Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields
|
|
- Shauna Chambers
- 5 years ago
- Views:
Transcription
1 1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work with Qi Cheng and J. Maurice Rojas.
2 2 / 27 Applications of lattice theory Lattice theory has fruitful applications in Physics and Chemistry, such as the structure of particle systems under a variety of physical constraints, packing problems, etc, but also has applications in Computational Number Theory, Computational Algebra, Coding Theory, Theoretical Computer Science and Cryptography, etc.
3 3 / 27 The Problem Let R be a ring. Given any univariate t-nomial f (x) := c 1 + c 2 x a 2 + c 3 x a c t x at R[x] (decision version) decide whether there is a root in R (search version) find one of the roots in R (counting version) count the number of roots in R
4 4 / 27 Previous work Cucker, Koiran, and Smale found a polynomial-time algorithm to find all integer roots of a univariate polynomial f in Z[x] with exactly t terms H. W. Lenstra, Jr. gave a polynomial-time algorithm to compute all factors of fixed degree over an algebraic extension of Q of fixed degree (and thereby all rational roots) Independently, Kaltofen and Koiran and Avendano, Krick, and Sombra extended this to finding bounded-degree factors of sparse polynomials in Q[x, y] in polynomial-time
5 5 / 27 Previous work on finite fields NP-hardness over even characteristic for sparse polynomials (Kipnis-Shamir 1999) For prime order finite field, detecting rational roots for straight-line program is prove to be NP-hard (Cheng-Hill-Wan 2012) Even for trinomials, no nontrivial algorithm is known
6 6 / 27 Main Results Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q Moreover, we also give the structure of the roots of f (x) over F q When t is fix, this is the first sub-linear in q algorithm to solve this problem There is an algorithm running in time q 1/2+o(1) to decide whether a trinomial in F q [x] has a root in F q
7 7 / 27 Backgrounds of Lattice What Is a Lattice? Given n linearly independent vectors b 1,..., b n R m (n m), the lattice generated by them is the set of vectors L(b 1,..., b n ) = { n x i b i : x i Z} i=1 The vectors b 1,..., b n form a basis of the lattice
8 8 / 27 Backgrounds of Lattice The Shortest Vector Problem The most famous computational problem on lattices is the shortest vector problem (SVP): Given a basis of a lattice L, find a vector u L, such that v u for any vector v L \ 0
9 9 / 27 Backgrounds of Lattice The Minkowski Convex Body Theorem There exists a nonzero lattice vector with length less than n det(l) 1/n
10 10 / 27 Backgrounds of Lattice The LLL Reduction There is a polynomial time algorithm to find a base such that the length of the shortest vector in the base (2/ 3) n λ 1, where λ 1 denotes the length of the shortest nonzero vector in the lattice
11 11 / 27 Backgrounds of Lattice Exact algorithm for SVP There is an algorithm to compute the shortest nonzero vector of a n-dimensional lattice which needs at most 4 n+o(n) arithmetic operations. (Micciancio-Voulgaris 2010)
12 12 / 27 Main idea Main theorem Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q
13 13 / 27 Main idea Observation Detecting roots over F q is the same as detecting linear factors of polynomials in F q [x] However, to detect roots in F q, we don t need the full power of factoring we need only decide whether gcd(x q x, f (x)) has positive degree, which takes time deg(f ) 1+o(1) (log q) O(1) (E.Bach and J. Shallit 1996)
14 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1
15 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f
16 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f A new polynomial c 0 +c 1 y ea 1 (mod q 1) +c 2 y ea 2 (mod q 1) + +c t 1 y ea t 1 (mod q 1)
17 14 / 27 Main idea Degree reduction Replace x by y e in f. f (y e ) := c 0 + c 1 y ea 1 + c 2 y ea c t 1 y ea t 1 If gcd(e, q 1) = 1, then the map from F q to F q given by y e is one-to-one, thus it will not change the solvability of f A new polynomial c 0 +c 1 y ea 1 (mod q 1) +c 2 y ea 2 (mod q 1) + +c t 1 y ea t 1 (mod q 1) Find a suitable e to reduce the degree.
18 15 / 27 Find a suitable e Lemma (Find e) Given integers a 1,, a t 1, N satisfying 0<a 1 < <a t 1 <N and gcd(n, a 1,, a t 1 ) = 1, one can find, within 4 t+o(t) bit operations, an integer e with the following property for all i {1,..., t 1}: m 1 ea 1 mod N, m 2 ea 2 mod N,, m t 1 ea t 1 mod N if m i [ N/2, N/2], then m i t 1N t 2 t 1
19 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N
20 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2
21 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2 From Minkowski s Theorem, let m = (m 1, m 2,, m t 1 ) be the shortest vector of lattice L, then, m t 1N t 2 t 1
22 16 / 27 Find a suitable e Find e Consider the lattice L generated by the row vectors of the matrix: a 1 a 2 a t 1 N 0 0 B = 0 N N det(l) N t 2 From Minkowski s Theorem, let m = (m 1, m 2,, m t 1 ) be the shortest vector of lattice L, then, m t 1N t 2 t 1 One can find m by using the Micciancio-Voulgaris algorithm
23 17 / 27 Find a suitable e Find e From m = (m 1, m 2,, m t 1 ) L, then there exists an integer e such that m 1 = ea 1 (mod N), m 2 = ea 2 (mod N),, m t 1 = ea t 1 (mod N) Because gcd(a 1, a 2,, a t 1, N) = 1, one can find integers x 1, x 2,, x t s.t., t 1 x i a i + x t N = 1 Let i=1 t 1 e = x i m i i=1 mod N Therefore, for i, 1 i t 1, we have ea i m i m i m t 1N t 2 t 1 mod N and
24 18 / 27 Proof of main theorem Main theorem Given any univariate t-nomial f (x) = c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 F q [x] We can decide, within 4 t+o(t) q t 2 t 1 +o(1) deterministic bit operations, whether f (x) has a root in F q
25 19 / 27 Proof of main theorem The case of gcd(a 1, a 2, a t 1, q 1) > 1. Let δ = gcd(a 1, a 2, a t 1, q 1). The F q -solvability of f (x) := c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 is equivalent to the solvability of the following system of equations: c 0 + c 1 y a1/δ + + c t 1 y at 1/δ = 0 y q 1 δ = 1
26 20 / 27 Proof of main theorem The main lemma Given a finite field F q and the polynomials ( ) x N 1 and c 0 + c 1 x a c t 1 x a t 1, in F q [x] with 0<a 1 < <a t 1 <N, gcd(n, a 1,, a t 1 ) = 1, c i 0 for all i, and N (q 1), there exists a deterministic q 1/4 (log q) O(1) + 4 t (t log N) O(1) + t 1 2 +o(1) N t 2 t 1 +o(1) (log q) 2+o(1) algorithm to decide whether these two polynomials share a root in F q. Remark: One can find a generator g of F q within q 1/4 (log q) O(1) bit operations. (Shparlinski, 1996)
27 21 / 27 Proof of main theorem Proof of the main lemma we can find an integer e in time 4 t+o(t) by reducing the lattice a 1 a 2 a t 1 N 0 0 B = 0 N N such that if m 1,..., m t 1 are the unique integers in the range [ N/2, N/2 ] respectively congruent to ea 1,..., ea t 1, then m i < t 1N t 2 t 1 for each i {1,..., t 1}.
28 22 / 27 Proof of main theorem Since N (q 1), we have x N 1 x q x, then the roots of x N 1 = 0 the same as x g q 1 N, let ζ N = g q 1 N, and k = gcd(e, N) If k = 1, the map is one-to-one ϕ :< ζ N > < ζ N > x x e finding a solution for ( ) is equivalent to finding x ζ N such that c 0 + c 1 x ea c t 1 x ea t 1 =0 The last equation can be rewritten as the lower degree equation c 0 + c 1 x m c t 1 x m t 1 =0 Time complexity: ( t 1N t 2 t 1 ) 1+o(1) (log q) 2+o(1)
29 23 / 27 Proof of main theorem if k >1, the map from ζ N to ζ N given by x x e is no longer one-to-one. Instead, it sends ζ N to a smaller subgroup ζ k N of order N/k Any element x ζ N can be written as ζn i z for some i {0,..., k 1} and z ζn k Now, gcd(e/k, N/k) = 1, so the map ϕ 1 is one-to-one ϕ 1 :< ζn k > < ζn k > y y e/k
30 24 / 27 Proof of main theorem Let x N 1 = 0 and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 x < ζ N > and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 i, 1 i k, x = (ζ N ) i y, y < ζn k > and c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 i, 1 i k, y < ζn k > and c 0 + c 1 ((ζ N ) i y) a c t 1 ((ζ N ) i y) a t 1 = 0 i, 1 i k, y < ζn k > and c 0 + c 1 ((ζ N ) i y e/k ) a c t 1 ((ζ N ) i y e/k ) a t 1 = 0 i, 1 i k, y N/k 1 = 0 and c 0 + c 1 (ζ N ) a1i y m1/k + + c t 1 (ζ N ) at 1i y mt 1/k = 0 f i (y) = c 0 + c 1 (ζ N ) a 1i y m 1/k + + c t 1 (ζ N ) a t 1i y m t 1/k
31 25 / 27 Proof of main theorem If f i is identically { zero then we have found a whole set of x solutions for N 1 = 0 c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 : the coset ζn i ζk N If f i is not identically zero then let l:=min i min(m i /k, 0) The polynomial z l f i (z) then has degree bounded from above by 2 t 1N t 2 t 1 /k. Deciding whether the pair of equations { y N/k 1 = 0 y l f i (y) = 0 has ( a solution for some i takes deterministic time t ) t 2 1+o(1) k 1N t 1 /k (log q) 2+o(1)
32 26 / 27 Proof of main theorem Roots structure Let γ be the number of f i 0, then the solutions of equations { x N 1 = 0 c 0 + c 1 x a 1 + c 2 x a c t 1 x a t 1 = 0 has two parts over F q. The first part contains at most 2γ t 1N t 2 t 1 /k isolated roots, the other part includes k γ subgroup of F q with order N/k
33 27 / 27 Proof of main theorem Thank you!
SUB-LINEAR ROOT DETECTION, AND NEW HARDNESS RESULTS, FOR SPARSE POLYNOMIALS OVER FINITE FIELDS
SUB-LINEAR ROOT DETECTION, AND NEW HARDNESS RESULTS, FOR SPARSE POLYNOMIALS OVER FINITE FIELDS JINGGUO BI, QI CHENG, AND J. MAURICE ROJAS Abstract. We present a deterministic 2 O(t) q t 2 t 1 +o(1) algorithm
More informationRoots of Sparse Polynomials over a Finite Field
ANTS-XII August 30, 2016 Sparsity-Dependant Bounds f(x) = c 0 + c 1 x a 1 + c 2 x a 2 + + c t x at R[x]. f is sparse if t deg f. Descartes Rule of Signs: The number of positive, real roots of f is bounded
More informationBackground: Lattices and the Learning-with-Errors problem
Background: Lattices and the Learning-with-Errors problem China Summer School on Lattices and Cryptography, June 2014 Starting Point: Linear Equations Easy to solve a linear system of equations A s = b
More informationSub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields
Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields Jingguo Bi Qi Cheng Institute for Advanced Study School of Computer Science Tsinghua University University
More informationM4. Lecture 3. THE LLL ALGORITHM AND COPPERSMITH S METHOD
M4. Lecture 3. THE LLL ALGORITHM AND COPPERSMITH S METHOD Ha Tran, Dung H. Duong, Khuong A. Nguyen. SEAMS summer school 2015 HCM University of Science 1 / 31 1 The LLL algorithm History Applications of
More informationSolving All Lattice Problems in Deterministic Single Exponential Time
Solving All Lattice Problems in Deterministic Single Exponential Time (Joint work with P. Voulgaris, STOC 2010) UCSD March 22, 2011 Lattices Traditional area of mathematics Bridge between number theory
More informationHard Instances of Lattice Problems
Hard Instances of Lattice Problems Average Case - Worst Case Connections Christos Litsas 28 June 2012 Outline Abstract Lattices The Random Class Worst-Case - Average-Case Connection Abstract Christos Litsas
More information1 Shortest Vector Problem
Lattices in Cryptography University of Michigan, Fall 25 Lecture 2 SVP, Gram-Schmidt, LLL Instructor: Chris Peikert Scribe: Hank Carter Shortest Vector Problem Last time we defined the minimum distance
More informationLower Bounds of Shortest Vector Lengths in Random NTRU Lattices
Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices Jingguo Bi 1,2 and Qi Cheng 2 1 School of Mathematics Shandong University Jinan, 250100, P.R. China. Email: jguobi@mail.sdu.edu.cn 2 School
More informationFactoring univariate polynomials over the rationals
Factoring univariate polynomials over the rationals Tommy Hofmann TU Kaiserslautern November 21, 2017 Tommy Hofmann Factoring polynomials over the rationals November 21, 2017 1 / 31 Factoring univariate
More informationLooking back at lattice-based cryptanalysis
September 2009 Lattices A lattice is a discrete subgroup of R n Equivalently, set of integral linear combinations: α 1 b1 + + α n bm with m n Lattice reduction Lattice reduction looks for a good basis
More informationCSC 2414 Lattices in Computer Science October 11, Lecture 5
CSC 244 Lattices in Computer Science October, 2 Lecture 5 Lecturer: Vinod Vaikuntanathan Scribe: Joel Oren In the last class, we studied methods for (approximately) solving the following two problems:
More informationLower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices Jingguo Bi 1 and Qi Cheng 2 1 Lab of Cryptographic Technology and Information Security School of Mathematics
More information9 Knapsack Cryptography
9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and
More informationLattice-Based Cryptography: Mathematical and Computational Background. Chris Peikert Georgia Institute of Technology.
Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013 1 / 18 Lattice-Based Cryptography y = g x mod p m e mod N e(g a, g b
More informationHow to Factor N 1 and N 2 When p 1 = p 2 mod 2 t
How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t Kaoru Kurosawa and Takuma Ueda Ibaraki University, Japan Abstract. Let N 1 = p 1q 1 and N 2 = p 2q 2 be two different RSA moduli. Suppose that p 1 = p 2
More informationCryptanalysis of the Quadratic Generator
Cryptanalysis of the Quadratic Generator Domingo Gomez, Jaime Gutierrez, Alvar Ibeas Faculty of Sciences, University of Cantabria, Santander E 39071, Spain jaime.gutierrez@unican.es Abstract. Let p be
More informationSome Sieving Algorithms for Lattice Problems
Foundations of Software Technology and Theoretical Computer Science (Bangalore) 2008. Editors: R. Hariharan, M. Mukund, V. Vinay; pp - Some Sieving Algorithms for Lattice Problems V. Arvind and Pushkar
More informationCongruences and Residue Class Rings
Congruences and Residue Class Rings (Chapter 2 of J. A. Buchmann, Introduction to Cryptography, 2nd Ed., 2004) Shoichi Hirose Faculty of Engineering, University of Fukui S. Hirose (U. Fukui) Congruences
More informationLattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
1 / 15 Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors Chris Peikert 1 Alon Rosen 2 1 SRI International 2 Harvard SEAS IDC Herzliya STOC 2007 2 / 15 Worst-case versus average-case
More informationFinding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem
Finding Small Solutions of the Equation Bx Ay = z and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang 1, Longjiang Qu 2,3, Chao Li 1,3, and Shaojing Fu 1,2 1 College of Computer,
More informationA Disaggregation Approach for Solving Linear Diophantine Equations 1
Applied Mathematical Sciences, Vol. 12, 2018, no. 18, 871-878 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2018.8687 A Disaggregation Approach for Solving Linear Diophantine Equations 1 Baiyi
More informationAlgorithms for ray class groups and Hilbert class fields
(Quantum) Algorithms for ray class groups and Hilbert class fields Sean Hallgren joint with Kirsten Eisentraeger Penn State 1 Quantum Algorithms Quantum algorithms for number theoretic problems: Factoring
More informationComputational complexity of lattice problems and cyclic lattices
Computational complexity of lattice problems and cyclic lattices Lenny Fukshansky Claremont McKenna College Undergraduate Summer Research Program ICERM - Brown University July 28, 2014 Euclidean lattices
More informationLecture 6.3: Polynomials and irreducibility
Lecture 6.3: Polynomials and irreducibility Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley (Clemson)
More informationHomework problems from Chapters IV-VI: answers and solutions
Homework problems from Chapters IV-VI: answers and solutions IV.21.1. In this problem we have to describe the field F of quotients of the domain D. Note that by definition, F is the set of equivalence
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationSolving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Alexander May, Maike Ritzenhofen Faculty of Mathematics Ruhr-Universität Bochum, 44780 Bochum,
More informationFrom the shortest vector problem to the dihedral hidden subgroup problem
From the shortest vector problem to the dihedral hidden subgroup problem Curtis Bright University of Waterloo December 8, 2011 1 / 19 Reduction Roughly, problem A reduces to problem B means there is a
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationCSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Basis Reduction Instructor: Daniele Micciancio UCSD CSE No efficient algorithm is known to find the shortest vector in a lattice (in arbitrary
More informationA Few Primality Testing Algorithms
A Few Primality Testing Algorithms Donald Brower April 2, 2006 0.1 Introduction These notes will cover a few primality testing algorithms. There are many such, some prove that a number is prime, others
More informationMATH 501 Discrete Mathematics. Lecture 6: Number theory. German University Cairo, Department of Media Engineering and Technology.
MATH 501 Discrete Mathematics Lecture 6: Number theory Prof. Dr. Slim Abdennadher, slim.abdennadher@guc.edu.eg German University Cairo, Department of Media Engineering and Technology 1 Number theory Number
More informationA new attack on RSA with a composed decryption exponent
A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr
More informationAlgebra Homework, Edition 2 9 September 2010
Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.
More informationA Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors Dan Ding 1, Guizhen Zhu 2, Yang Yu 1, Zhongxiang Zheng 1 1 Department of Computer Science
More informationFoundations of Cryptography
Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 7 1 of 18 Cosets Definition 2.12 Let G be a
More informationA Note on the Density of the Multiple Subset Sum Problems
A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,
More informationApplications of Lattice Reduction in Cryptography
Applications of Lattice Reduction in Cryptography Abderrahmane Nitaj University of Caen Basse Normandie, France Kuala Lumpur, Malaysia, June 27, 2014 AK Q ËAÓ Abderrahmane Nitaj (LMNO) Applications of
More informationTop Ehrhart coefficients of integer partition problems
Top Ehrhart coefficients of integer partition problems Jesús A. De Loera Department of Mathematics University of California, Davis Joint Math Meetings San Diego January 2013 Goal: Count the solutions
More informationMATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.
MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same
More informationFor your quiz in recitation this week, refer to these exercise generators:
Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD
More informationFrom the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem
From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection
More informationStraight Line Programs and Torsion Points on Elliptic Curves
Straight Line Programs and Torsion Points on Elliptic Curves Qi Cheng Abstract In this paper, we show several connections between the L-conjecture, proposed by Bürgisser [3], and the boundedness theorem
More informationFast Absolute Irreducibility Testing via Newton Polytopes
Fast Absolute Irreducibility Testing via Newton Polytopes Shuhong Gao and Alan G.B. Lauder Abstract We present a polytope method to test irreducibility of random sparse polynomials over an arbitrary field,
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-13 Recap Divisibility Prime Number Theorem Euclid s Lemma Fundamental Theorem of Arithmetic Euclidean Algorithm Basic Notions - Section
More informationModern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.
1 2 3 style total Math 415 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. Every group of order 6
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationDeterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France
More informationCOUNTING VALUE SETS: ALGORITHM AND COMPLEXITY
COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as
More informationCS Asymptotic Notations for Algorithm Analysis
CS483-02 Asymptotic Notations for Algorithm Analysis Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/
More informationIrreducible Polynomials over Finite Fields
Chapter 4 Irreducible Polynomials over Finite Fields 4.1 Construction of Finite Fields As we will see, modular arithmetic aids in testing the irreducibility of polynomials and even in completely factoring
More informationMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography
More informationPseudorandom Sequences I: Linear Complexity and Related Measures
Pseudorandom Sequences I: Linear Complexity and Related Measures Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University 2010
More informationLattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.
Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.
More informationa + bi by sending α = a + bi to a 2 + b 2. To see properties (1) and (2), it helps to think of complex numbers in polar coordinates:
5. Types of domains It turns out that in number theory the fact that certain rings have unique factorisation has very strong arithmetic consequences. We first write down some definitions. Definition 5.1.
More informationNew attacks on RSA with Moduli N = p r q
New attacks on RSA with Moduli N = p r q Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmane.nitaj@unicaen.fr
More informationFactorization in Integral Domains II
Factorization in Integral Domains II 1 Statement of the main theorem Throughout these notes, unless otherwise specified, R is a UFD with field of quotients F. The main examples will be R = Z, F = Q, and
More informationCentrum Wiskunde & Informatica, Amsterdam, The Netherlands
Logarithmic Lattices Léo Ducas Centrum Wiskunde & Informatica, Amsterdam, The Netherlands Workshop: Computational Challenges in the Theory of Lattices ICERM, Brown University, Providence, RI, USA, April
More informationAlgebraic structures I
MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one
More informationRSA Cryptosystem and Factorization
RSA Cryptosystem and Factorization D. J. Guan Department of Computer Science National Sun Yat Sen University Kaoshiung, Taiwan 80424 R. O. C. guan@cse.nsysu.edu.tw August 25, 2003 RSA Cryptosystem was
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationExplicit Methods in Algebraic Number Theory
Explicit Methods in Algebraic Number Theory Amalia Pizarro Madariaga Instituto de Matemáticas Universidad de Valparaíso, Chile amaliapizarro@uvcl 1 Lecture 1 11 Number fields and ring of integers Algebraic
More informationCSE 206A: Lattice Algorithms and Applications Spring Minkowski s theorem. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Minkowski s theorem Instructor: Daniele Micciancio UCSD CSE There are many important quantities associated to a lattice. Some of them, like the
More informationThe Shortest Vector Problem (Lattice Reduction Algorithms)
The Shortest Vector Problem (Lattice Reduction Algorithms) Approximation Algorithms by V. Vazirani, Chapter 27 - Problem statement, general discussion - Lattices: brief introduction - The Gauss algorithm
More informationFields in Cryptography. Çetin Kaya Koç Winter / 30
Fields in Cryptography http://koclab.org Çetin Kaya Koç Winter 2017 1 / 30 Field Axioms Fields in Cryptography A field F consists of a set S and two operations which we will call addition and multiplication,
More informationElliptic curves and Hilbert s Tenth Problem
Elliptic curves and Hilbert s Tenth Problem Karl Rubin, UC Irvine MAA @ UC Irvine October 16, 2010 Karl Rubin Elliptic curves and Hilbert s Tenth Problem MAA, October 2010 1 / 40 Elliptic curves An elliptic
More informationCS Asymptotic Notations for Algorithm Analysis Outline
CS483-02 Asymptotic Notations for Algorithm Analysis Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/
More informationGALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)
GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over
More informationCorollary 4.2 (Pepin s Test, 1877). Let F k = 2 2k + 1, the kth Fermat number, where k 1. Then F k is prime iff 3 F k 1
4. Primality testing 4.1. Introduction. Factorisation is concerned with the problem of developing efficient algorithms to express a given positive integer n > 1 as a product of powers of distinct primes.
More informationOn the complexity of polynomial system solving
Bruno Grenet LIX École Polytechnique partly based on a joint work with Pascal Koiran & Natacha Portier XXVèmes rencontres arithmétiques de Caen Île de Tatihou, June 30. July 4., 2014 Is there a (nonzero)
More informationOn the Optimality of Lattices for the Coppersmith Technique
On the Optimality of Lattices for the Coppersmith Technique Yoshinori Aono Manindra Agrawal Takakazu Satoh Osamu Watanabe December 18, 2015 Abstract We investigate a method for finding small integer solutions
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationAlgebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3...
Algebra Exam Fall 2006 Alexander J. Wertheim Last Updated: October 26, 2017 Contents 1 Groups 2 1.1 Problem 1..................................... 2 1.2 Problem 2..................................... 2
More informationAlgebraic number theory
Algebraic number theory F.Beukers February 2011 1 Algebraic Number Theory, a crash course 1.1 Number fields Let K be a field which contains Q. Then K is a Q-vector space. We call K a number field if dim
More informationAn arithmetic Bernštein-Kušnirenko inequality
An arithmetic Bernštein-Kušnirenko inequality César Martínez joint with Martín Sombra Laboratoire de Mathématiques Nicolas Oresme Université de Caen Normandie MEGA June 12th 2017 Schema Counting the number
More informationSome Lattice Attacks on DSA and ECDSA
Some Lattice Attacks on DSA and ECDSA Dimitrios Poulakis Department of Mathematics, Aristotle University of Thessaloniki, Thessaloniki 54124, Greece, email:poulakis@math.auth.gr November 10, 2010 Abstract
More informationParity of the Number of Irreducible Factors for Composite Polynomials
Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields
More informationChapter 14: Divisibility and factorization
Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter
More informationMetacommutation of Hurwitz primes
Metacommutation of Hurwitz primes Abhinav Kumar MIT Joint work with Henry Cohn January 10, 2013 Quaternions and Hurwitz integers Recall the skew-field of real quaternions H = R+Ri +Rj +Rk, with i 2 = j
More informationGentry s SWHE Scheme
Homomorphic Encryption and Lattices, Spring 011 Instructor: Shai Halevi May 19, 011 Gentry s SWHE Scheme Scribe: Ran Cohen In this lecture we review Gentry s somewhat homomorphic encryption (SWHE) scheme.
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationRunning head: IDEAL LATTICE CRYPTOGRAPHY 1. Ideal Lattice Cryptography: Escaping the Cryptopocalypse. Stephen Gillen. Georgia Institute of Technology
Running head: IDEAL LATTICE CRYPTOGRAPHY 1 Ideal Lattice Cryptography: Escaping the Cryptopocalypse Stephen Gillen Georgia Institute of Technology MATH 6122 Algebra II April 29, 2016 IDEAL LATTICE CRYPTOGRAPHY
More informationElliptic curves: Theory and Applications. Day 3: Counting points.
Elliptic curves: Theory and Applications. Day 3: Counting points. Elisa Lorenzo García Université de Rennes 1 13-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 3 13-09-2017 1 / 26 Counting points:
More informationPage Points Possible Points. Total 200
Instructions: 1. The point value of each exercise occurs adjacent to the problem. 2. No books or notes or calculators are allowed. Page Points Possible Points 2 20 3 20 4 18 5 18 6 24 7 18 8 24 9 20 10
More information1. Algebra 1.7. Prime numbers
1. ALGEBRA 30 1. Algebra 1.7. Prime numbers Definition Let n Z, with n 2. If n is not a prime number, then n is called a composite number. We look for a way to test if a given positive integer is prime
More informationLattices, Cryptography, and NTRU. An introduction to lattice theory and the NTRU cryptosystem. Ahsan Z. Zahid
Lattices, Cryptography, and NTRU An introduction to lattice theory and the NTRU cryptosystem Ahsan Z. Zahid A thesis presented for the degree of Bachelor of Science School of Science St. Mary s College
More informationCryptanalysis via Lattice Techniques
Cryptanalysis via Lattice Techniques Alexander May Horst Görtz Institute for IT-Security Faculty of Mathematics Ruhr-University Bochum crypt@b-it 2010, Aug 2010, Bonn Lecture 1, Mon Aug 2 Introduction
More informationCYCLOTOMIC POLYNOMIALS
CYCLOTOMIC POLYNOMIALS 1. The Derivative and Repeated Factors The usual definition of derivative in calculus involves the nonalgebraic notion of limit that requires a field such as R or C (or others) where
More informationGraduate Preliminary Examination
Graduate Preliminary Examination Algebra II 18.2.2005: 3 hours Problem 1. Prove or give a counter-example to the following statement: If M/L and L/K are algebraic extensions of fields, then M/K is algebraic.
More informationDividing Polynomials: Remainder and Factor Theorems
Dividing Polynomials: Remainder and Factor Theorems When we divide one polynomial by another, we obtain a quotient and a remainder. If the remainder is zero, then the divisor is a factor of the dividend.
More informationSimultaneous Linear, and Non-linear Congruences
Simultaneous Linear, and Non-linear Congruences CIS002-2 Computational Alegrba and Number Theory David Goodwin david.goodwin@perisic.com 09:00, Friday 18 th November 2011 Outline 1 Polynomials 2 Linear
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationLecture 7.5: Euclidean domains and algebraic integers
Lecture 7.5: Euclidean domains and algebraic integers Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley
More informationLattice Basis Reduction and the LLL Algorithm
Lattice Basis Reduction and the LLL Algorithm Curtis Bright May 21, 2009 1 2 Point Lattices A point lattice is a discrete additive subgroup of R n. A basis for a lattice L R n is a set of linearly independent
More informationSPARSE UNIVARIATE POLYNOMIALS WITH MANY ROOTS OVER FINITE FIELDS
SPARSE UNIVARIATE POLYNOMIALS WITH MANY ROOTS OVER FINITE FIELDS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN Abstract. Supposeq isaprimepowerandf F q [x]isaunivariatepolynomialwithexactly t
More informationCYCLOTOMIC POLYNOMIALS
CYCLOTOMIC POLYNOMIALS 1. The Derivative and Repeated Factors The usual definition of derivative in calculus involves the nonalgebraic notion of limit that requires a field such as R or C (or others) where
More informationInteger Factorization using lattices
Integer Factorization using lattices Antonio Vera INRIA Nancy/CARAMEL team/anr CADO/ANR LAREDA Workshop Lattice Algorithmics - CIRM - February 2010 Plan Introduction Plan Introduction Outline of the algorithm
More informationAlgebra Qualifying Exam Solutions. Thomas Goller
Algebra Qualifying Exam Solutions Thomas Goller September 4, 2 Contents Spring 2 2 2 Fall 2 8 3 Spring 2 3 4 Fall 29 7 5 Spring 29 2 6 Fall 28 25 Chapter Spring 2. The claim as stated is false. The identity
More information