首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
Access structures determined by uniform polymatroids 由均匀多边形确定的存取结构
Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/jmc-2022-0017
Renata Kawa, Mieczyslaw Kula
Abstract In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal. Moreover, each uniform integer polymatroid defines some ideal access structures. Some objects in this family can be useful for the applications of secret sharing. The method presented in this article is universal and can be continued with other classes of polymatroids in further similar studies. Here, we are especially interested in hierarchy of participants determined by the access structure, and we distinguish two main classes: they are compartmented and hierarchical access structures. The main results obtained for access structures determined by uniform integer polymatroids and a monotone increasing family Δ Delta can be summarized as follows. If the increment sequence of the polymatroid is non-constant, then the access structure is connected. If Δ Delta does not contain any singletons or the height of the polymatroid is maximal and its increment sequence is not constant starting from the second element, then the access structure is compartmented. If Δ Delta is generated by a singleton or the increment sequence of the polymatroid is constant starting from the second element, then the obtained access structures are hierarchical. They are proven to be ideal, and their hierarchical orders are completely determined. Moreover, if the increment sequence of the polymatroid is constant and Δ > 1 | Delta | gt 1 , then the hierarchical order is not antisymmetric, i.e., some different blocks are equivalent. The hierarchical order of access structures obtained from uniform integer polymatroids is always flat, that is, every hierarchy chain has at most two elements.
摘要本文利用Farràs, Martí-Farré和Padró开发的方法,研究了由一致整数多拟阵得到的所有多部通路结构。它们是拟合端口,即它们满足理想的必要条件。此外,每一个一致整数多边形都定义了一些理想的存取结构。这个家族中的一些对象可以用于秘密共享的应用程序。本文所提出的方法具有普适性,可以推广到其他类多拟阵的进一步类似研究中。在这里,我们对由访问结构决定的参与者的层次结构特别感兴趣,我们区分了两个主要的类:它们是分隔的和分层的访问结构。由一致整数多拟阵和单调递增族Δ Delta确定的通路结构的主要结果总结如下:如果多阵面的增量序列是非恒定的,则该存取结构是连通的。如果Δ Delta不包含任何单例,或者多矩阵的高度是最大的,并且它的增量序列从第二个元素开始不是恒定的,那么访问结构是分隔的。如果Δ Delta是由单元素生成的,或者多矩阵的增量序列从第二个元素开始是恒定的,则获得的访问结构是分层的。它们被证明是理想的,它们的等级顺序是完全确定的。此外,如果多边形的增量序列为常数且∣Δ∣>1 | Delta | gt 1,则层次顺序不是反对称的,即一些不同的块是等价的。由一致整数多拟体得到的访问结构的层次顺序总是平坦的,即每个层次链最多有两个元素。
{"title":"Access structures determined by uniform polymatroids","authors":"Renata Kawa, Mieczyslaw Kula","doi":"10.1515/jmc-2022-0017","DOIUrl":"https://doi.org/10.1515/jmc-2022-0017","url":null,"abstract":"Abstract In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal. Moreover, each uniform integer polymatroid defines some ideal access structures. Some objects in this family can be useful for the applications of secret sharing. The method presented in this article is universal and can be continued with other classes of polymatroids in further similar studies. Here, we are especially interested in hierarchy of participants determined by the access structure, and we distinguish two main classes: they are compartmented and hierarchical access structures. The main results obtained for access structures determined by uniform integer polymatroids and a monotone increasing family <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:mi mathvariant=\"normal\">Δ</m:mi> </m:math> Delta can be summarized as follows. If the increment sequence of the polymatroid is non-constant, then the access structure is connected. If <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:mi mathvariant=\"normal\">Δ</m:mi> </m:math> Delta does not contain any singletons or the height of the polymatroid is maximal and its increment sequence is not constant starting from the second element, then the access structure is compartmented. If <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:mi mathvariant=\"normal\">Δ</m:mi> </m:math> Delta is generated by a singleton or the increment sequence of the polymatroid is constant starting from the second element, then the obtained access structures are hierarchical. They are proven to be ideal, and their hierarchical orders are completely determined. Moreover, if the increment sequence of the polymatroid is constant and <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:mo>∣</m:mo> <m:mi mathvariant=\"normal\">Δ</m:mi> <m:mo>∣</m:mo> <m:mo>&gt;</m:mo> <m:mn>1</m:mn> </m:math> | Delta | gt 1 , then the hierarchical order is not antisymmetric, i.e., some different blocks are equivalent. The hierarchical order of access structures obtained from uniform integer polymatroids is always flat, that is, every hierarchy chain has at most two elements.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Provable security against generic attacks on stream ciphers 针对流密码的通用攻击的可证明安全性
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/jmc-2022-0033
Alexander Moch
Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power consumption low. We propose a random oracle model for stream ciphers. This will allow us to analyse the recent small-state stream cipher designs’ resistance against generic attacks and, in particular, time-memory-data tradeoff attacks. We analyse the conventional construction underlying stream ciphers like Grain and Trivium, constructions continuously using the external non-volatile secret key during keystream generation like Sprout, Plantlet, Fruit, and Atom, constructions continuously using the external non-volatile IV, and constructions using a combination of the IV and the key like DRACO. We show the tightness of all bounds by first presenting the time-memory-data tradeoff attacks on the respective constructions, establishing the upper bound on security, and then presenting the proof of security to establish the lower bound on security. In this work, we extend the theoretical work done by Hamann et al. who introduced the DRACO stream cipher at FSE 2023. We use the same random oracle model as the aforementioned work and apply it to the earlier work by Hamann et al. presented at SAC 2019, which showed security for two of the four constructions we consider in this work. Our model is equivalent but allows for a much simpler proof of security. Furthermore, we provide a proof of security for stream ciphers continuously using the secret key during keystream generation, giving upper and lower bounds for all four generic stream cipher constructions proposed so far.
最近基于轻量级硬件的流密码设计保持外部非易失性内部状态,而不是密码硬件模块的一部分。这些所谓的小状态密码的目的是保持硬件的大小和低功耗。提出了一种流密码的随机oracle模型。这将使我们能够分析最近的小状态流密码设计对通用攻击的抵抗力,特别是时间-内存-数据权衡攻击。我们分析了流密码的传统结构,如Grain和Trivium,在密钥流生成过程中连续使用外部非易失性密钥的结构,如Sprout, Plantlet, Fruit和Atom,连续使用外部非易失性密钥的结构,以及使用IV和密钥组合的结构,如DRACO。我们首先提出了对各个结构的时间-内存-数据权衡攻击,建立了安全性的上界,然后提出了安全性的证明,建立了安全性的下界,从而证明了所有边界的紧密性。在这项工作中,我们扩展了Hamann等人在FSE 2023上介绍DRACO流密码的理论工作。我们使用与上述工作相同的随机oracle模型,并将其应用于Hamann等人在SAC 2019上发表的早期工作,该工作显示了我们在本工作中考虑的四种结构中的两种的安全性。我们的模型是等效的,但允许更简单的安全性证明。此外,我们还提供了在密钥流生成过程中连续使用密钥的流密码的安全性证明,给出了迄今为止提出的所有四种通用流密码结构的上界和下界。
{"title":"Provable security against generic attacks on stream ciphers","authors":"Alexander Moch","doi":"10.1515/jmc-2022-0033","DOIUrl":"https://doi.org/10.1515/jmc-2022-0033","url":null,"abstract":"Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power consumption low. We propose a random oracle model for stream ciphers. This will allow us to analyse the recent small-state stream cipher designs’ resistance against generic attacks and, in particular, time-memory-data tradeoff attacks. We analyse the conventional construction underlying stream ciphers like Grain and Trivium, constructions continuously using the external non-volatile secret key during keystream generation like Sprout, Plantlet, Fruit, and Atom, constructions continuously using the external non-volatile IV, and constructions using a combination of the IV and the key like DRACO. We show the tightness of all bounds by first presenting the time-memory-data tradeoff attacks on the respective constructions, establishing the upper bound on security, and then presenting the proof of security to establish the lower bound on security. In this work, we extend the theoretical work done by Hamann et al. who introduced the DRACO stream cipher at FSE 2023. We use the same random oracle model as the aforementioned work and apply it to the earlier work by Hamann et al. presented at SAC 2019, which showed security for two of the four constructions we consider in this work. Our model is equivalent but allows for a much simpler proof of security. Furthermore, we provide a proof of security for stream ciphers continuously using the secret key during keystream generation, giving upper and lower bounds for all four generic stream cipher constructions proposed so far.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46218051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A construction of encryption protocols over some semidirect products 半直接产品上加密协议的构造
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/jmc-2022-0018
Shuji Isobe, E. Koizumi
Abstract In CANDARW ’18, Isobe et al. proposed a secure encryption protocol on non-abelian groups based on the Anshel–Anshel–Goldfeld key exchange protocol. There have remained two weak points on the protocol: one is that the protocol is indistinguishable against adaptive chosen ciphertext attack (IND-CCA) in a slightly restricted sense, what they call IND-rCCA secure, and the other is that the conditions imposed on groups and hashing schemes are too strict to make the protocol practical. In this article, we propose an IND-CCA secure protocol that resolves those problems. The key idea is to employ some specific semidirect product as platform groups, so that we can achieve the exact IND-CCA security from concise conditions on groups and hashing schemes. Our protocol is not dependent on any computational assumptions on abelian subgroups.
摘要在CANDARW’18中,Isobe等人提出了一种基于Ansel–Ansel–Goldfeld密钥交换协议的非阿贝尔群安全加密协议。该协议仍然存在两个弱点:一个是在稍微受限的意义上,该协议对自适应选择密文攻击(IND-CCA)是不可区分的,他们称之为IND-rCCA安全的,另一个是强加在组和哈希方案上的条件太严格,无法使协议实用。在本文中,我们提出了一个IND-CCA安全协议来解决这些问题。关键思想是使用一些特定的半直积作为平台组,这样我们就可以从组和哈希方案的简明条件中实现精确的IND-CCA安全性。我们的协议不依赖于任何关于阿贝尔子群的计算假设。
{"title":"A construction of encryption protocols over some semidirect products","authors":"Shuji Isobe, E. Koizumi","doi":"10.1515/jmc-2022-0018","DOIUrl":"https://doi.org/10.1515/jmc-2022-0018","url":null,"abstract":"Abstract In CANDARW ’18, Isobe et al. proposed a secure encryption protocol on non-abelian groups based on the Anshel–Anshel–Goldfeld key exchange protocol. There have remained two weak points on the protocol: one is that the protocol is indistinguishable against adaptive chosen ciphertext attack (IND-CCA) in a slightly restricted sense, what they call IND-rCCA secure, and the other is that the conditions imposed on groups and hashing schemes are too strict to make the protocol practical. In this article, we propose an IND-CCA secure protocol that resolves those problems. The key idea is to employ some specific semidirect product as platform groups, so that we can achieve the exact IND-CCA security from concise conditions on groups and hashing schemes. Our protocol is not dependent on any computational assumptions on abelian subgroups.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46554520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plactic key agreement (insecure?) 正规密钥协议(不安全?)
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/jmc-2022-0010
Daniel R. L. Brown
Abstract Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra. The security of plactic key agreement relies on the difficulty of some computational problems, particularly the division of semistandard tableaux. Tableau division can be used to find the private key from its public key or to find the shared secret from the two exchanged public keys. Monico found a fast division algorithm, which could be a polynomial time in the length of the tableaux. Monico’s algorithm solved a challenge that had been previously estimated to cost 2128 steps to break, which is an infeasibly large number for any foreseeable computing power on earth. Monico’s algorithm solves this challenge in only a few minutes. Therefore, Monico’s attack likely makes the plactic key agreement insecure. If it were not for Monico’s attack, plactic key agreement with 1,000-byte public keys might perhaps have provided 128-bit security, with a runtime of a millisecond. But Monico’s attack breaks these public keys’ sizes in minutes.
摘要正则密钥协商是一种利用组合代数半标准表的Knuth乘法的新型密钥协商。平面密钥协议的安全性依赖于一些计算问题的难度,特别是半标准表的划分。Tableau除法可用于从其公钥中查找私钥,或从交换的两个公钥中查找共享密钥。Monico发现了一种快速除法算法,它可以是表长度的多项式时间。Monico的算法解决了一个之前估计需要花费2128步才能破解的挑战,对于地球上任何可预见的计算能力来说,这是一个不可能的大数字。Monico的算法只需几分钟就解决了这一挑战。因此,莫尼科的攻击很可能会使该协议变得不安全。如果不是Monico的攻击,使用1000字节公钥的普通密钥协议可能提供了128位的安全性,运行时间为一毫秒。但Monico的攻击在几分钟内就打破了这些公钥的大小。
{"title":"Plactic key agreement (insecure?)","authors":"Daniel R. L. Brown","doi":"10.1515/jmc-2022-0010","DOIUrl":"https://doi.org/10.1515/jmc-2022-0010","url":null,"abstract":"Abstract Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra. The security of plactic key agreement relies on the difficulty of some computational problems, particularly the division of semistandard tableaux. Tableau division can be used to find the private key from its public key or to find the shared secret from the two exchanged public keys. Monico found a fast division algorithm, which could be a polynomial time in the length of the tableaux. Monico’s algorithm solved a challenge that had been previously estimated to cost 2128 steps to break, which is an infeasibly large number for any foreseeable computing power on earth. Monico’s algorithm solves this challenge in only a few minutes. Therefore, Monico’s attack likely makes the plactic key agreement insecure. If it were not for Monico’s attack, plactic key agreement with 1,000-byte public keys might perhaps have provided 128-bit security, with a runtime of a millisecond. But Monico’s attack breaks these public keys’ sizes in minutes.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47945266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algebraic and quantum attacks on two digital signature schemes 对两种数字签名方案的代数和量子攻击
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/jmc-2022-0023
V. Roman’kov, A. Ushakov, V. Shpilrain
Abstract In this article, we analyze two digital signature schemes, proposed in Moldovyan et al., that use finite noncommutative associative algebras as underlying platforms. We prove that these schemes do not possess the claimed property of being quantum safe. We also show that in many cases these schemes are, in fact, vulnerable to “classical” algebraic cryptanalysis.
在本文中,我们分析了Moldovyan等人提出的两个使用有限非交换关联代数作为底层平台的数字签名方案。我们证明了这些方案不具有量子安全的性质。我们还表明,在许多情况下,这些方案实际上容易受到“经典”代数密码分析的攻击。
{"title":"Algebraic and quantum attacks on two digital signature schemes","authors":"V. Roman’kov, A. Ushakov, V. Shpilrain","doi":"10.1515/jmc-2022-0023","DOIUrl":"https://doi.org/10.1515/jmc-2022-0023","url":null,"abstract":"Abstract In this article, we analyze two digital signature schemes, proposed in Moldovyan et al., that use finite noncommutative associative algebras as underlying platforms. We prove that these schemes do not possess the claimed property of being quantum safe. We also show that in many cases these schemes are, in fact, vulnerable to “classical” algebraic cryptanalysis.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"17 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42837125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Group codes over binary tetrahedral group 二进制四面体群上的群码
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2022-0009
M. Dadhwal, Pankaj
Abstract In this article, the group algebra K [ T ] {mathcal{K}}left[{mathscr{T}}] of the binary tetrahedral group T {mathscr{T}} over a splitting field K {mathcal{K}} of T {mathscr{T}} with char ( K ) ≠ 2 , 3 {rm{char}}left({mathcal{K}})ne 2,3 is studied and the unique idempotents corresponding to all seven characters of the binary tetrahedral group are computed. Furthermore, the minimum weights and dimensions of various group codes generated by linear and nonlinear idempotents in this group algebra are characterized to establish these group codes.
摘要本文研究了二元四面体群T{mathscr{T}}的群代数K〔T〕{matical{K}}}left〔{math scr{T}〕在T{-mathscr{T}}的分裂域K}上的群代数,其中char(K)≠2,3{rm{char}}left({mathical{K}})2,3,并计算了与二元四面体组的所有七个字符对应的唯一幂等元。此外,刻画了该群代数中由线性和非线性幂等元生成的各种组码的最小权值和维数,以建立这些组码。
{"title":"Group codes over binary tetrahedral group","authors":"M. Dadhwal, Pankaj","doi":"10.1515/jmc-2022-0009","DOIUrl":"https://doi.org/10.1515/jmc-2022-0009","url":null,"abstract":"Abstract In this article, the group algebra K [ T ] {mathcal{K}}left[{mathscr{T}}] of the binary tetrahedral group T {mathscr{T}} over a splitting field K {mathcal{K}} of T {mathscr{T}} with char ( K ) ≠ 2 , 3 {rm{char}}left({mathcal{K}})ne 2,3 is studied and the unique idempotents corresponding to all seven characters of the binary tetrahedral group are computed. Furthermore, the minimum weights and dimensions of various group codes generated by linear and nonlinear idempotents in this group algebra are characterized to establish these group codes.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"310 - 319"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45079336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the algebraic immunity of multiplexer Boolean functions 关于复接器布尔函数的代数免疫性
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0027
P. Mishra, Shashi Kant Pandey
Abstract A multiplexer generator is a device that accepts two or more inputs and based on some logic sends one of them as output. In a special case when inputs to a multiplexer generator are 2 k {2}^{k} bits and one of them is selected according to the value of a k k -bit number, a multiplexer generator can be regarded as a Boolean function in 2 k + k {2}^{k}+k variables. We call this generator a multiplexer Boolean function. Boolean functions serve as combiners and filters in cryptographic designs. The study of their cryptographic strength attracts the cryptographer because of the extremely simple and cost effective of their design. The study of algebraic attacks on multiplexer generators is another major concern to judging the suitability for its use in cryptographic designs. In this article, we calculate the algebraic immunity of the multiplexer Boolean function, which is not an obvious task in the case of a Boolean function like a multiplexer generator.
多路复用发生器是一种接受两个或多个输入,并根据某种逻辑将其中一个作为输出的设备。在一种特殊情况下,当复用器生成器的输入为2k {2}^{k}位,并且根据k k位数字的值选择其中一个时,复用器生成器可以看作是2k +k {2}^{k}+k个变量的布尔函数。我们称这个生成器为多路复用布尔函数。布尔函数在密码设计中充当组合器和过滤器。其密码强度的研究因其设计的简单和经济而受到密码学家的关注。对多路复用生成器的代数攻击的研究是判断其在密码设计中的适用性的另一个主要问题。在本文中,我们计算了多路复用器布尔函数的代数抗扰度,这对于像多路复用器生成器这样的布尔函数来说并不是一个明显的任务。
{"title":"On the algebraic immunity of multiplexer Boolean functions","authors":"P. Mishra, Shashi Kant Pandey","doi":"10.1515/jmc-2021-0027","DOIUrl":"https://doi.org/10.1515/jmc-2021-0027","url":null,"abstract":"Abstract A multiplexer generator is a device that accepts two or more inputs and based on some logic sends one of them as output. In a special case when inputs to a multiplexer generator are 2 k {2}^{k} bits and one of them is selected according to the value of a k k -bit number, a multiplexer generator can be regarded as a Boolean function in 2 k + k {2}^{k}+k variables. We call this generator a multiplexer Boolean function. Boolean functions serve as combiners and filters in cryptographic designs. The study of their cryptographic strength attracts the cryptographer because of the extremely simple and cost effective of their design. The study of algebraic attacks on multiplexer generators is another major concern to judging the suitability for its use in cryptographic designs. In this article, we calculate the algebraic immunity of the multiplexer Boolean function, which is not an obvious task in the case of a Boolean function like a multiplexer generator.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"198 - 204"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42124731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abelian sharing, common informations, and linear rank inequalities 阿贝尔共享、公共信息和线性秩不等式
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2022-0020
Carolina Mejía, J. Montoya
Abstract Dougherty et al. introduced the common information (CI) method as a method to produce non-Shannon inequalities satisfied by linear random variables, which are called linear rank inequalities. This method is based on the fact that linear random variables have CI. Dougerthy et al. asked whether this method is complete, in the sense that it can be used to produce all linear rank inequalities. We study this question, and we attack it using the theory of secret sharing schemes. To this end, we introduce the notions of Abelian secret sharing scheme and Abelian capacity. We prove that: If there exists an access structure whose Abelian capacity is smaller than its linear capacity, then the CI method is not complete. We investigate the existence of such an access structure.
Dougherty等人引入了公共信息(common information, CI)方法,作为一种产生由线性随机变量满足的非香农不等式的方法,这种不等式称为线性秩不等式。这种方法是基于线性随机变量具有CI的事实。Dougerthy等人质疑这种方法是否完备,是否可以用来产生所有的线性秩不等式。我们研究了这个问题,并利用秘密共享方案的理论来解决这个问题。为此,我们引入了阿贝尔秘密共享方案和阿贝尔容量的概念。我们证明:如果存在一个存取结构,其阿贝尔容量小于其线性容量,则CI方法是不完备的。我们研究了这种存取结构的存在性。
{"title":"Abelian sharing, common informations, and linear rank inequalities","authors":"Carolina Mejía, J. Montoya","doi":"10.1515/jmc-2022-0020","DOIUrl":"https://doi.org/10.1515/jmc-2022-0020","url":null,"abstract":"Abstract Dougherty et al. introduced the common information (CI) method as a method to produce non-Shannon inequalities satisfied by linear random variables, which are called linear rank inequalities. This method is based on the fact that linear random variables have CI. Dougerthy et al. asked whether this method is complete, in the sense that it can be used to produce all linear rank inequalities. We study this question, and we attack it using the theory of secret sharing schemes. To this end, we introduce the notions of Abelian secret sharing scheme and Abelian capacity. We prove that: If there exists an access structure whose Abelian capacity is smaller than its linear capacity, then the CI method is not complete. We investigate the existence of such an access structure.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"233 - 250"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48895200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient post-quantum KEM from CSIDH CSIDH的高效后量子KEM
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2022-0007
Mingping Qi
Abstract The SIDH and CSIDH are now the two most well-known post-quantum key exchange protocols from the supersingular isogeny-based cryptography, which have attracted much attention in recent years and served as the building blocks of other supersingular isogeny-based cryptographic schemes. The famous SIKE is a post-quantum key encapsulation mechanism (KEM) constructed on the SIDH, motivated by which, this article presents a new post-quantum KEM-based on the CSIDH, which is thereby named as CSIKE. The presented CSIKE has much higher computation efficiency in the decapsulation part by involving an additional tag in the encapsulation results. The new CSIKE is formally proved to be IND-CCA secure under the standard isogeny-based quantum resistant security assumption. Moreover, by comparing the new CSIKE with the only two existing CSIDH-based KEM schemes, i.e., CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, it can be easily found that the new CSIKE has a slightly longer encapsulation size than CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, but (i) it beats the CSIDH-PSEC-KEM by the improvement of approximately 50% in decapsulation speed, and (ii) it has a certain advantage over the CSIDH-ECIES-KEM in security since in the random oracle model, the security proof for CSIDH-ECIES-KEM needs to rely on the stronger CSI-GDH assumption, while the new CSIKE just needs to rely on the basic CSI-CDH assumption.
摘要SIDH和CSIDH是基于超奇异同根密码的两个最著名的后量子密钥交换协议,近年来备受关注,并成为其他基于超奇异同源密码方案的构建块。著名的SIKE是在SIDH基础上构建的后量子密钥封装机制(KEM),基于此,本文提出了一种新的基于CSIDH的后量子KEM,即CSIKE。通过在封装结果中加入额外的标签,所提出的CSIKE在解封装部分具有高得多的计算效率。在基于标准同源性的量子抗安全假设下,新的CSIKE被正式证明是IND-CCA安全的。此外,通过将新的CSIKE与仅有的两种现有的基于CSIDH的KEM方案(即CSIDH-PSEC-KEM和CSIDH-ECIES-KEM)进行比较,可以容易地发现,新的CSIKEM具有比CSIDH-PSEC-KEM和CSIDH-CIES-KEM稍长的封装尺寸,但是(i)它在解封装速度上比CSIDH-PCE-KEM提高了大约50%,以及(ii)它在安全性方面比CSIDH-ECIES-KEM具有一定的优势,因为在随机预言机模型中,CSIDH-ECIES-KEM的安全性证明需要依赖于更强的CSI-GDH假设,而新的CSIKE只需要依赖于基本的CSI-CDH假设。
{"title":"An efficient post-quantum KEM from CSIDH","authors":"Mingping Qi","doi":"10.1515/jmc-2022-0007","DOIUrl":"https://doi.org/10.1515/jmc-2022-0007","url":null,"abstract":"Abstract The SIDH and CSIDH are now the two most well-known post-quantum key exchange protocols from the supersingular isogeny-based cryptography, which have attracted much attention in recent years and served as the building blocks of other supersingular isogeny-based cryptographic schemes. The famous SIKE is a post-quantum key encapsulation mechanism (KEM) constructed on the SIDH, motivated by which, this article presents a new post-quantum KEM-based on the CSIDH, which is thereby named as CSIKE. The presented CSIKE has much higher computation efficiency in the decapsulation part by involving an additional tag in the encapsulation results. The new CSIKE is formally proved to be IND-CCA secure under the standard isogeny-based quantum resistant security assumption. Moreover, by comparing the new CSIKE with the only two existing CSIDH-based KEM schemes, i.e., CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, it can be easily found that the new CSIKE has a slightly longer encapsulation size than CSIDH-PSEC-KEM and CSIDH-ECIES-KEM, but (i) it beats the CSIDH-PSEC-KEM by the improvement of approximately 50% in decapsulation speed, and (ii) it has a certain advantage over the CSIDH-ECIES-KEM in security since in the random oracle model, the security proof for CSIDH-ECIES-KEM needs to rely on the stronger CSI-GDH assumption, while the new CSIKE just needs to rely on the basic CSI-CDH assumption.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"103 - 113"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41771307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cryptanalysis of “MAKE” “MAKE”的密码分析
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0016
Daniel R. L. Brown, N. Koblitz, Jason Legrow
Abstract Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n × n ntimes n -matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system of n 2 {n}^{2} linear equations.
摘要Rahman和Shpillain在有限域上基于n×。我们证明,使用公共信息,对手可以通过求解一个n2{n}^{2}线性方程组来恢复商定的密钥。
{"title":"Cryptanalysis of “MAKE”","authors":"Daniel R. L. Brown, N. Koblitz, Jason Legrow","doi":"10.1515/jmc-2021-0016","DOIUrl":"https://doi.org/10.1515/jmc-2021-0016","url":null,"abstract":"Abstract Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n × n ntimes n -matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system of n 2 {n}^{2} linear equations.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"98 - 102"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45670596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1