首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Derivative descendants of cyclic codes and constacyclic codes 循环码和恒循环码的派生后代
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01536-1
Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou

Cyclic codes, as a special type of constacyclic codes, have been extensively studied due to their favorable theoretical and mathematical properties. Very recently, by using the derivative of the Mattson-Solomon polynomials, Huang and Zhang (IEEE Trans Inf Theor 70(4):2395–2410, 2024) studied the cyclic derivative descendants (DDs) and linear DDs of binary extended cyclic codes and proposed the corresponding derivative decoding methods. One objective of this paper is to generalize these conclusions to q-ary extended cyclic codes with group algebra theory. It demonstrates that the cyclic DDs of a q-ary extended cyclic code are the same codes and its linear DDs are equivalent codes. In addition, we show that the relevant results can be generalized to q-ary constacyclic codes and the linear codes generated by Plotkin construction. Our conclusions reveal that the soft-decision decoding method proposed by Huang and Zhang for binary cyclic codes is also applicable to q-ary cyclic codes, q-ary constacyclic codes and the linear codes generated by Plotkin construction.

循环码作为一种特殊的常循环码,由于其良好的理论和数学性质而得到了广泛的研究。最近,Huang和Zhang (IEEE Trans Inf theory 70(4):2395 - 2410,2024)利用Mattson-Solomon多项式的导数研究了二进制扩展循环码的循环导数子代(DDs)和线性DDs,并提出了相应的导数译码方法。本文的目的之一是利用群代数理论将这些结论推广到q元扩展循环码。证明了q元扩展循环码的循环离散码是相同码,其线性离散码是等价码。此外,我们还证明了相关结果可以推广到q元常环码和由Plotkin构造生成的线性码。研究结果表明,Huang和Zhang提出的二进制循环码的软判决译码方法同样适用于q元循环码、q元常循环码和Plotkin构造生成的线性码。
{"title":"Derivative descendants of cyclic codes and constacyclic codes","authors":"Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou","doi":"10.1007/s10623-024-01536-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01536-1","url":null,"abstract":"<p>Cyclic codes, as a special type of constacyclic codes, have been extensively studied due to their favorable theoretical and mathematical properties. Very recently, by using the derivative of the Mattson-Solomon polynomials, Huang and Zhang (IEEE Trans Inf Theor 70(4):2395–2410, 2024) studied the cyclic derivative descendants (DDs) and linear DDs of binary extended cyclic codes and proposed the corresponding derivative decoding methods. One objective of this paper is to generalize these conclusions to <i>q</i>-ary extended cyclic codes with group algebra theory. It demonstrates that the cyclic DDs of a <i>q</i>-ary extended cyclic code are the same codes and its linear DDs are equivalent codes. In addition, we show that the relevant results can be generalized to <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction. Our conclusions reveal that the soft-decision decoding method proposed by Huang and Zhang for binary cyclic codes is also applicable to <i>q</i>-ary cyclic codes, <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"67 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Codes over $$mathbb {F}_4$$ and $$mathbb {F}_2 times mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields 二次域中对应格的$$mathbb {F}_4$$和$$mathbb {F}_2 times mathbb {F}_2$$上的代码和级数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01537-0
Josline Freed

Using codes defined over (mathbb {F}_4) and (mathbb {F}_2 times mathbb {F}_2), we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields (mathbb {Q}(sqrt{d})) with (d equiv 1mod 4) a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend on the choice of d. For a given choice of real or imaginary quadratic field, we find conditions on the length of the code relative to the choice of quadratic field. When these conditions are satisfied, the generated theta series is unique to the code’s symmetric weight enumerator. We show that whilst these conditions ensure all non-equivalent codes will produce distinct theta series, for other codes that do not satisfy this condition, the length of the code and choice of quadratic field is not always enough to determine if the corresponding theta series will be unique.

使用在(mathbb {F}_4)和(mathbb {F}_2 times mathbb {F}_2)上定义的代码,我们同时定义了实二次域和虚二次域(mathbb {Q}(sqrt{d}))对应格的theta级数,其中(d equiv 1mod 4)是一个无平方整数。对于这样的码,我们使用它的权数枚举器来证明码对应的θ级数中哪一项首先依赖于d的选择。对于给定的实或虚二次域的选择,我们找到了相对于二次域选择的码的长度的条件。当满足这些条件时,生成的theta级数对于代码的对称权重枚举数是唯一的。我们表明,虽然这些条件确保所有非等效码将产生不同的θ级数,但对于不满足此条件的其他码,码的长度和二次域的选择并不总是足以确定相应的θ级数是否唯一。
{"title":"Codes over $$mathbb {F}_4$$ and $$mathbb {F}_2 times mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields","authors":"Josline Freed","doi":"10.1007/s10623-024-01537-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01537-0","url":null,"abstract":"<p>Using codes defined over <span>(mathbb {F}_4)</span> and <span>(mathbb {F}_2 times mathbb {F}_2)</span>, we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields <span>(mathbb {Q}(sqrt{d}))</span> with <span>(d equiv 1mod 4)</span> a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend on the choice of <i>d</i>. For a given choice of real or imaginary quadratic field, we find conditions on the length of the code relative to the choice of quadratic field. When these conditions are satisfied, the generated theta series is unique to the code’s symmetric weight enumerator. We show that whilst these conditions ensure all non-equivalent codes will produce distinct theta series, for other codes that do not satisfy this condition, the length of the code and choice of quadratic field is not always enough to determine if the corresponding theta series will be unique.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A pair of orthogonal orthomorphisms of finite nilpotent groups 有限幂零群的一对正交正胚
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01540-5
Shikang Yu, Tao Feng, Menglong Zhang

A bijection (theta :Grightarrow G) of a finite group G is an orthomorphism of G if the mapping (xmapsto x^{-1}theta (x)) is also a bijection. Two orthomorphisms (theta ) and (phi ) of a finite group G are orthogonal if the mapping (xmapsto theta (x)^{-1}phi (x)) is also bijective. We show that there is a pair of orthogonal orthomorphisms of a finite nilpotent group G if and only if the Sylow 2-subgroup of G is either trivial or noncyclic with the definite exceptions of (Gcong G') where (G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9}) and except possibly for (Gcong Q_8times {mathbb {Z}}_9) or (Gcong SD_{2^n}times {mathbb {Z}}_3) for any (ngeqslant 4). This result yields the existence of difference matrices over finite nilpotent groups with four rows.

如果映射(xmapsto x^{-1}theta (x))也是双射,则有限群G的双射(theta :Grightarrow G)是G的正射。如果映射(xmapsto theta (x)^{-1}phi (x))也是双射的,则有限群G的两个正交(theta )和(phi )是正交的。我们证明了有限幂零群G存在一对正交正态,当且仅当G的Sylow 2-子群是平凡的或非循环的,除了(Gcong G')(其中(G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9}))和可能的(Gcong Q_8times {mathbb {Z}}_9)或(Gcong SD_{2^n}times {mathbb {Z}}_3)(对于任何(ngeqslant 4))。这个结果证明了四行有限幂零群上差分矩阵的存在性。
{"title":"A pair of orthogonal orthomorphisms of finite nilpotent groups","authors":"Shikang Yu, Tao Feng, Menglong Zhang","doi":"10.1007/s10623-024-01540-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01540-5","url":null,"abstract":"<p>A bijection <span>(theta :Grightarrow G)</span> of a finite group <i>G</i> is an orthomorphism of <i>G</i> if the mapping <span>(xmapsto x^{-1}theta (x))</span> is also a bijection. Two orthomorphisms <span>(theta )</span> and <span>(phi )</span> of a finite group <i>G</i> are orthogonal if the mapping <span>(xmapsto theta (x)^{-1}phi (x))</span> is also bijective. We show that there is a pair of orthogonal orthomorphisms of a finite nilpotent group <i>G</i> if and only if the Sylow 2-subgroup of <i>G</i> is either trivial or noncyclic with the definite exceptions of <span>(Gcong G')</span> where <span>(G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9})</span> and except possibly for <span>(Gcong Q_8times {mathbb {Z}}_9)</span> or <span>(Gcong SD_{2^n}times {mathbb {Z}}_3)</span> for any <span>(ngeqslant 4)</span>. This result yields the existence of difference matrices over finite nilpotent groups with four rows.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factorization and irreducibility of composed products 合成产物的分解和不可约性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01529-0
Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan

Brawley and Carlitz introduced diamond products of elements of finite fields and associated composed products of polynomials in 1987. Composed products yield a method to construct irreducible polynomials of large composite degrees from irreducible polynomials of lower degrees. We show that the composed product of two irreducible polynomials of degrees m and n is again irreducible if and only if m and n are coprime and the involved diamond product satisfies a special cancellation property, the so-called conjugate cancellation. This completes the characterization of irreducible composed products, considered in several previous papers. More generally, we give precise criteria when a diamond product satisfies conjugate cancellation. For diamond products defined via bivariate polynomials, we prove simple criteria that characterize when conjugate cancellation holds. We also provide efficient algorithms to check these criteria. We achieve stronger results as well as more efficient algorithms in the case that the polynomials are bilinear. Lastly, we consider possible constructions of normal elements using composed products and the methods we developed.

Brawley和Carlitz在1987年引入了有限域单元的菱形积和相关的多项式组合积。组合乘积给出了一种由低次不可约多项式构造大次不可约多项式的方法。我们证明了两个m和n次不可约多项式的合成积当且仅当m和n是互素时也是不可约的,并且所涉及的钻石积满足一个特殊的消去性质,即所谓的共轭消去。这完成了以前几篇论文中考虑的不可还原组合产品的表征。更一般地,我们给出了金刚石积满足共轭消去的精确判据。对于二元多项式定义的金刚石积,我们证明了共轭抵消成立的简单准则。我们还提供了有效的算法来检查这些标准。在多项式是双线性的情况下,我们获得了更强的结果和更有效的算法。最后,我们考虑了使用组合产物和我们开发的方法来构建正常元素的可能性。
{"title":"Factorization and irreducibility of composed products","authors":"Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan","doi":"10.1007/s10623-024-01529-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01529-0","url":null,"abstract":"<p>Brawley and Carlitz introduced diamond products of elements of finite fields and associated composed products of polynomials in 1987. Composed products yield a method to construct irreducible polynomials of large composite degrees from irreducible polynomials of lower degrees. We show that the composed product of two irreducible polynomials of degrees <i>m</i> and <i>n</i> is again irreducible if and only if <i>m</i> and <i>n</i> are coprime and the involved diamond product satisfies a special cancellation property, the so-called conjugate cancellation. This completes the characterization of irreducible composed products, considered in several previous papers. More generally, we give precise criteria when a diamond product satisfies conjugate cancellation. For diamond products defined via bivariate polynomials, we prove simple criteria that characterize when conjugate cancellation holds. We also provide efficient algorithms to check these criteria. We achieve stronger results as well as more efficient algorithms in the case that the polynomials are bilinear. Lastly, we consider possible constructions of normal elements using composed products and the methods we developed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On translation hyperovals in semifield planes 半场平面上的平移超卵圆
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01533-4
Kevin Allen, John Sheekey

In this paper we demonstrate the first example of a finite translation plane which does not contain a translation hyperoval, disproving a conjecture of Cherowitzo. The counterexample is a semifield plane, specifically a Generalised Twisted Field plane, of order 64. We also relate this non-existence to the covering radius of two associated rank-metric codes, and the non-existence of scattered subspaces of maximum dimension with respect to the associated spread.

本文给出了不包含平移超椭圆的有限平移平面的第一个例子,证明了切罗维佐的一个猜想。反例是一个64阶的半场平面,特别是广义扭曲场平面。我们还将这种不存在性与两个相关联的秩-度量码的覆盖半径,以及最大维数的分散子空间相对于相关联的扩展的不存在性联系起来。
{"title":"On translation hyperovals in semifield planes","authors":"Kevin Allen, John Sheekey","doi":"10.1007/s10623-024-01533-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01533-4","url":null,"abstract":"<p>In this paper we demonstrate the first example of a finite translation plane which does not contain a translation hyperoval, disproving a conjecture of Cherowitzo. The counterexample is a semifield plane, specifically a Generalised Twisted Field plane, of order 64. We also relate this non-existence to the covering radius of two associated rank-metric codes, and the non-existence of scattered subspaces of maximum dimension with respect to the associated spread.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"83 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum rectangle attack and its application on Deoxys-BC 量子矩形攻击及其在 Deoxys-BC 上的应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-21 DOI: 10.1007/s10623-024-01526-3
Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong

In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.

近年来,提出经典攻击的量子版本已成为一种流行趋势。矩形攻击作为一种差分攻击被广泛应用于对称密码分析,并被应用于许多块密码。为了提高其效率,我们首先提出了一种新的量子矩形攻击。在矩形攻击中,它计算每个被猜测子密钥的有效四元组数量,并根据计数器筛选出候选子密钥。为了加快这一过程,我们提出了一种基于并行振幅估计算法和振幅放大算法的量子密钥计数算法。然后,我们完成剩余密钥比特的计算,并通过嵌套格罗弗搜索找到正确的全密钥。此外,我们还给出了寻找更合适的区分器以降低复杂度的策略。最后,为了评估可调整块密码 Deoxys-BC 的后量子安全性,我们根据该策略自动搜索 Deoxys-BC 的良好区分器,然后将我们的攻击应用于 9/10 轮 Deoxys-BC-256 和 12/13/14 轮 Deoxys-BC-384。结果表明,与经典攻击和格罗弗搜索相比,我们的攻击有一定的改进。
{"title":"Quantum rectangle attack and its application on Deoxys-BC","authors":"Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong","doi":"10.1007/s10623-024-01526-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01526-3","url":null,"abstract":"<p>In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"15 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142684484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more 多项式模网格中的近乎严密的安全性--PRF、IBE、全但多LTF等
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-19 DOI: 10.1007/s10623-024-01523-6
Zhedong Wang, Qiqi Lai, Feng-Hao Liu

Achieving tight security is a fundamental task in cryptography. While one of the most important purposes of this task is to improve the overall efficiency of a construction (by allowing smaller security parameters), many current lattice-based instantiations do not completely achieve the goal. Particularly, a super-polynomial modulus seems to be necessary in all prior work for (almost) tight schemes that allow the adversary to conduct queries, such as PRF, IBE, and Signatures. As the super-polynomial modulus would affect the noise-to-modulus ratio and thus increase the parameters, this might cancel out the advantages (in efficiency) brought from the tighter analysis. To determine the full power of tight security/analysis in lattices, it is necessary to determine whether the super-polynomial modulus restriction is inherent. In this work, we remove the super-polynomial modulus restriction for many important primitives—PRF, IBE, all-but-many Lossy Trapdoor Functions, and Signatures. The crux relies on an improvement over the framework of Boyen and Li (Asiacrypt 16), and an almost tight reduction from LWE to LWR, which improves prior work by Alwen et al. (Eurocrypt 13), Bogdanov et al. (TCC 16), and Bai et al. (Asiacrypt 15). By combining these two advances, we are able to derive these almost tight schemes under LWE with a polynomial modulus.

实现严密的安全性是密码学的一项基本任务。虽然这项任务最重要的目的之一是提高结构的整体效率(通过允许更小的安全参数),但目前许多基于网格的实例并不能完全实现这一目标。特别是,对于允许对手进行查询的(几乎)严密方案(如 PRF、IBE 和签名)来说,超多项式模似乎在所有先前的工作中都是必要的。由于超多项式模数会影响噪声-模数比,从而增加参数,这可能会抵消严密性分析带来的优势(在效率方面)。要确定网格中严密安全/分析的全部威力,就必须确定超多项式模数限制是否是固有的。在这项工作中,我们消除了许多重要基元--PRF、IBE、全但多有损陷阱门函数和签名--的超多项式模限制。关键在于对 Boyen 和 Li(Asiacrypt 16)框架的改进,以及从 LWE 到 LWR 的几乎紧密的简化,这改进了 Alwen 等人(Eurocrypt 13)、Bogdanov 等人(TCC 16)和 Bai 等人(Asiacrypt 15)之前的工作。结合这两项进展,我们就能在多项式模的 LWE 下推导出这些几乎严密的方案。
{"title":"Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more","authors":"Zhedong Wang, Qiqi Lai, Feng-Hao Liu","doi":"10.1007/s10623-024-01523-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01523-6","url":null,"abstract":"<p>Achieving tight security is a fundamental task in cryptography. While one of the most important purposes of this task is to improve the overall efficiency of a construction (by allowing smaller security parameters), many current lattice-based instantiations do not completely achieve the goal. Particularly, a super-polynomial modulus seems to be necessary in all prior work for (almost) tight schemes that allow the adversary to conduct queries, such as PRF, IBE, and Signatures. As the super-polynomial modulus would affect the noise-to-modulus ratio and thus increase the parameters, this might cancel out the advantages (in efficiency) brought from the tighter analysis. To determine the full power of tight security/analysis in lattices, it is necessary to determine whether the super-polynomial modulus restriction is inherent. In this work, we remove the super-polynomial modulus restriction for many important primitives—PRF, IBE, all-but-many Lossy Trapdoor Functions, and Signatures. The crux relies on an improvement over the framework of Boyen and Li (Asiacrypt 16), and an almost tight reduction from LWE to LWR, which improves prior work by Alwen et al. (Eurocrypt 13), Bogdanov et al. (TCC 16), and Bai et al. (Asiacrypt 15). By combining these two advances, we are able to derive these almost tight schemes under LWE with a polynomial modulus.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142671014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings 突破二重幂障碍:在 NTT 友好环中对 BGV 进行噪声估计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-15 DOI: 10.1007/s10623-024-01524-5
Andrea Di Giusto, Chiara Marcolla

The Brakerski–Gentry–Vaikuntanathan (BGV) scheme is a Fully Homomorphic Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem. Ciphertexts in this scheme contain an error term that grows with operations and causes decryption failure when it surpasses a certain threshold. Consequently, the parameters of BGV need to be estimated carefully, with a trade-off between security and error margin. The ciphertext space of BGV is the ring (mathcal {R}_q=mathbb {Z}_q[x]/(Phi _m(x))), where usually the degree n of the cyclotomic polynomial (Phi _m(x)) is chosen as a power of two for efficiency reasons. However, the jump between two consecutive powers-of-two polynomials also causes a jump in security, resulting in parameters that are much bigger than what is needed. In this work, we explore the non-power-of-two instantiations of BGV. Although our theoretical research encompasses results applicable to any cyclotomic ring, the focus of our investigation is the case of ({m=2^scdot 3^t}) where (s,tge 1), i.e., cyclotomic polynomials with degree ({n=phi (m)=2^scdot 3^{t-1}}). We provide a thorough analysis of the noise growth in this new setting using the canonical norm and compare our results with the power-of-two case considering practical aspects like NTT algorithms. We find that in many instances, the parameter estimation process yields better results for the non-power-of-two setting.

Brakerski-Gentry-Vaikuntanathan(BGV)方案是一种基于带误差环学习(RLWE)问题的全同态加密(FHE)密码系统。该方案中的密文包含一个误差项,该误差项随运算量增长,当超过一定阈值时就会导致解密失败。因此,需要仔细估算 BGV 的参数,并在安全性和误差率之间做出权衡。BGV 的密文空间是环(mathcal {R}_q=mathbb {Z}_q[x]/(Phi _m(x))),通常出于效率考虑,循环多项式 (Phi _m(x))的度数 n 选为 2 的幂。然而,两个连续的二幂多项式之间的跳跃也会导致安全性的跳跃,从而导致参数远远大于所需的参数。在这项工作中,我们探索了 BGV 的非二幂实例。虽然我们的理论研究涵盖了适用于任何循环环的结果,但我们研究的重点是 ({m=2^scdot 3^t}) where (s,tge 1) 的情况,即具有度 ({n=phi (m)=2^scdot 3^{t-1}}) 的循环多项式。我们使用规范对这一新环境下的噪声增长进行了深入分析,并将我们的结果与考虑到 NTT 算法等实际问题的二幂情况进行了比较。我们发现,在许多情况下,参数估计过程在非二幂设置下会产生更好的结果。
{"title":"Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings","authors":"Andrea Di Giusto, Chiara Marcolla","doi":"10.1007/s10623-024-01524-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01524-5","url":null,"abstract":"<p>The Brakerski–Gentry–Vaikuntanathan (BGV) scheme is a Fully Homomorphic Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem. Ciphertexts in this scheme contain an error term that grows with operations and causes decryption failure when it surpasses a certain threshold. Consequently, the parameters of BGV need to be estimated carefully, with a trade-off between security and error margin. The ciphertext space of BGV is the ring <span>(mathcal {R}_q=mathbb {Z}_q[x]/(Phi _m(x)))</span>, where usually the degree <i>n</i> of the cyclotomic polynomial <span>(Phi _m(x))</span> is chosen as a power of two for efficiency reasons. However, the jump between two consecutive powers-of-two polynomials also causes a jump in security, resulting in parameters that are much bigger than what is needed. In this work, we explore the non-power-of-two instantiations of BGV. Although our theoretical research encompasses results applicable to any cyclotomic ring, the focus of our investigation is the case of <span>({m=2^scdot 3^t})</span> where <span>(s,tge 1)</span>, i.e., cyclotomic polynomials with degree <span>({n=phi (m)=2^scdot 3^{t-1}})</span>. We provide a thorough analysis of the noise growth in this new setting using the canonical norm and compare our results with the power-of-two case considering practical aspects like NTT algorithms. We find that in many instances, the parameter estimation process yields better results for the non-power-of-two setting.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"38 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142637521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method of constructing $$(k+s)$$ -variable bent functions based on a family of s-plateaued functions on k variables 基于 k 变量上 s 有板函数族构建 $$(k+s)$$ 变量弯曲函数的新方法
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-13 DOI: 10.1007/s10623-024-01520-9
Sihong Su, Xiaoyan Chen

It is important to study the new construction methods of bent functions. In this paper, we first propose a secondary construction method of ((k+s))-variable bent function g through a family of s-plateaued functions (f_0,f_1,ldots ,f_{2^s-1}) on k variables with disjoint Walsh supports, which can be obtained through any given ((k-s))-variable bent function f by selecting (2^s) disjoint affine subspaces (S_0,S_1,ldots ,S_{2^s-1}) of ({mathbb {F}}_2^k) with dimension (k-s) to specify the Walsh support of these s-plateaued functions respectively, where s is a positive integer and (k-s) is a positive even integer. The dual functions of these newly constructed bent functions are determined. This secondary construction method of bent functions has a great improvement in counting. As a generalization, we find that the one initial ((k-s))-variable bent function f can be replaced by several different ((k-s))-variable bent functions. Compared to the first construction method, the latter one gives much more bent functions. It is worth mentioning that it can give all the 896 bent functions on 4 variables.

研究弯曲函数的新构造方法非常重要。在本文中,我们首先提出了一种通过 k 个变量上具有互不相交的 Walsh 支持的 s-plateaued 函数族 (f_0,f_1,ldots ,f_{2^s-1}) 来二次构造 ((k+s))-变量弯曲函数 g 的方法、可以通过任何给定的((k-s))变量弯曲函数 f,选择 (2^s)个不相邻的仿射子空间 (S_0,S_1,ldots 、维度为 (k-s) 的 ({mathbb {F}}_2^k) 的 S_{2^s-1} 子空间来分别指定这些 s 有板函数的沃尔什支持,其中 s 是正整数,(k-s) 是正偶数。这些新构建的弯曲函数的对偶函数被确定下来。这种二次构造弯曲函数的方法在计数方面有很大的改进。作为推广,我们发现一个初始的((k-s))可变弯曲函数 f 可以被多个不同的((k-s))可变弯曲函数代替。与第一种构造方法相比,后一种构造方法得到的弯曲函数要多得多。值得一提的是,它可以给出所有 896 个 4 变量弯曲函数。
{"title":"A new method of constructing $$(k+s)$$ -variable bent functions based on a family of s-plateaued functions on k variables","authors":"Sihong Su, Xiaoyan Chen","doi":"10.1007/s10623-024-01520-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01520-9","url":null,"abstract":"<p>It is important to study the new construction methods of bent functions. In this paper, we first propose a secondary construction method of <span>((k+s))</span>-variable bent function <i>g</i> through a family of <i>s</i>-plateaued functions <span>(f_0,f_1,ldots ,f_{2^s-1})</span> on <i>k</i> variables with disjoint Walsh supports, which can be obtained through any given <span>((k-s))</span>-variable bent function <i>f</i> by selecting <span>(2^s)</span> disjoint affine subspaces <span>(S_0,S_1,ldots ,S_{2^s-1})</span> of <span>({mathbb {F}}_2^k)</span> with dimension <span>(k-s)</span> to specify the Walsh support of these <i>s</i>-plateaued functions respectively, where <i>s</i> is a positive integer and <span>(k-s)</span> is a positive even integer. The dual functions of these newly constructed bent functions are determined. This secondary construction method of bent functions has a great improvement in counting. As a generalization, we find that the one initial <span>((k-s))</span>-variable bent function <i>f</i> can be replaced by several different <span>((k-s))</span>-variable bent functions. Compared to the first construction method, the latter one gives much more bent functions. It is worth mentioning that it can give all the 896 bent functions on 4 variables.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Further investigation on differential properties of the generalized Ness–Helleseth function 广义奈斯-赫勒塞斯函数微分性质的进一步研究
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-10 DOI: 10.1007/s10623-024-01525-4
Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth

Let n be an odd positive integer, p be an odd prime with (pequiv 3pmod 4), (d_{1} = {{p^{n}-1}over {2}} -1 ) and (d_{2} =p^{n}-2). The function defined by (f_u(x)=ux^{d_{1}}+x^{d_{2}}) is called the generalized Ness–Helleseth function over (mathbb {F}_{p^n}), where (uin mathbb {F}_{p^n}). It was initially studied by Ness and Helleseth in the ternary case. In this paper, for (p^n equiv 3 pmod 4) and (p^n ge 7), we provide the necessary and sufficient condition for (f_u(x)) to be an APN function. In addition, for each u satisfying (chi (u+1) = chi (u-1)), the differential spectrum of (f_u(x)) is investigated, and it is expressed in terms of some quadratic character sums of cubic polynomials, where (chi (cdot )) denotes the quadratic character of ({mathbb {F}}_{p^n}).

让 n 是奇正整数,p 是奇素数,有(pequiv 3pmod 4 ),(d_{1} = {{p^{n}-1}over {2}} -1 )和(d_{2} =p^{n}-2 )。由 (f_u(x)=ux^{d_{1}}+x^{d_{2}}) 定义的函数被称为 over (mathbb {F}_{p^n}) 的广义奈斯-赫勒斯函数,其中 (uin mathbb {F}_{p^n}).Ness 和 Helleseth 最初是在三元情况下研究这个问题的。在本文中,对于 (p^n equiv 3 pmod 4) 和 (p^n ge 7), 我们提供了 (f_u(x)) 是 APN 函数的必要条件和充分条件。此外,对于满足chi (u+1) = chi (u-1))的每个u,我们研究了(f_u(x))的微分谱,并用立方多项式的一些二次特征和来表示,其中(chi (cdot ))表示({mathbb {F}}_{p^n}) 的二次特征。
{"title":"Further investigation on differential properties of the generalized Ness–Helleseth function","authors":"Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth","doi":"10.1007/s10623-024-01525-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01525-4","url":null,"abstract":"<p>Let <i>n</i> be an odd positive integer, <i>p</i> be an odd prime with <span>(pequiv 3pmod 4)</span>, <span>(d_{1} = {{p^{n}-1}over {2}} -1 )</span> and <span>(d_{2} =p^{n}-2)</span>. The function defined by <span>(f_u(x)=ux^{d_{1}}+x^{d_{2}})</span> is called the generalized Ness–Helleseth function over <span>(mathbb {F}_{p^n})</span>, where <span>(uin mathbb {F}_{p^n})</span>. It was initially studied by Ness and Helleseth in the ternary case. In this paper, for <span>(p^n equiv 3 pmod 4)</span> and <span>(p^n ge 7)</span>, we provide the necessary and sufficient condition for <span>(f_u(x))</span> to be an APN function. In addition, for each <i>u</i> satisfying <span>(chi (u+1) = chi (u-1))</span>, the differential spectrum of <span>(f_u(x))</span> is investigated, and it is expressed in terms of some quadratic character sums of cubic polynomials, where <span>(chi (cdot ))</span> denotes the quadratic character of <span>({mathbb {F}}_{p^n})</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142597482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1