161\u20137.","DOI":"10.1515\/jmc-2015-0013"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_007","doi-asserted-by":"crossref","unstructured":"Gryak J, Kahrobaei D, Martinez-Perez C. On the conjugacy problem in certain metabelian groups. Glasgow Math J. 2019;61(2):251\u201369.","DOI":"10.1017\/S0017089518000198"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_008","doi-asserted-by":"crossref","unstructured":"Gryak J, Haralick R, Kahrobaei D. Solving the Conjugacy Decision Problem via Machine Learning. Experiment Math. 2020;29:66\u201378.","DOI":"10.1080\/10586458.2018.1434704"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_009","doi-asserted-by":"crossref","unstructured":"Garber D, Kahrobaei D, Lam HT. Length based attack for polycyclic groups. J Math Cryptol. 2015;9:33\u201344.","DOI":"10.1515\/jmc-2014-0003"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_010","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Flores R, Noce M Group-based cryptography in the quantum era. Notices of the American Mathematical Society. 2023. pp. 752\u201363.","DOI":"10.1090\/noti2684"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_011","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Flores R, Noce M, Habeeb M, Battarbee C. Applications of group theory in cryptography. in: Mathematical Surveys and Monographs. Vol. 278. Providence, Rhode Island: American Mathematical Society; 2024.","DOI":"10.1090\/surv\/278"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_012","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Tortora A, Tota M. Multilinear cryptography using nilpotent groups. Elementary theory of groups and group rings and related topics. Proceedings of the Conference Held on 1-2 November 2018 at Fairfield University and Graduate Center, CUNY. De Gruyter Proceedings in Mathematics, Boston, 2018. p. 127\u201334.","DOI":"10.1515\/9783110638387-013"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_013","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Tortora A, Tota M. A closer look at the multilinear cryptography using nilpotent groups. Int J Comput Math Comput Syst Theory. 2022;7(1):63\u20137.","DOI":"10.1080\/23799927.2021.2006314"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_014","doi-asserted-by":"crossref","unstructured":"Noskov GA. Conjugacy problem in Metabelian groups. Math Notes Acad Sci USSR. 1982;31:252\u20138.","DOI":"10.1007\/BF01138933"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_015","doi-asserted-by":"crossref","unstructured":"Auslander L. On a problem of Philip Hall. Ann Math. 1967;86(1):112\u20136.","DOI":"10.2307\/1970362"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_016","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Koupparis C. Non-commutative digital signatures using non-commutative groups. Groups Complexity Cryptol. 2012;4:377\u201384.","DOI":"10.1515\/gcc-2012-0019"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_017","doi-asserted-by":"crossref","unstructured":"Kahrobaei D, Khan B. Nis05-6: A non-commutative generalization of ElGamal key exchange using polycyclic groups. IEEE Global Telecommunications Conference (GLOBECOM \u201906). New York: IEEE Press; 2006.","DOI":"10.1109\/GLOCOM.2006.290"},{"key":"2025122009205604433_j_jmc-2023-0036_ref_018","doi-asserted-by":"crossref","unstructured":"Gryak J, Kahrobaei D. The status of the polycyclic group-based cryptography: A survey and open problems. Groups Complexity Cryptol. 2016;8(2):171\u201386.","DOI":"10.1515\/gcc-2016-0013"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0036\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0036\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T09:40:16Z","timestamp":1766223616000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0036\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,1]]},"references-count":18,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,4,14]]},"published-print":{"date-parts":[[2025,4,14]]}},"alternative-id":["10.1515\/jmc-2023-0036"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2023-0036","relation":{},"ISSN":["1862-2984"],"issn-type":[{"value":"1862-2984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,1]]},"article-number":"20230036"}}