An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero

J. Cheon, Jinhyuck Jeong, Changmin Lee
{"title":"An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero","authors":"J. Cheon, Jinhyuck Jeong, Changmin Lee","doi":"10.1112/S1461157016000371","DOIUrl":null,"url":null,"abstract":"Let f and g be polynomials of a bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given the polynomial [f/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with a small Euclidean norm such that [a/b]q = [f/g]q. We propose an algorithm to solve the NTRU problem, which runs in 2 2 λ) time when ∥g∥, ∥f∥, and ∥g−1∥ are within some range. The main technique of our algorithm is the reduction of a problem on a field to one in a subfield. Recently, the GGH scheme, the first candidate of a (approximate) multilinear map, was found to be insecure by the Hu–Jia attack using low-level encodings of zero, but no polynomial-time attack was known without them. In the GGH scheme without low-level encodings of zero, our algorithm can be directly applied to attack this scheme if we have some top-level encodings of zero and a known pair of plaintext and ciphertext. Using our algorithm, we can construct a level-0 encoding of zero and utilize it to attack a security ground of this scheme in the quasi-polynomial time of its security parameter using the parameters suggested by [GGH13].","PeriodicalId":54381,"journal":{"name":"Lms Journal of Computation and Mathematics","volume":"19 1","pages":"255-266"},"PeriodicalIF":0.0000,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1112/S1461157016000371","citationCount":"104","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lms Journal of Computation and Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1112/S1461157016000371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 104

Abstract

Let f and g be polynomials of a bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given the polynomial [f/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with a small Euclidean norm such that [a/b]q = [f/g]q. We propose an algorithm to solve the NTRU problem, which runs in 2 2 λ) time when ∥g∥, ∥f∥, and ∥g−1∥ are within some range. The main technique of our algorithm is the reduction of a problem on a field to one in a subfield. Recently, the GGH scheme, the first candidate of a (approximate) multilinear map, was found to be insecure by the Hu–Jia attack using low-level encodings of zero, but no polynomial-time attack was known without them. In the GGH scheme without low-level encodings of zero, our algorithm can be directly applied to attack this scheme if we have some top-level encodings of zero and a known pair of plaintext and ciphertext. Using our algorithm, we can construct a level-0 encoding of zero and utilize it to attack a security ground of this scheme in the quasi-polynomial time of its security parameter using the parameters suggested by [GGH13].
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无低阶零编码的GGH多线性映射的NTRU问题和密码分析算法
设f和g是环Z[X]/⟨X+1⟩中有界欧几里德范数的多项式。给定多项式[f/g]q∈Zq[X]/⟨X+1⟩,NTRU问题是找到a, b∈Z[X]/⟨X +1⟩具有一个小欧几里德范数,使得[a/b]q = [f/g]q。我们提出了一种求解NTRU问题的算法,当∥g∥、∥f∥和∥g−1∥在一定范围内时,该算法在22 λ)时间内运行。该算法的主要技术是将一个域上的问题简化为子域上的问题。最近,使用低阶零编码的Hu-Jia攻击发现(近似)多线性映射的第一候选GGH方案是不安全的,但没有使用它们的多项式时间攻击是已知的。在没有底层零编码的GGH方案中,只要我们有一些顶层零编码和一对已知的明文和密文,我们的算法就可以直接应用于攻击该方案。使用我们的算法,我们可以构造0的0级编码,并利用[GGH13]给出的参数在其安全参数的拟多项式时间内攻击该方案的一个安全地面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Lms Journal of Computation and Mathematics
Lms Journal of Computation and Mathematics MATHEMATICS, APPLIED-MATHEMATICS
CiteScore
2.60
自引率
0.00%
发文量
0
审稿时长
>12 weeks
期刊介绍: LMS Journal of Computation and Mathematics has ceased publication. Its final volume is Volume 20 (2017). LMS Journal of Computation and Mathematics is an electronic-only resource that comprises papers on the computational aspects of mathematics, mathematical aspects of computation, and papers in mathematics which benefit from having been published electronically. The journal is refereed to the same high standard as the established LMS journals, and carries a commitment from the LMS to keep it archived into the indefinite future. Access is free until further notice.
期刊最新文献
Bayesian outcome selection modeling. The Relative Consistency of the Axiom of Choice Mechanized Using Isabelle⁄zf The Linear Programming Relaxation Permutation Symmetry Group of an Orthogonal Array Defining Integer Linear Program Lens Spaces, Isospectral on Forms but not on Functions Treatment for third-order nonlinear differential equations based on the Adomian decomposition method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1