首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Universal partial tori 泛偏环面
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01609-9
William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu

A De Bruijn cycle is a cyclic sequence in which every word of length n over an alphabet (mathcal {A}) appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.

德布鲁因循环是一个循环序列,在这个循环序列中,字母表中长度为n的每个单词(mathcal {A})只出现一次。De Bruijn tori是二维的类似物。受通用偏环和使用通配符缩短德布鲁因循环的词的最新进展的激励,我们引入了通用偏环面和矩阵。我们通过计算找到它们,并使用泛环的一维变体,包括一种称为泛部分族的新变体,构造出无限多个泛环。
{"title":"Universal partial tori","authors":"William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu","doi":"10.1007/s10623-025-01609-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01609-9","url":null,"abstract":"<p>A De Bruijn cycle is a cyclic sequence in which every word of length <i>n</i> over an alphabet <span>(mathcal {A})</span> appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the isomorphism of NFSRs via a general framework of bijections 用双射的一般框架研究nfsr的同构性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01622-y
Jingtao Xiong, Jianghua Zhong, Dongdai Lin

Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.

非线性反馈移位寄存器(NFSRs)是当前许多流密码中使用的主要模块。如果两个nfsr的状态图是同构的,则称它们是同构的;如果它们的输出序列集合相等,则称它们是等价的。到目前为止,关于相同位元数的nfsr的等价性研究已经很多了,但是关于它们的同构性研究却很少。实际上,具有相同位元数的nfsr的等价问题可以转化为它们的同构问题。后者通常很难得到,但如果能显式地表示出它们的状态和逆射之间的反射,则可以求解。本文通过建立双射的一般框架来研究nfsr的同构性。它首先给出基本的双音。然后给出了双射的统一公式,并揭示了任何双射都可以表示为有限个基本双射的复合,建立了双射的一般框架。在一般框架的基础上,从理论上揭示了如何获得与给定的伽罗瓦NFSR同构的所有伽罗瓦NFSR,然后揭示了先前类型的伽罗瓦NFSR与它们自己等效的Fibonacci NFSR之间的状态对偶。最后,提出了一种新的伽罗瓦NFSRs,它是同构的,并进一步等效于斐波那契NFSRs,覆盖和改进了大多数已知的等效于斐波那契NFSRs的伽罗瓦NFSRs类型。
{"title":"Studying the isomorphism of NFSRs via a general framework of bijections","authors":"Jingtao Xiong, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-025-01622-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01622-y","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The complete weight enumerator of the square of one-weight irreducible cyclic codes 一权不可约循环码平方的完全权枚举数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01620-0
Canze Zhu

In this paper, for an odd prime power q and an integer (mge 2), let (mathcal {C}(q,m)) be a one-weight irreducible cyclic code with parameters ([q^m-1,m,(q-1)q^{m-1}]), we consider the complete weight enumerator and the weight distribution of the square (big (mathcal {C}(q,m)big )^2), whose dual has (lfloor frac{m}{2}rfloor +1) zeros. Using the character sums method and the known result of counting (mtimes m) symmetric matrices over (mathbb {F}_q) with given rank, we explicitly determine the complete weight enumerator of (left( mathcal {C}(q,m)right) ^2) and show that (left( mathcal {C}(q,m)right) ^2) is a ((2lfloor frac{m}{2}rfloor +1))-weight cyclic code with parameters ([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})]). Moreover, we get the weight distribution of the square of the simplex code by puncturing the last (frac{(q-2)(q^m-1)}{q-1}) coordinates of (left( mathcal {C}(q,m)right) ^2).

对于奇数素数幂q和整数(mge 2),设(mathcal {C}(q,m))是一个参数为([q^m-1,m,(q-1)q^{m-1}])的单权不可约循环码,考虑其对偶为(lfloor frac{m}{2}rfloor +1)零的平方(big (mathcal {C}(q,m)big )^2)的完全权枚举数和权分布。利用字符和方法和已知的对给定秩的(mathbb {F}_q)上的(mtimes m)对称矩阵计数的结果,明确地确定了(left( mathcal {C}(q,m)right) ^2)的完全权数枚举数,并证明了(left( mathcal {C}(q,m)right) ^2)是一个参数为([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])的((2lfloor frac{m}{2}rfloor +1)) -权循环码。此外,通过对(left( mathcal {C}(q,m)right) ^2)的最后一个(frac{(q-2)(q^m-1)}{q-1})坐标进行穿刺,得到了单纯形码的平方权重分布。
{"title":"The complete weight enumerator of the square of one-weight irreducible cyclic codes","authors":"Canze Zhu","doi":"10.1007/s10623-025-01620-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01620-0","url":null,"abstract":"<p>In this paper, for an odd prime power <i>q</i> and an integer <span>(mge 2)</span>, let <span>(mathcal {C}(q,m))</span> be a one-weight irreducible cyclic code with parameters <span>([q^m-1,m,(q-1)q^{m-1}])</span>, we consider the complete weight enumerator and the weight distribution of the square <span>(big (mathcal {C}(q,m)big )^2)</span>, whose dual has <span>(lfloor frac{m}{2}rfloor +1)</span> zeros. Using the character sums method and the known result of counting <span>(mtimes m)</span> symmetric matrices over <span>(mathbb {F}_q)</span> with given rank, we explicitly determine the complete weight enumerator of <span>(left( mathcal {C}(q,m)right) ^2)</span> and show that <span>(left( mathcal {C}(q,m)right) ^2)</span> is a <span>((2lfloor frac{m}{2}rfloor +1))</span>-weight cyclic code with parameters <span>([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])</span>. Moreover, we get the weight distribution of the square of the simplex code by puncturing the last <span>(frac{(q-2)(q^m-1)}{q-1})</span> coordinates of <span>(left( mathcal {C}(q,m)right) ^2)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limitations of the decoding-to-LPN reduction via code smoothing 通过代码平滑降低解码到lpn的局限性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01617-9
Madhura Pathegama, Alexander Barg

The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.

噪声学习奇偶性(LPN)问题强调了几个经典的密码学原语。研究人员试图通过从线性码的解码问题中找到一个约简来显示这个问题的算法难度,其中存在几个硬度结果。早期的研究使用代码平滑作为技术工具来实现具有消失率的代码的这种减少。这就留下了用正码实现还原的问题。针对这种情况,我们根据解码和LPN问题的参数来表征约简的效率。作为结论,我们隔离了有意义的缩减是可能的和不太可能存在的参数区域。
{"title":"Limitations of the decoding-to-LPN reduction via code smoothing","authors":"Madhura Pathegama, Alexander Barg","doi":"10.1007/s10623-025-01617-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01617-9","url":null,"abstract":"<p>The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary stretch embedding of weighted graphs 加权图的二元拉伸嵌入
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-21 DOI: 10.1007/s10623-025-01608-w
Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab

In this paper, we introduce and study the problem of binary stretch embedding of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph G is to find a mapping from the vertex set of G, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of G. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of G. This embedding type problem is closely related to the well-known addressing problem of Graham and Pollak and isometric hypercube embedding problem of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.

本文介绍并研究了边权图在整数和分数两种情况下的二值拉伸嵌入问题。粗略地说,加权图G的二值拉伸嵌入问题就是找到一个从G的顶点集到超立方图的顶点的映射,使得每对顶点之间的距离在映射下不减小,因此称为二值拉伸嵌入。存在这种伸缩嵌入的超立方体的最小维称为g的二进制寻址数。我们证明了加权图的二进制寻址数是整数规划的最优值。相应的线性松弛问题的最优值称为g的分数二进制寻址数。这种嵌入型问题与著名的Graham和Pollak寻址问题以及Firsov的等距超立方体嵌入问题密切相关。使用工具和技术,如Hadamard编码和线性规划理论,帮助我们找到上和下界,近似值,或精确值的二进制寻址数和图的分数变体。作为我们的结果的一个应用,我们导出了某些参数的李度量码的最大尺寸的改进上界或精确值。
{"title":"Binary stretch embedding of weighted graphs","authors":"Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab","doi":"10.1007/s10623-025-01608-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01608-w","url":null,"abstract":"<p>In this paper, we introduce and study the problem of <i>binary stretch embedding</i> of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph <i>G</i> is to find a mapping from the vertex set of <i>G</i>, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of <i>G</i>. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of <i>G</i>. This embedding type problem is closely related to the well-known <i>addressing problem</i> of Graham and Pollak and <i>isometric hypercube embedding problem</i> of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143666542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive combinatorial designs 加性组合设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-20 DOI: 10.1007/s10623-025-01594-z
Marco Buratti, Francesca Merola, Anamari Nakić

A (2-(v, k, lambda )) design is additive if, up to isomorphism, the point set is a subset of an abelian group G and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph (Gamma ), an additive ((K_v,Gamma ))-design is a decomposition of the graph (K_v) into subgraphs (blocks) (B_1,dots ,B_t) all isomorphic to (Gamma ), such that the vertex set (V(K_v)) is a subset of an abelian group G, and the sets (V(B_1), dots , V(B_t)) are zero-sum in G. In this work we begin the study of additive ((K_v,Gamma ))-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs (Gamma ), for instance cycles, paths, and k-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.

(2-(v, k, lambda ))设计是可加性的,如果点集是一个阿贝尔群G的子集,并且每个块都是零和的。这个定义在Caggegi et al. (J Algebr Comb 45:271-294, 2017)中被引入,并且是一个有趣的新理论的起点。虽然已经构建了许多附加设计,并且已知的设计已被证明是附加的,但这些结构似乎很难构建,特别是当我们寻找附加的斯坦纳2设计时。我们可以用一种自然的方式将加性Steiner 2-设计推广到图分解:给定一个简单图(Gamma ),一个可加性((K_v,Gamma )) -设计是将图(K_v)分解成与(Gamma )同构的子图(块)(B_1,dots ,B_t),使得顶点集(V(K_v))是一个阿贝尔群G的子集,集合(V(B_1), dots , V(B_t))在G中是零和的。在这项工作中,我们开始研究可加性((K_v,Gamma )) -设计:我们开发了不同的工具来构建这些结构,并应用它们来获得一些无限类的设计和许多零星的例子。我们将考虑分解成各种图(Gamma ),例如循环、路径和k匹配。类似的想法也将允许我们在这里提出一个零星的加法2-(124,4,1)设计。
{"title":"Additive combinatorial designs","authors":"Marco Buratti, Francesca Merola, Anamari Nakić","doi":"10.1007/s10623-025-01594-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01594-z","url":null,"abstract":"<p>A <span>(2-(v, k, lambda ))</span> design is additive if, up to isomorphism, the point set is a subset of an abelian group <i>G</i> and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph <span>(Gamma )</span>, an <i>additive </i><span>((K_v,Gamma ))</span><i>-design</i> is a decomposition of the graph <span>(K_v)</span> into subgraphs (<i>blocks</i>) <span>(B_1,dots ,B_t)</span> all isomorphic to <span>(Gamma )</span>, such that the vertex set <span>(V(K_v))</span> is a subset of an abelian group <i>G</i>, and the sets <span>(V(B_1), dots , V(B_t))</span> are zero-sum in <i>G</i>. In this work we begin the study of additive <span>((K_v,Gamma ))</span>-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs <span>(Gamma )</span>, for instance cycles, paths, and <i>k</i>-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143661406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An attack on p-adic lattice public-key encryption cryptosystems and signature schemes 对 p 演算网格公钥加密密码系统和签名方案的攻击
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-18 DOI: 10.1007/s10623-025-01618-8
Chi Zhang

Lattices have many significant applications in cryptography. In 2021, the p-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in p-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper, we improve the LVP algorithm in local fields. The modified LVP algorithm is a deterministic polynomial time algorithm when the field is totally ramified and p is a polynomial in the rank of the input lattice. We utilize this algorithm to attack the above schemes so that we are able to forge a valid signature of any message and decrypt any ciphertext. Although these schemes are broken, this work does not mean that p-adic lattices are not suitable in constructing cryptographic primitives. We propose some possible modifications to avoid our attack at the end of this paper.

格在密码学中有许多重要的应用。在2021年,引入了p进签名方案和公钥加密密码系统。它们基于p进格中的最长向量问题(LVP)和最近向量问题(CVP)。这些问题被认为是具有挑战性的,并且没有已知的确定性多项式时间算法来解决它们。本文对局部域的LVP算法进行了改进。改进的LVP算法是一个确定的多项式时间算法,当域是完全分叉时,p是输入格中秩的多项式。我们利用此算法攻击上述方案,以便我们能够伪造任何消息的有效签名并解密任何密文。虽然这些方案被破坏了,但这并不意味着p进格不适合构造密码原语。在本文的最后,我们提出了一些可能的修改来避免我们的攻击。
{"title":"An attack on p-adic lattice public-key encryption cryptosystems and signature schemes","authors":"Chi Zhang","doi":"10.1007/s10623-025-01618-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01618-8","url":null,"abstract":"<p>Lattices have many significant applications in cryptography. In 2021, the <i>p</i>-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in <i>p</i>-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper, we improve the LVP algorithm in local fields. The modified LVP algorithm is a deterministic polynomial time algorithm when the field is totally ramified and <i>p</i> is a polynomial in the rank of the input lattice. We utilize this algorithm to attack the above schemes so that we are able to forge a valid signature of any message and decrypt any ciphertext. Although these schemes are broken, this work does not mean that <i>p</i>-adic lattices are not suitable in constructing cryptographic primitives. We propose some possible modifications to avoid our attack at the end of this paper.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"69 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143640437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new framework for fast homomorphic matrix multiplication 一个新的快速同态矩阵乘法框架
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-15 DOI: 10.1007/s10623-025-01614-y
Xiaopeng Zheng, Hongbo Li, Dingkang Wang

Homomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size (r times s) and (s times t) respectively, which requires only (O(log n)) basic homomorphic operations if (rst le n), where n is dimension of the polynomial ring used in RLWE encryption. Our method was implemented in HElib using the BGV scheme. Experimental results show that the new framework has significant advantage in efficiency when (rst le n). In this case, the new framework is 1.2 to 106.8 times faster than exiting algorithms in experiments.

同态加密(HE)是用于实现安全外包计算的主流加密工具之一。一个典型的任务是安全矩阵计算,这是各种外包计算应用程序(如统计分析和机器学习)中使用的基本操作。本文给出了两个具有大小的矩阵的安全乘法的一个新框架 (r times s) 和 (s times t) 分别,其中只要求 (O(log n)) 基本同态运算 (rst le n),其中n为RLWE加密中使用的多项式环的维数。我们的方法在HElib中使用BGV方案实现。实验结果表明,该框架具有显著的效率优势 (rst le n). 在这种情况下,新框架比实验中的现有算法快1.2到106.8倍。
{"title":"A new framework for fast homomorphic matrix multiplication","authors":"Xiaopeng Zheng, Hongbo Li, Dingkang Wang","doi":"10.1007/s10623-025-01614-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01614-y","url":null,"abstract":"<p>Homomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size <span>(r times s)</span> and <span>(s times t)</span> respectively, which requires only <span>(O(log n))</span> basic homomorphic operations if <span>(rst le n)</span>, where <i>n</i> is dimension of the polynomial ring used in RLWE encryption. Our method was implemented in HElib using the BGV scheme. Experimental results show that the new framework has significant advantage in efficiency when <span>(rst le n)</span>. In this case, the new framework is 1.2 to 106.8 times faster than exiting algorithms in experiments.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143627620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resolution of the exceptional APN conjecture in the Gold degree case 金度情况下异常APN猜想的解决
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-14 DOI: 10.1007/s10623-025-01607-x
Carlos Agrinsoni, Heeralal Janwa, Moises Delgado

A function (f: {mathbb {F}}_q rightarrow {mathbb {F}}_q), is called an almost perfect nonlinear (APN) if (f(X+a)-f(X) =b) has at most 2 solutions for every (b,a in {mathbb {F}}_q), with a nonzero. Furthermore, it is called an exceptional APN if it is an APN on infinitely many extensions of ({mathbb {F}}_q). These problems are equivalent to finding rational points on the corresponding variety ({mathcal {X}}_f:=phi _f(X,Y,Z)=0). The Lang–Weil, Deligne, and Ghorpade–Lachaud bounds help solve these problems when (phi _f) contains an absolutely irreducible factor in the defining field. The exceptional monomial APN functions had been classified up to CCZ equivalence by Hernando and McGuire (J Algebra 343:78–92, 2011), proving the conjecture of Janwa, Wilson, and McGuire (JMW) (1993, 1995). The main tools used were the computation and classification of the singularities of ({mathcal {X}}_f) and the algorithm of JMW for the absolute irreducibility testing using Bezout’s Theorem. Aubry et al. (2010) conjectured that the only exceptional APN functions of odd degree up to CCZ equivalence are the Gold ((2^k+1)) and the Kasami-Welch ((2^{2k}-2^k+1)) monomial functions. Here, we settle the first case (Theorem 20). We also prove a part of a conjecture on exceptional crooked functions. One of the main tools in our proofs is our new absolute irreducibility criterion (Theorem 9).

一个函数(f: {mathbb {F}}_q rightarrow {mathbb {F}}_q),如果(f(X+a)-f(X) =b)对每个(b,a in {mathbb {F}}_q)最多有2个解,且有一个非零解,则称为几乎完美非线性(APN)。此外,如果它是({mathbb {F}}_q)无穷多个扩展上的APN,则称为例外APN。这些问题等价于在相应的变量({mathcal {X}}_f:=phi _f(X,Y,Z)=0)上寻找有理点。Lang-Weil, Deligne和Ghorpade-Lachaud界有助于解决这些问题,当(phi _f)在定义场中包含绝对不可约的因子时。Hernando和McGuire (J Algebra 343:78-92, 2011)将异常单项式APN函数归为CCZ等价,证明了Janwa, Wilson, and McGuire (JMW)(1993,1995)的猜想。使用的主要工具是({mathcal {X}}_f)奇异点的计算和分类,以及使用Bezout定理进行绝对不可约性检验的JMW算法。Aubry等人(2010)推测,奇异度达到CCZ等价的APN函数只有Gold ((2^k+1))和Kasami-Welch ((2^{2k}-2^k+1))单项式函数。这里,我们解决第一种情况(定理20)。我们还证明了关于异常弯曲函数的部分猜想。我们证明的主要工具之一是我们新的绝对不可约准则(定理9)。
{"title":"Resolution of the exceptional APN conjecture in the Gold degree case","authors":"Carlos Agrinsoni, Heeralal Janwa, Moises Delgado","doi":"10.1007/s10623-025-01607-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01607-x","url":null,"abstract":"<p>A function <span>(f: {mathbb {F}}_q rightarrow {mathbb {F}}_q)</span>, is called an <i>almost perfect nonlinear </i> (APN) if <span>(f(X+a)-f(X) =b)</span> has at most 2 solutions for every <span>(b,a in {mathbb {F}}_q)</span>, with <i>a</i> nonzero. Furthermore, it is called an exceptional APN if it is an APN on infinitely many extensions of <span>({mathbb {F}}_q)</span>. These problems are equivalent to finding rational points on the corresponding variety <span>({mathcal {X}}_f:=phi _f(X,Y,Z)=0)</span>. The Lang–Weil, Deligne, and Ghorpade–Lachaud bounds help solve these problems when <span>(phi _f)</span> contains an absolutely irreducible factor in the defining field. The exceptional monomial APN functions had been classified up to CCZ equivalence by Hernando and McGuire (J Algebra 343:78–92, 2011), proving the conjecture of Janwa, Wilson, and McGuire (JMW) (1993, 1995). The main tools used were the computation and classification of the singularities of <span>({mathcal {X}}_f)</span> and the algorithm of JMW for the absolute irreducibility testing using Bezout’s Theorem. Aubry et al. (2010) conjectured that the only exceptional APN functions of odd degree up to CCZ equivalence are the Gold <span>((2^k+1))</span> and the Kasami-Welch <span>((2^{2k}-2^k+1))</span> monomial functions. Here, we settle the first case (Theorem 20). We also prove a part of a conjecture on exceptional crooked functions. One of the main tools in our proofs is our new absolute irreducibility criterion (Theorem 9).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143618460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY 分组密码的广义不可能差分攻击:在SKINNY和ForkSKINNY上的应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-14 DOI: 10.1007/s10623-025-01611-1
Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu

Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura et al. first proposed a new key recovery technique—the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (IDMA) framework. We apply IDMA to block ciphers SKINNY, SKINNYe-v2, and ForkSKINNY and achieve remarkably efficient attacks. We improve the impossible differential attack on SKINNY-n-3n by 2 rounds in the single-tweakey setting and 1 round in the related-tweakey setting. For SKINNYe-v2, the impossible differential attacks now can cover 2 more rounds in the related-tweakey setting and the first 23/24/25-round attacks in the single-tweakey model are given. For ForkSKINNY-n-3n, we improve the attacks by 2 rounds in the limited setting specified by the designers and 1 round in relaxed settings. These results confirm that the meet-in-the-middle technique can result in more efficient key recovery, reaching beyond what traditional methods can achieve on certain ciphers.

不可能差分密码分析是对称密码的一种重要密码分析方法。给定一个不可能的差分,密钥恢复攻击通常分两步进行:生成数据对,然后使用猜测和过滤方法识别错误的密钥。在CRYPTO 2023大会上,Boura等人首次提出了一种新的密钥恢复技术——差分中间相遇攻击(differential meet-in-the-middle attack),以中间相遇的方式恢复密钥。受此技术的启发,我们将中间相遇技术结合到不可能密码分析中,并提出了一个通用的不可能差分中间相遇攻击(IDMA)框架。我们将IDMA应用于密码SKINNY、SKINNYe-v2和ForkSKINNY,实现了非常高效的攻击。我们改进了对SKINNY-n-3n的不可能差分攻击,在单一微调设置下提高了2轮,在相关微调设置下提高了1轮。对于SKINNYe-v2,现在不可能的差异攻击可以在相关调整设置中覆盖2轮以上,并且在单一调整模型中给出了前23/24/25轮攻击。对于ForkSKINNY-n-3n,我们在设计师指定的有限设置中将攻击次数提高了2轮,在宽松设置中将攻击次数提高了1轮。这些结果证实,中间相遇技术可以实现更有效的密钥恢复,达到传统方法在某些密码上无法达到的效果。
{"title":"Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY","authors":"Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu","doi":"10.1007/s10623-025-01611-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01611-1","url":null,"abstract":"<p>Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura <i>et al.</i> first proposed a new key recovery technique—the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (<span>IDMA</span>) framework. We apply <span>IDMA</span> to block ciphers <span>SKINNY</span>, <span>SKINNYe</span>-v2, and <span>ForkSKINNY</span> and achieve remarkably efficient attacks. We improve the impossible differential attack on <span>SKINNY</span>-<i>n</i>-3<i>n</i> by 2 rounds in the single-tweakey setting and 1 round in the related-tweakey setting. For <span>SKINNYe</span>-v2, the impossible differential attacks now can cover 2 more rounds in the related-tweakey setting and the first 23/24/25-round attacks in the single-tweakey model are given. For <span>ForkSKINNY</span>-<i>n</i>-3<i>n</i>, we improve the attacks by 2 rounds in the limited setting specified by the designers and 1 round in relaxed settings. These results confirm that the meet-in-the-middle technique can result in more efficient key recovery, reaching beyond what traditional methods can achieve on certain ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143618461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1