Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case

Size: px
Start display at page:

Download "Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case"

Transcription

1 1 / 27 Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case Marta Conde Pena 1 Jean-Charles Faugère 2,3,4 Ludovic Perret 3,2,4 1 Spanish National Research Council (CSIC) 2 Sorbonne Universités, UPMC Univ Paris 06 3 INRIA 4 CNRS

2 Motivation 2 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems

3 Motivation 3 / 27 Cash from a Classical vs Quantum Perspective Classical Physics In principle, it is impossible to make money uncopyable. No-cloning Theorem in Quantum Mechanics An unknown quantum state cannot be cloned. Can this be used to make unforgeable cash?

4 Motivation 4 / 27 Quantum Money S. Wiesner. Conjugate Coding. ACM SIGACT News, 15(1):78 88, Wiesner s Idea for Quantum Money A quantum banknote has a serial number and t photons. No Forging Probability of successful forging exponentially small on t.

5 Motivation 5 / 27 A Step Forward: Public-key Quantum Money Ideally, anyone should be able to verify the validity of money. Public-key quantum money. E. Farhi et al. Quantum Money from Knots. ITCS S. Aaronson and P. Christiano. Quantum Money from Hidden Subspaces. STOC Quantum Money Scheme of Aaronson-Christiano Security under a classical (non-quantum) hardness assumption.

6 Motivation 6 / 27 Hardness Assumption Hidden Subspaces Problem (HSP q ) Input : p 1,..., p m, q 1,..., q m F q [x 1,..., x n ] of degree d. d 3. n m 2n. Find : n/2-dimensional subspace A F q n s.t p i (A) = 0 and q i (A ) = 0 i {1,..., m}. Secret key: A. Public key: p 1,..., p m, q 1,..., q m. The subspace and the polynomials are chosen uniformly at random from the appropriate sets.

7 Motivation 7 / 27 Security of the Scheme Aaronson-Christiano (STOC 2012) Their scheme relies on HSP 2. Open Question (STOC 2012) Extension of the scheme to F q for any q 2. Challenge Is HSP q really a hard problem?

8 Motivation 8 / 27 Contributions Our Contributions Randomized polynomial-time algorithm for HSP q, q > d. Heuristic randomized polynomial-time algorithm for HSP 2. Experimentally verified and efficient in practice. Technique Algebraic cryptanalysis using Gröbner bases. We solve the challenge and master the complexity of solving.

9 Motivation 9 / 27 Algebraic Cryptanalysis 1 Solution of a problem Solution of a multivariate polynomial system. 2 Solve the system in practice and/or control the complexity of solving. Our Case (HSP q ) Algebraic modeling that allows to master the complexity. Similar modeling to the one used for IP in J.-C. Faugère, L. Perret. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. EUROCRYPT 2006.

10 Motivation 10 / 27 Gröbner Bases F 5 Algorithm (J.-C.Faugère, 2002) Computation of a Gröbner basis of f 1,..., f r F q [x 1,..., x n ] equivalent to succesive reductions to row echelon form of M d = k i monomials of degree d k 1... k l t 1 f i t 2 f i , deg(t j f ij ) d. until for big enough d =d reg, the row echelon form of M dreg contains a GB.

11 Motivation 10 / 27 Gröbner Bases F 5 Algorithm (J.-C.Faugère, 2002) Computation of a Gröbner basis of f 1,..., f r F q [x 1,..., x n ] equivalent to succesive reductions to row echelon form of M d = k i monomials of degree d k 1... k l t 1 f i t 2 f i , deg(t j f ij ) d. until for big enough d =d reg, the row echelon form of M dreg contains a GB. Complexity Analysis Complexity of O(n ωdreg ), 2 ω 3 linear algebra constant. d reg difficult to estimate in general. In our case we can bound it.

12 Modeling 11 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems

13 Modeling 12 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 a 2,1... a 2,4 matrix of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 =

14 Modeling 13 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 a 2,1... a 2,4 matrix of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 = Coeff(p 1, y 1 y 2 )y 1 y 2 + Coeff(p 1, y 1 )y 1 + Coeff(p 1, y 2 )y 2 = Coeff(p 1, y 1 y 2 ) = Coeff(p 1, y 1 ) = Coeff(p 1, y 2 ) = 0.

15 Modeling 14 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 matrix a 2,1... a 2,4 of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 = Coeff(p 1, y 1 y 2 )y 1 y 2 + Coeff(p 1, y 1 )y 1 + Coeff(p 1, y 2 )y 2 = Coeff(p 1, y 1 y 2 ) = Coeff(p 1, y 1 ) = Coeff(p 1, y 2 ) = 0. Naive Model i {1,..., m}, t M ( F q [y 1,..., y n/2 ] ), SysNaive HSPq = { Coeff(p i, t) = 0, Coeff(q i, t) = 0.

16 Modeling 15 / 27 Optimizing the Model Key Observation If A is a solution of HSP q, for any S GL n/2 (F q ), SA is also a solution. Naive Model Has Many Equivalent Solutions. Not optimal. Canonical Form of the Solution of HSP q With probability n/2 γ q (n/2) = (1 1q ) i 1 1 q, A admits a basis in systematic form (I G), G = (g i,j ) is an n/2 n/2 matrix. i=1

17 Modeling 16 / 27 Our Model Optimizing the Model Naive system with A in systematic form. Our Model i {1,..., m}, t M ( F q [y 1,..., y n/2 ] ), Sys HSPq = { Coeff(p i, t) = 0, Coeff(q i, t) = 0.

18 Our Contributions 17 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems

19 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 18 / 27 HSP q, with q > d Linear Equations For all i {1,..., m}, j {1,..., n}, denoting by p i (1) = n λ p i,j x j, q (1) i = j=1 n λ q i,j x j, λ p i,j, λq i,j F q, j=1 i {1,..., m}, k {1,..., n/2}, the following equations are linear: n/2 Coeff(p i, y k ) = λ p i,k + λ p i,j+n/2 g k,j, j=1 n/2 Coeff(q i, y k ) = λ q i,k+n/2 λ q i,j g j,k. j=1

20 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 19 / 27 HSP q, with q > d Matrix of Coefficients of Size mn n 2 /4 Has the Following Shape λ p i,n/ λ p i,n λ p i,n/ λ p i,n λ p i,n/ λ p i,n λ q j, λ q j, λ q j,n/ λ q j, λ q j, λ q j,n/ Full Rank of the Coefficient Matrix with Overwhelming Probability The probability is γ q(m) γ q(m n/2), m number of p i s.

21 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 20 / 27 Randomized Polynomial-time Algorithm for HSP q Input: p 1,..., p m, q 1,..., q m F q [x 1,..., x n ] of degree d 3, n m 2n. 1 Construct the linear system {Coeff(p i, y k ), Coeff(q i, y k ), i {1,..., m}, j {1,..., n/2}}. 2 Solve it. Return this solution. Complexity O(n 2ω ), 2 ω 3 linear algebra constant. Success probability γ q (n/2)γ q (m) γ q (m n/2).

22 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 21 / 27 Some Benchmarks for HSP q, q > d Table : Experiments performed for m = n with MAGMA v.19 d= 3 d= 4 n # Variables #Eqs q Exh. search Time O ( 2 576) 0.00s 0.00s O ( ) 0.02s 0.02s HSP q for big q is insecure!

23 22 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Sys HSP2 No linear equations: all equations are of degree d with overwhelming probability. Reductions modulo the field equations. Very Overdetermined Non-Linear System The number of equations is at least [( ) ( )] n/2 n/2 2n n 2 /4. 1 d Behaviour when computing a Gröbner basis?

24 23 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 Some Benchmarks for HSP 2 Table : Experiments performed for m = n with MAGMA v.19 d = 3 n # Variables #Eqs d reg Exh. search Time O ( 2 49) 136s O ( 2 49) 2.30min O ( 2 81) 2h20 d = 4 n # Variables #Eqs d reg Exh. search Time O ( 2 36) 38s O ( 2 49) 66min

25 24 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Structural Symmetries in Our Model If we order in increasing lexicographic order the monomials of degree d m i F 2 [ xn/2+1,..., x n ], m i F 2 [ x1,..., x n/2 ], and ti F 2 [ y1,..., y n/2 ], then Coeff ( m i, t j ) (d) = Coeff ( m j, t i ) (d).

26 24 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Structural Symmetries in Our Model If we order in increasing lexicographic order the monomials of degree d m i F 2 [ xn/2+1,..., x n ], m i F 2 [ x1,..., x n/2 ], and ti F 2 [ y1,..., y n/2 ], then Coeff ( m i, t j ) (d) = Coeff ( m j, t i ) (d). Low Degree Equations Coeff(p, t j )+Coeff(q, t i )+ Coeff(q, t k )+ Coeff(p, t l ) = 0 {k i α k 0} {l j β l 0} is of degree d 1 and is a linear combination of the equations of Sys HSP2.

27 25 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Behaviour of Sys HSP2 Degree falls not typically occurring in a random system of equations. Heuristically the degree of regularity is bounded by d + 1. Heuristic Randomized Polynomial-time Algorithm for HSP 2 Input: p 1,..., p m, q 1,..., q m F q [x] of degree d 3, n m 2n. 1 Compute a Gröbner basis J of Sys HSP2. Return the variety of J. Complexity O(n 2ω(d+1) ), 2 ω 3 linear algebra constant. Success probability γ 2 (n/2).

28 Conclusions and Open Problems 26 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems

29 Conclusions and Open Problems 27 / 27 Conclusions and Open Problems Conclusions HSP q for big q is easy. Randomized polynomial-time algorithm for HSP q for big q. HSP 2 conjectured to be easy. Heuristic randomized polynomial-time algorithm for HSP 2. Open Problems 1 Noise-free version if the polynomials are not random but more structured (e.g., homogeneous of degree d)? 2 Noisy version?

Hybrid Approach : a Tool for Multivariate Cryptography

Hybrid Approach : a Tool for Multivariate Cryptography Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

A variant of the F4 algorithm

A variant of the F4 algorithm A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis

More information

Gröbner Bases in Public-Key Cryptography

Gröbner Bases in Public-Key Cryptography Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis

More information

Gröbner Bases. Applications in Cryptology

Gröbner Bases. Applications in Cryptology Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break

More information

Isomorphism of Polynomials : New Results

Isomorphism of Polynomials : New Results Isomorphism of Polynomials : New Results Charles Bouillaguet, Jean-Charles Faugère 2,3, Pierre-Alain Fouque and Ludovic Perret 3,2 Ecole Normale Supérieure {charles.bouillaguet, pierre-alain.fouque}@ens.fr

More information

Comparison between XL and Gröbner Basis Algorithms

Comparison between XL and Gröbner Basis Algorithms Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042

More information

On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems

On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems Bruno.Salvy@inria.fr Algorithms Project, Inria Joint work with Magali Bardet & Jean-Charles Faugère September 21st, 2006

More information

On the Complexity of the Hybrid Approach on HFEv-

On the Complexity of the Hybrid Approach on HFEv- On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature

More information

Algebraic Attack Against Trivium

Algebraic Attack Against Trivium Algebraic Attack Against Trivium Ilaria Simonetti, Ludovic Perret and Jean Charles Faugère Abstract. Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate

More information

On the relation of the Mutant strategy and the Normal Selection strategy

On the relation of the Mutant strategy and the Normal Selection strategy On the relation of the Mutant strategy and the Normal Selection strategy Martin Albrecht 1 Carlos Cid 2 Jean-Charles Faugère 1 Ludovic Perret 1 1 SALSA Project -INRIA, UPMC, Univ Paris 06 2 Information

More information

The point decomposition problem in Jacobian varieties

The point decomposition problem in Jacobian varieties The point decomposition problem in Jacobian varieties Jean-Charles Faugère2, Alexandre Wallet1,2 1 2 ENS Lyon, Laboratoire LIP, Equipe AriC UPMC Univ Paris 96, CNRS, INRIA, LIP6, Equipe PolSys 1 / 19 1

More information

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Practical Analysis of Key Recovery Attack against Search-LWE Problem Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate

More information

Gröbner Bases. Applications in Cryptology

Gröbner Bases. Applications in Cryptology Gröbner - Crypto J.-C. Faugère Plan Gröbner bases: properties Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS Zero dim solve Algorithms Buchberger and Macaulay

More information

Elliptic Curve Discrete Logarithm Problem

Elliptic Curve Discrete Logarithm Problem Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October

More information

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg

More information

Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages

Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère and Ludovic Perret SALSA Project INRIA, Centre Paris-Rocquencourt UPMC, Univ Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

Uncloneable Quantum Money

Uncloneable Quantum Money 1 Institute for Quantum Computing University of Waterloo Joint work with Michele Mosca CQISC 2006 1 Supported by NSERC, Sun Microsystems, CIAR, CFI, CSE, MITACS, ORDCF. Outline Introduction Requirements

More information

Résolution de systèmes polynomiaux structurés et applications en Cryptologie

Résolution de systèmes polynomiaux structurés et applications en Cryptologie Résolution de systèmes polynomiaux structurés et applications en Cryptologie Pierre-Jean Spaenlehauer University of Western Ontario Ontario Research Center for Computer Algebra Magali Bardet, Jean-Charles

More information

Calcul d indice et courbes algébriques : de meilleures récoltes

Calcul d indice et courbes algébriques : de meilleures récoltes Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:

More information

Gröbner Bases Techniques in Post-Quantum Cryptography

Gröbner Bases Techniques in Post-Quantum Cryptography Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka,

More information

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA 2 Summary

More information

Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar?

Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Christian Eder, Jean-Charles Faugère and Ludovic Perret Seminar on Fundamental Algorithms, University

More information

Lattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018

Lattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018 Lattice Reduction Attacks on HE Schemes Martin R. Albrecht 15/03/2018 Learning with Errors The Learning with Errors (LWE) problem was defined by Oded Regev. 1 Given (A, c) with uniform A Z m n q, uniform

More information

A distinguisher for high-rate McEliece Cryptosystems

A distinguisher for high-rate McEliece Cryptosystems A distinguisher for high-rate McEliece Cryptosystems JC Faugère (INRIA, SALSA project), A Otmani (Université Caen- INRIA, SECRET project), L Perret (INRIA, SALSA project), J-P Tillich (INRIA, SECRET project)

More information

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,

More information

The F 4 Algorithm. Dylan Peifer. 9 May Cornell University

The F 4 Algorithm. Dylan Peifer. 9 May Cornell University The F 4 Algorithm Dylan Peifer Cornell University 9 May 2017 Gröbner Bases History Gröbner bases were introduced in 1965 in the PhD thesis of Bruno Buchberger under Wolfgang Gröbner. Buchberger s algorithm

More information

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik

More information

Structural Cryptanalysis of McEliece Schemes with Compact Keys

Structural Cryptanalysis of McEliece Schemes with Compact Keys Structural Cryptanalysis of McEliece Schemes with Compact Keys Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric De Portzamparc, Jean-Pierre Tillich To cite this version: Jean-Charles Faugère,

More information

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic Didier Henrion Simone Naldi Mohab Safey El Din Version 1.0 of November 5, 2016 Abstract This document briefly describes

More information

Differential Algorithms for the Isomorphism of Polynomials Problem

Differential Algorithms for the Isomorphism of Polynomials Problem Differential Algorithms for the Isomorphism of Polynomials Problem Abstract. In this paper, we investigate the difficulty of the Isomorphism of Polynomials (IP) Problem as well as one of its variant IP1S.

More information

Cryptanalysis of the Oil & Vinegar Signature Scheme

Cryptanalysis of the Oil & Vinegar Signature Scheme Cryptanalysis of the Oil & Vinegar Signature Scheme Aviad Kipnis 1 and Adi Shamir 2 1 NDS Technologies, Israel 2 Dept. of Applied Math, Weizmann Institute, Israel Abstract. Several multivariate algebraic

More information

PARALLEL MULTIPLICATION IN F 2

PARALLEL MULTIPLICATION IN F 2 PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

Solving LWE with BKW

Solving LWE with BKW Martin R. Albrecht 1 Jean-Charles Faugére 2,3 1,4 Ludovic Perret 2,3 ISG, Royal Holloway, University of London INRIA CNRS IIS, Academia Sinica, Taipei, Taiwan PKC 2014, Buenos Aires, Argentina, 28th March

More information

New candidates for multivariate trapdoor functions

New candidates for multivariate trapdoor functions New candidates for multivariate trapdoor functions Jaiberth Porras 1, John B. Baena 1, Jintai Ding 2,B 1 Universidad Nacional de Colombia, Medellín, Colombia 2 University of Cincinnati, Cincinnati, OH,

More information

Jean-Charles Faugère

Jean-Charles Faugère ECC 2011 The 15th workshop on Elliptic Curve Cryptography INRIA, Nancy, France Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L Huot

More information

arxiv: v1 [cs.cr] 6 Apr 2015

arxiv: v1 [cs.cr] 6 Apr 2015 New algorithm for the discrete logarithm problem on elliptic curves arxiv:1504.01175v1 [cs.cr] 6 Apr 2015 Igor Semaev Department of Informatics University of Bergen, Norway e-mail: igor@ii.uib.no phone:

More information

Key Recovery on Hidden Monomial Multivariate Schemes

Key Recovery on Hidden Monomial Multivariate Schemes Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,

More information

Practical Linear Algebra: A Geometry Toolbox

Practical Linear Algebra: A Geometry Toolbox Practical Linear Algebra: A Geometry Toolbox Third edition Chapter 12: Gauss for Linear Systems Gerald Farin & Dianne Hansford CRC Press, Taylor & Francis Group, An A K Peters Book www.farinhansford.com/books/pla

More information

Charles Phelps Taft Research Center at the University of Cincinnati

Charles Phelps Taft Research Center at the University of Cincinnati Charles Phelps Taft Research Center at the University of Cincinnati Graduate Summer Fellowship Award Each section (I-III) should be placed at the start of a new page. All required materials must be included

More information

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India October

More information

New Directions in Multivariate Public Key Cryptography

New Directions in Multivariate Public Key Cryptography New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in

More information

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre

More information

Computing Generator in Cyclotomic Integer Rings

Computing Generator in Cyclotomic Integer Rings A subfield algorithm for the Principal Ideal Problem in L 1 K 2 and application to the cryptanalysis of a FHE scheme Jean-François Biasse 1 Thomas Espitau 2 Pierre-Alain Fouque 3 Alexandre Gélin 2 Paul

More information

Simple Matrix Scheme for Encryption (ABC)

Simple Matrix Scheme for Encryption (ABC) Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31

More information

Fast Matrix Product Algorithms: From Theory To Practice

Fast Matrix Product Algorithms: From Theory To Practice Introduction and Definitions The τ-theorem Pan s aggregation tables and the τ-theorem Software Implementation Conclusion Fast Matrix Product Algorithms: From Theory To Practice Thomas Sibut-Pinote Inria,

More information

Poly Dragon: An efficient Multivariate Public Key Cryptosystem

Poly Dragon: An efficient Multivariate Public Key Cryptosystem Poly Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India May 19, 2010

More information

Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization

Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization Aviad Kipnis 1 and Adi Shamir 2 1 NDS Technologies, Israel 2 Computer Science Dept., The Weizmann Institute, Israel Abstract. The RSA

More information

Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited

Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited Enrico Thomae and Christopher Wolf Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum,

More information

Almost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17

Almost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17 Almost polynomial Complexity for Zero-dimensional Gröbner Bases Amir Hashemi co-author: Daniel Lazard INRIA SALSA-project/ LIP6 CALFOR-team http://www-calfor.lip6.fr/ hashemi/ Special semester on Gröbner

More information

On Polynomial Systems Arising from a Weil Descent

On Polynomial Systems Arising from a Weil Descent On Polynomial Systems Arising from a Weil Descent Christophe Petit and Jean-Jacques Quisquater UCL Crypto Group, Université catholique de Louvain Place du Levant 3 1348 Louvain-la-Neuve (Belgium) christophe.petit@uclouvain.be,

More information

Decoding linear codes via systems solving: complexity issues

Decoding linear codes via systems solving: complexity issues Decoding linear codes via systems solving: complexity issues Stanislav Bulygin (joint work with Ruud Pellikaan) University of Kaiserslautern June 19, 2008 Outline Outline of the talk Introduction: codes

More information

Quantum Lightning Never Strikes the Same State Twice

Quantum Lightning Never Strikes the Same State Twice Quantum Lightning Never Strikes the Same State Twice Or: Quantum Money from Cryptographic Assumptions Mark Zhandry Princeton University mzhandry@princeton.edu Abstract Public key quantum money can be seen

More information

Improved Cryptanalysis of HFEv- via Projection

Improved Cryptanalysis of HFEv- via Projection Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone PQ Crypto 2018 Fort Lauderdale, Florida 04/10/2018 A. Petzoldt Cryptanalysis of HFEv- via Projection

More information

Solving LWE problem with bounded errors in polynomial time

Solving LWE problem with bounded errors in polynomial time Solving LWE problem with bounded errors in polynomial time Jintai Ding, Southern Chinese University of Technology, University of Cincinnati, ding@mathucedu Abstract In this paper, we present a new algorithm,

More information

Key Recovery on Hidden Monomial Multivariate Schemes

Key Recovery on Hidden Monomial Multivariate Schemes Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,

More information

Groebner Bases and Applications

Groebner Bases and Applications Groebner Bases and Applications Robert Hines December 16, 2014 1 Groebner Bases In this section we define Groebner Bases and discuss some of their basic properties, following the exposition in chapter

More information

On the Existence of Semi-Regular Sequences

On the Existence of Semi-Regular Sequences On the Existence of Semi-Regular Sequences Sergio Molina 1 joint work with T. J. Hodges 1 J. Schlather 1 Department of Mathematics University of Cincinnati DIMACS, January 2015 Sergio Molina (UC) Semi-Regular

More information

arxiv: v1 [cs.cr] 6 Jan 2013

arxiv: v1 [cs.cr] 6 Jan 2013 On the complexity of the Rank Syndrome Decoding problem P. Gaborit 1, O. Ruatta 1 and J. Schrek 1 Université de Limoges, XLIM-DMI, 123, Av. Albert Thomas 87060 Limoges Cedex, France. philippe.gaborit,julien.schrek,olivier.ruatta@unilim.fr

More information

A new attack on RSA with a composed decryption exponent

A new attack on RSA with a composed decryption exponent A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr

More information

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre

More information

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not

More information

MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.

MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.

More information

Multivariate Public Key Cryptography

Multivariate Public Key Cryptography Winter School, PQC 2016, Fukuoka Multivariate Public Key Cryptography Jintai Ding University of Cincinnati Feb. 22 2016 Outline Outline What is a MPKC? Multivariate Public Key Cryptosystems - Cryptosystems,

More information

Chapter 1: Systems of Linear Equations

Chapter 1: Systems of Linear Equations Chapter : Systems of Linear Equations February, 9 Systems of linear equations Linear systems Lecture A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where

More information

13. Systems of Linear Equations 1

13. Systems of Linear Equations 1 13. Systems of Linear Equations 1 Systems of linear equations One of the primary goals of a first course in linear algebra is to impress upon the student how powerful matrix methods are in solving systems

More information

ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS

ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS STAVROS KOUSIDIS AND ANDREAS WIEMERS Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev

More information

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Practical Analysis of Key Recovery Attack against Search-LWE Problem Practical Analysis of Key Recovery Attack against Search-LWE Problem IMI Cryptography Seminar 28 th June, 2016 Speaker* : Momonari Kuo Grauate School of Mathematics, Kyushu University * This work is a

More information

Hidden Symmetry Subgroup Problems

Hidden Symmetry Subgroup Problems 1/27 Hidden Symmetry Subgroup Problems Miklos Santha CNRS, Université Paris Diderot, France and Centre for Quantum Technologies, NUS, Singapore joint work with Thomas Decker Gábor Ivanyos Pawel Wocjan

More information

Row Space, Column Space, and Nullspace

Row Space, Column Space, and Nullspace Row Space, Column Space, and Nullspace MATH 322, Linear Algebra I J. Robert Buchanan Department of Mathematics Spring 2015 Introduction Every matrix has associated with it three vector spaces: row space

More information

THIS paper investigates the difficulty of the Goppa Code

THIS paper investigates the difficulty of the Goppa Code A Distinguisher for High Rate McEliece Cryptosystems Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich Abstract The Goppa Code Distinguishing (GCD problem

More information

Journal of Algebra 226, (2000) doi: /jabr , available online at on. Artin Level Modules.

Journal of Algebra 226, (2000) doi: /jabr , available online at   on. Artin Level Modules. Journal of Algebra 226, 361 374 (2000) doi:10.1006/jabr.1999.8185, available online at http://www.idealibrary.com on Artin Level Modules Mats Boij Department of Mathematics, KTH, S 100 44 Stockholm, Sweden

More information

Improved Cryptanalysis of HFEv- via Projection

Improved Cryptanalysis of HFEv- via Projection Improved Cryptanalysis of HFEv- via Projection Jintai Ding 1, Ray Perlner 2, Albrecht Petzoldt 2, and Daniel Smith-Tone 2,3 1 Department of Mathematical Sciences, University of Cincinnati, Cincinnati,

More information

Math 1553, Introduction to Linear Algebra

Math 1553, Introduction to Linear Algebra Learning goals articulate what students are expected to be able to do in a course that can be measured. This course has course-level learning goals that pertain to the entire course, and section-level

More information

Ma/CS 6b Class 20: Spectral Graph Theory

Ma/CS 6b Class 20: Spectral Graph Theory Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x

More information

Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95

Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95 Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95 Jean-Sébastien Coron and David Naccache Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France {jean-sebastien.coron,

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

Summation polynomial algorithms for elliptic curves in characteristic two

Summation polynomial algorithms for elliptic curves in characteristic two Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith and Shishay W. Gebregiyorgis Mathematics Department, University of Auckland, New Zealand. S.Galbraith@math.auckland.ac.nz,sgeb522@aucklanduni.ac.nz

More information

Lazy Modulus Switching for the BKW Algorithm on LWE

Lazy Modulus Switching for the BKW Algorithm on LWE Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugère 3,,4, Robert Fitzpatrick 5, and Ludovic Perret,3,4 1 Technical University of Denmark, Denmark Sorbonne Universités,

More information

forms Christopher Engström November 14, 2014 MAA704: Matrix factorization and canonical forms Matrix properties Matrix factorization Canonical forms

forms Christopher Engström November 14, 2014 MAA704: Matrix factorization and canonical forms Matrix properties Matrix factorization Canonical forms Christopher Engström November 14, 2014 Hermitian LU QR echelon Contents of todays lecture Some interesting / useful / important of matrices Hermitian LU QR echelon Rewriting a as a product of several matrices.

More information

Inoculating Multivariate Schemes Against Differential Attacks

Inoculating Multivariate Schemes Against Differential Attacks Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower Department of Mathematical Sciences University of Cincinnati Cincinnati, OH 45221-0025 USA Email: ding@math.uc.edu,

More information

Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences J. Bi, J-S. Coron, J-C. Faugère, P. Nguyen, G. Renault, R. Zeitoun Public Key Cryptography 2014 26-28 March, 2014

More information

arxiv: v3 [cs.sc] 3 May 2013

arxiv: v3 [cs.sc] 3 May 2013 On the Complexity of Computing Gröbner Bases for Quasi-Homogeneous Systems arxiv:1301.5612v3 [cs.sc] 3 May 2013 Jean-Charles Faugère * Jean-Charles.Faugere@inria.fr ABSTRACT Mohab Safey El Din * Mohab.Safey@lip6.fr

More information

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Decoding linear codes via systems solving: complexity issues and generalized Newton identities Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008

More information

Statistical Machine Learning, Part I. Regression 2

Statistical Machine Learning, Part I. Regression 2 Statistical Machine Learning, Part I Regression 2 mcuturi@i.kyoto-u.ac.jp SML-2015 1 Last Week Regression: highlight a functional relationship between a predicted variable and predictors SML-2015 2 Last

More information

Foundation of Intelligent Systems, Part I. Regression 2

Foundation of Intelligent Systems, Part I. Regression 2 Foundation of Intelligent Systems, Part I Regression 2 mcuturi@i.kyoto-u.ac.jp FIS - 2013 1 Some Words on the Survey Not enough answers to say anything meaningful! Try again: survey. FIS - 2013 2 Last

More information

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe

More information

Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case

Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case Jérémy Berthomieu a,b,c, Jean-Charles Faugère c,a,b, Ludovic Perret a,b,c a Sorbonnes Université, UPMC Univ Paris 06,

More information

Owen (Chia-Hsin) Chen, National Taiwan University

Owen (Chia-Hsin) Chen, National Taiwan University Analysis of QUAD Owen (Chia-Hsin) Chen, National Taiwan University March 27, FSE 2007, Luxembourg Work at Academia Sinica supervised by Dr. Bo-Yin Yang Jointly with Drs. Dan Bernstein and Jiun-Ming Chen

More information

Solving All Lattice Problems in Deterministic Single Exponential Time

Solving All Lattice Problems in Deterministic Single Exponential Time Solving All Lattice Problems in Deterministic Single Exponential Time (Joint work with P. Voulgaris, STOC 2010) UCSD March 22, 2011 Lattices Traditional area of mathematics Bridge between number theory

More information

A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT

A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT Abderrahmane Nitaj 1 and Mohamed Ould Douh 1,2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen, Basse Normandie, France Université

More information

Linear Algebra: Matrix Eigenvalue Problems

Linear Algebra: Matrix Eigenvalue Problems CHAPTER8 Linear Algebra: Matrix Eigenvalue Problems Chapter 8 p1 A matrix eigenvalue problem considers the vector equation (1) Ax = λx. 8.0 Linear Algebra: Matrix Eigenvalue Problems Here A is a given

More information

Enhancing the Signal to Noise Ratio

Enhancing the Signal to Noise Ratio Enhancing the Signal to Noise Ratio in Differential Cryptanalysis, using Algebra Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère and Ludovic Perret ESC 2010, Remich, 10.01.2010 Outline

More information

On the Security and Key Generation of the ZHFE Encryption Scheme

On the Security and Key Generation of the ZHFE Encryption Scheme On the Security and Key Generation of the ZHFE Encryption Scheme Wenbin Zhang and Chik How Tan Temasek Laboratories National University of Singapore tslzw@nus.edu.sg and tsltch@nus.edu.sg Abstract. At

More information

Lecture 15: Algebraic Geometry II

Lecture 15: Algebraic Geometry II 6.859/15.083 Integer Programming and Combinatorial Optimization Fall 009 Today... Ideals in k[x] Properties of Gröbner bases Buchberger s algorithm Elimination theory The Weak Nullstellensatz 0/1-Integer

More information

Short Course in Quantum Information Lecture 2

Short Course in Quantum Information Lecture 2 Short Course in Quantum Information Lecture Formal Structure of Quantum Mechanics Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html Syllabus Lecture

More information

1. Let r, s, t, v be the homogeneous relations defined on the set M = {2, 3, 4, 5, 6} by

1. Let r, s, t, v be the homogeneous relations defined on the set M = {2, 3, 4, 5, 6} by Seminar 1 1. Which ones of the usual symbols of addition, subtraction, multiplication and division define an operation (composition law) on the numerical sets N, Z, Q, R, C? 2. Let A = {a 1, a 2, a 3 }.

More information

Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems

Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing 100191,

More information

Quantum Money. review articles. Imagine money you can carry and spend without a trace.

Quantum Money. review articles. Imagine money you can carry and spend without a trace. Quantum Money doi:10.1145/2240236.2240258 Imagine money you can carry and spend without a trace. By Scott Aaronson, Edward Farhi, David Gosset, Avinatan Hassidim, Jonathan Kelner, and Andrew Lutomirski

More information

Linearity Measures for MQ Cryptography

Linearity Measures for MQ Cryptography Linearity Measures for MQ Cryptography Simona Samardjiska 1,2 and Danilo Gligoroski 1 Department of Telematics, NTNU, Trondheim, Norway, 1 FCSE, UKIM, Skopje, Macedonia. 2 simonas@item.ntno.no,simona.samardjiska@finki.ukim.mk,

More information