首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
On the first fall degree of summation polynomials 关于求和多项式的一阶降度
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-06-13 DOI: 10.1515/jmc-2017-0022
S. Kousidis, A. Wiemers
Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev’s summation polynomials relevant to the solution of the Elliptic Curve Discrete Logarithm Problem via Gröbner basis algorithms.
摘要我们改进了由沿着Semaev求和多项式的Weil下降引起的多项式系统的第一下降次数界,该多项式系统与通过Gröbner基算法求解椭圆曲线离散对数问题有关。
{"title":"On the first fall degree of summation polynomials","authors":"S. Kousidis, A. Wiemers","doi":"10.1515/jmc-2017-0022","DOIUrl":"https://doi.org/10.1515/jmc-2017-0022","url":null,"abstract":"Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev’s summation polynomials relevant to the solution of the Elliptic Curve Discrete Logarithm Problem via Gröbner basis algorithms.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"229 - 237"},"PeriodicalIF":1.2,"publicationDate":"2019-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2017-0022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47465244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signcryption schemes with insider security in an ideal permutation model 理想置换模型中具有内部安全性的签密方案
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-06-01 DOI: 10.1515/jmc-2018-0006
Tarun Kumar Bansal, Xavier Boyen, J. Pieprzyk
Abstract Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel. Parallel execution of cryptographic algorithms decreases the computation time needed to signcrypt messages. CtS&E uses weaker cryptographic primitives in a generic way to achieve a strong security notion of signcryption. Various message pre-processing schemes, also known as message padding, have been used in signcryption as a commitment scheme in CtS&E. Due to its elegance and versatility, the sponge structure turns out to be a useful tool for designing new padding schemes such as SpAEP [T. K. Bansal, D. Chang and S. K. Sanadhya, Sponge based CCA2 secure asymmetric encryption for arbitrary length message, Information Security and Privacy – ACISP 2015, Lecture Notes in Comput. Sci. 9144, Springer, Berlin 2015, 93–106], while offering further avenues for optimization and parallelism in the context of signcryption. In this work, we design a generic and efficient signcryption scheme featuring parallel encryption and signature on top of a sponge-based message-padding underlying structure. Unlike other existing schemes, the proposed scheme also supports arbitrarily long messages. We prove the construction secure when instantiated from weakly secure asymmetric primitives such as a trapdoor one-way encryption and a universal unforgeable signature. With a careful analysis and simple tweaks, we demonstrate how different combinations of weakly secure probabilistic and deterministic encryption and signature schemes can be used to construct a strongly secure signcryption scheme, further broadening the choices of underlying primitives to cover essentially any combination thereof. To the best of our knowledge, this is the first signcryption scheme based on the sponge structure that also offers strong security using weakly secure underlying asymmetric primitives, even deterministic ones, along with the ability to handle long messages, efficiently.
摘要签密旨在比独立执行加密和签名更有效地提供消息的机密性和身份验证。“提交然后签名和加密”(CtS&E)方法允许并行执行加密和签名。密码算法的并行执行减少了签名密码消息所需的计算时间。CtS&E以一种通用的方式使用较弱的密码原语来实现强的签密安全概念。各种消息预处理方案,也称为消息填充,已在签密中用作CtS&E中的承诺方案。由于其优雅和多功能性,海绵结构被证明是设计新填充方案的有用工具,如SpAEP[T。 K.Bansal、D.Chang和S。 K.Sanadhya,基于Sponge的CCA2任意长度消息的安全非对称加密,信息安全和隐私–ACISP 2015,Comput讲义。科学。9144,Springer,Berlin 2015,93–106],同时为签密上下文中的优化和并行提供了进一步的途径。在这项工作中,我们设计了一种通用且高效的签密方案,该方案在基于海绵的消息填充底层结构之上进行并行加密和签名。与其他现有方案不同,所提出的方案还支持任意长的消息。当从弱安全的非对称原语(如陷门单向加密和通用不可伪造签名)实例化时,我们证明了该构造是安全的。通过仔细的分析和简单的调整,我们展示了如何使用弱安全概率和确定性加密和签名方案的不同组合来构建强安全签密方案,从而进一步拓宽了底层原语的选择范围,基本上涵盖了其任何组合。据我们所知,这是第一个基于海绵结构的签密方案,该方案还使用弱安全的底层非对称基元,甚至是确定性基元,提供了强安全性,以及有效处理长消息的能力。
{"title":"Signcryption schemes with insider security in an ideal permutation model","authors":"Tarun Kumar Bansal, Xavier Boyen, J. Pieprzyk","doi":"10.1515/jmc-2018-0006","DOIUrl":"https://doi.org/10.1515/jmc-2018-0006","url":null,"abstract":"Abstract Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel. Parallel execution of cryptographic algorithms decreases the computation time needed to signcrypt messages. CtS&E uses weaker cryptographic primitives in a generic way to achieve a strong security notion of signcryption. Various message pre-processing schemes, also known as message padding, have been used in signcryption as a commitment scheme in CtS&E. Due to its elegance and versatility, the sponge structure turns out to be a useful tool for designing new padding schemes such as SpAEP [T. K. Bansal, D. Chang and S. K. Sanadhya, Sponge based CCA2 secure asymmetric encryption for arbitrary length message, Information Security and Privacy – ACISP 2015, Lecture Notes in Comput. Sci. 9144, Springer, Berlin 2015, 93–106], while offering further avenues for optimization and parallelism in the context of signcryption. In this work, we design a generic and efficient signcryption scheme featuring parallel encryption and signature on top of a sponge-based message-padding underlying structure. Unlike other existing schemes, the proposed scheme also supports arbitrarily long messages. We prove the construction secure when instantiated from weakly secure asymmetric primitives such as a trapdoor one-way encryption and a universal unforgeable signature. With a careful analysis and simple tweaks, we demonstrate how different combinations of weakly secure probabilistic and deterministic encryption and signature schemes can be used to construct a strongly secure signcryption scheme, further broadening the choices of underlying primitives to cover essentially any combination thereof. To the best of our knowledge, this is the first signcryption scheme based on the sponge structure that also offers strong security using weakly secure underlying asymmetric primitives, even deterministic ones, along with the ability to handle long messages, efficiently.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"117 - 150"},"PeriodicalIF":1.2,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2018-0006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44055852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact information ratios for secret sharing on small graphs with girth at least 5 在周长至少为5的小图上秘密共享的精确信息比率
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-06-01 DOI: 10.1515/jmc-2018-0024
Károly Harsányi, P. Ligeti
Abstract In a secret-sharing scheme, a piece of information – the secret – is distributed among a finite set of participants in such a way that only some predefined coalitions can recover it. The efficiency of the scheme is measured by the amount of information the most heavily loaded participant must remember. This amount is called information ratio, and one of the most interesting problems of this topic is to calculate the exact information ratio of given structures. In this paper, the information ratios of all but one graph-based schemes on 8 or 9 vertices with a girth at least 5 and all graph-based schemes on 10 vertices and 10 edges with a girth at least 5 are determined using two polyhedral combinatoric tools: the entropy method and covering with stars. Beyond the investigation of new graphs, the paper contains a few improvements and corrections of recent results on graphs with 9 vertices. Furthermore, we determine the exact information ratio of a large class of generalized sunlet graphs consisting of some pendant paths attached to a cycle of length at least 5.
摘要在秘密共享方案中,一条信息(即秘密)被分配到有限的参与者中,只有一些预先定义好的联盟可以恢复它。该方案的效率是通过负荷最大的参与者必须记住的信息量来衡量的。这个量被称为信息比,而本课题最有趣的问题之一就是计算给定结构的准确信息比。本文利用熵法和星形覆盖两种多面体组合工具,确定了8个或9个顶点且周长至少为5的图的所有方案,以及10个顶点和10条边且周长至少为5的图的所有方案的信息比。除了对新图的研究之外,本文还对最近关于9顶点图的研究结果进行了一些改进和修正。此外,我们还确定了一大类广义太阳图的确切信息比,这些图是由长度至少为5的循环上的一些悬挂路径组成的。
{"title":"Exact information ratios for secret sharing on small graphs with girth at least 5","authors":"Károly Harsányi, P. Ligeti","doi":"10.1515/jmc-2018-0024","DOIUrl":"https://doi.org/10.1515/jmc-2018-0024","url":null,"abstract":"Abstract In a secret-sharing scheme, a piece of information – the secret – is distributed among a finite set of participants in such a way that only some predefined coalitions can recover it. The efficiency of the scheme is measured by the amount of information the most heavily loaded participant must remember. This amount is called information ratio, and one of the most interesting problems of this topic is to calculate the exact information ratio of given structures. In this paper, the information ratios of all but one graph-based schemes on 8 or 9 vertices with a girth at least 5 and all graph-based schemes on 10 vertices and 10 edges with a girth at least 5 are determined using two polyhedral combinatoric tools: the entropy method and covering with stars. Beyond the investigation of new graphs, the paper contains a few improvements and corrections of recent results on graphs with 9 vertices. Furthermore, we determine the exact information ratio of a large class of generalized sunlet graphs consisting of some pendant paths attached to a cycle of length at least 5.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"107 - 116"},"PeriodicalIF":1.2,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2018-0024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41584372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Frontmatter
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-06-01 DOI: 10.1515/jmc-2019-frontmatter2
{"title":"Frontmatter","authors":"","doi":"10.1515/jmc-2019-frontmatter2","DOIUrl":"https://doi.org/10.1515/jmc-2019-frontmatter2","url":null,"abstract":"","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-frontmatter2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43544712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic constructions of PoRs from codes and instantiations 从代码和实例看PoR的一般构造
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-06-01 DOI: 10.1515/jmc-2018-0018
Julien Lavauzelle, F. Levy-dit-Vehel
Abstract In this paper, we show how to construct – from any linear code – a Proof of Retrievability ( 𝖯𝗈𝖱 {mathsf{PoR}} ) which features very low computation complexity on both the client ( 𝖵𝖾𝗋𝗂𝖿𝗂𝖾𝗋 {mathsf{Verifier}} ) and the server ( 𝖯𝗋𝗈𝗏𝖾𝗋 {mathsf{Prover}} ) sides, as well as small client storage (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [PoRs: Proofs of retrievability for large files, Proceedings of the 2007 ACM Conference on Computer and Communications Security—CCS 2007, ACM, New York 2007, 584–597] to fit into the framework of Paterson, Stinson and Upadhyay [A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage, J. Math. Cryptol. 7 2013, 3, 183–216], from which our construction evolves. We thus provide a rigorous treatment of the security of our generic design; more precisely, we sharply bound the extraction failure of our protocol according to this security model. Next we instantiate our formal construction with codes built from tensor-products as well as with Reed–Muller codes and lifted codes, yielding 𝖯𝗈𝖱 {mathsf{PoR}} s with moderate communication complexity and (server) storage overhead, in addition to the aforementioned features.
在本文中,我们展示了如何从任何线性代码构建一个可检索性证明(𝖯𝖱{mathsf{PoR}}),该证明在客户端(𝖵𝖾𝗋𝗂𝗂𝖾𝗋{mathsf{Verifier}})和服务器端(𝖯𝗋𝗏𝖾𝗋{mathsf{Prover}})以及小客户端存储(通常为512位)上具有非常低的计算复杂度。我们采用Juels和Kaliski提出的安全模型[PoRs:大文件的可检索性证明,2007年ACM计算机与通信安全会议文集- ccs 2007, ACM, New York 2007, 584-597]来适应Paterson, Stinson和Upadhyay的框架[用于云存储的一般无条件安全可检索性证明方案分析的编码理论基础,J. Math。Cryptol. 7, 2013, 3, 183-216],我们的建筑由此演变而来。因此,我们对通用设计的安全性提供了严格的处理;更准确地说,我们根据这个安全模型对协议的提取失败进行了严格的约束。接下来,我们使用由张量积构建的代码以及Reed-Muller代码和提升代码实例化我们的正式结构,除了上述特征外,还产生了具有中等通信复杂性和(服务器)存储开销的𝖯→𝖱{mathsf{PoR}}。
{"title":"Generic constructions of PoRs from codes and instantiations","authors":"Julien Lavauzelle, F. Levy-dit-Vehel","doi":"10.1515/jmc-2018-0018","DOIUrl":"https://doi.org/10.1515/jmc-2018-0018","url":null,"abstract":"Abstract In this paper, we show how to construct – from any linear code – a Proof of Retrievability ( 𝖯𝗈𝖱 {mathsf{PoR}} ) which features very low computation complexity on both the client ( 𝖵𝖾𝗋𝗂𝖿𝗂𝖾𝗋 {mathsf{Verifier}} ) and the server ( 𝖯𝗋𝗈𝗏𝖾𝗋 {mathsf{Prover}} ) sides, as well as small client storage (typically 512 bits). We adapt the security model initiated by Juels and Kaliski [PoRs: Proofs of retrievability for large files, Proceedings of the 2007 ACM Conference on Computer and Communications Security—CCS 2007, ACM, New York 2007, 584–597] to fit into the framework of Paterson, Stinson and Upadhyay [A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage, J. Math. Cryptol. 7 2013, 3, 183–216], from which our construction evolves. We thus provide a rigorous treatment of the security of our generic design; more precisely, we sharply bound the extraction failure of our protocol according to this security model. Next we instantiate our formal construction with codes built from tensor-products as well as with Reed–Muller codes and lifted codes, yielding 𝖯𝗈𝖱 {mathsf{PoR}} s with moderate communication complexity and (server) storage overhead, in addition to the aforementioned features.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"106 - 81"},"PeriodicalIF":1.2,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2018-0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44606736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hash functions from superspecial genus-2 curves using Richelot isogenies 使用Richelot同构的超特殊genus-2曲线的哈希函数
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-03-15 DOI: 10.1515/JMC-2019-0021
W. Castryck, Thomas Decru, Benjamin A. Smith
Abstract In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2. In 2019 Flynn and Ti pointed out that Takashima’s hash function is insecure due to the existence of small isogeny cycles. We revisit the construction and show that it can be repaired by imposing a simple restriction, which moreover clarifies the security analysis. The runtime of the resulting hash function is dominated by the extraction of 3 square roots for every block of 3 bits of the message, as compared to one square root per bit in the elliptic curve case; however in our setting the extractions can be parallelized and are done in a finite field whose bit size is reduced by a factor 3. Along the way we argue that the full supersingular isogeny graph is the wrong context in which to study higher-dimensional analogues of Charles, Goren and Lauter’s hash function, and advocate the use of the superspecial subgraph, which is the natural framework in which to view Takashima’s 𝔽p2-friendly starting curve.
2018年,Takashima提出了一种使用Richelot等基因的Charles, Goren和Lauter的哈希函数版本,从2型曲线开始,允许在二次有限域𝔽p2上执行所有后续算法。Flynn和Ti在2019年指出,由于存在小的等基因循环,Takashima的哈希函数是不安全的。我们重新审视了结构,并表明它可以通过施加简单的限制来修复,这进一步阐明了安全性分析。所得到的哈希函数的运行时间主要是为消息的每个3位块提取3个平方根,而在椭圆曲线的情况下,每位提取一个平方根;然而,在我们的设置中,提取可以并行化,并且在一个有限的域中完成,其位大小减少了3倍。在此过程中,我们认为完整的超奇异等根图是研究Charles, Goren和Lauter的哈希函数的高维类似物的错误背景,并主张使用超特殊子图,这是查看Takashima𝔽p2-friendly起始曲线的自然框架。
{"title":"Hash functions from superspecial genus-2 curves using Richelot isogenies","authors":"W. Castryck, Thomas Decru, Benjamin A. Smith","doi":"10.1515/JMC-2019-0021","DOIUrl":"https://doi.org/10.1515/JMC-2019-0021","url":null,"abstract":"Abstract In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2. In 2019 Flynn and Ti pointed out that Takashima’s hash function is insecure due to the existence of small isogeny cycles. We revisit the construction and show that it can be repaired by imposing a simple restriction, which moreover clarifies the security analysis. The runtime of the resulting hash function is dominated by the extraction of 3 square roots for every block of 3 bits of the message, as compared to one square root per bit in the elliptic curve case; however in our setting the extractions can be parallelized and are done in a finite field whose bit size is reduced by a factor 3. Along the way we argue that the full supersingular isogeny graph is the wrong context in which to study higher-dimensional analogues of Charles, Goren and Lauter’s hash function, and advocate the use of the superspecial subgraph, which is the natural framework in which to view Takashima’s 𝔽p2-friendly starting curve.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"268 - 292"},"PeriodicalIF":1.2,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/JMC-2019-0021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49534330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Frontmatter
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-03-01 DOI: 10.1515/jmc-2019-frontmatter1
{"title":"Frontmatter","authors":"","doi":"10.1515/jmc-2019-frontmatter1","DOIUrl":"https://doi.org/10.1515/jmc-2019-frontmatter1","url":null,"abstract":"","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-frontmatter1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43379187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields 类型为(2, 2. 2) 一些四次循环数域的
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-03-01 DOI: 10.1515/jmc-2017-0037
A. Azizi, I. Jerrari, A. Zekhnini, M. Talbi
Abstract Let p ≡ 3 ( mod 4 ) {pequiv 3pmod{4}} and l ≡ 5 ( mod 8 ) {lequiv 5pmod{8}} be different primes such that p l = 1 {frac{p}{l}=1} and 2 p = p l 4 {frac{2}{p}=frac{p}{l}_{4}} . Put k = ℚ ⁢ ( l ) {k=mathbb{Q}(sqrt{l})} , and denote by ϵ its fundamental unit. Set K = k ⁢ ( - 2 ⁢ p ⁢ ϵ ⁢ l ) {K=k(sqrt{-2pepsilonsqrt{l}})} , and let K 2 ( 1 ) {K_{2}^{(1)}} be its Hilbert 2-class field, and let K 2 ( 2 ) {K_{2}^{(2)}} be its second Hilbert 2-class field. The field K is a cyclic quartic number field, and its 2-class group is of type ( 2 , 2 , 2 ) {(2,2,2)} . Our goal is to prove that the length of the 2-class field tower of K is 2, to determine the structure of the 2-group G = Gal ⁡ ( K 2 ( 2 ) / K ) {G=operatorname{Gal}(K_{2}^{(2)}/K)} , and thus to study the capitulation of the 2-ideal classes of K in all its unramified abelian extensions within K 2 ( 1 ) {K_{2}^{(1)}} . Additionally, these extensions are constructed, and their abelian-type invariants are given.
摘要设p lect 3(mod 4){pequiv 3pmod{4}}和l lect 5(mod 8){lequiv 5pmod}是不同的素数,使得p l=1{frac{p}{l}=1}和2 p=p l 4{fric{2}{l}_{4} }。Put k=ℚ ⁢ (l){k=mathbb{Q}(sqrt{l})},并表示为其基本单位。设K=K(-2põl){K=K。域K是一个循环四次数域,它的2-类群是(2,2,2){(2,2,2)}型。我们的目标是证明K的2类场塔的长度是2,以确定2群G=Gal的结构⁡ (K2(2)/K){G=算子名{Gal}(K_。此外,还构造了这些扩展,并给出了它们的阿贝尔类型不变量。
{"title":"Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields","authors":"A. Azizi, I. Jerrari, A. Zekhnini, M. Talbi","doi":"10.1515/jmc-2017-0037","DOIUrl":"https://doi.org/10.1515/jmc-2017-0037","url":null,"abstract":"Abstract Let p ≡ 3 ( mod 4 ) {pequiv 3pmod{4}} and l ≡ 5 ( mod 8 ) {lequiv 5pmod{8}} be different primes such that p l = 1 {frac{p}{l}=1} and 2 p = p l 4 {frac{2}{p}=frac{p}{l}_{4}} . Put k = ℚ ⁢ ( l ) {k=mathbb{Q}(sqrt{l})} , and denote by ϵ its fundamental unit. Set K = k ⁢ ( - 2 ⁢ p ⁢ ϵ ⁢ l ) {K=k(sqrt{-2pepsilonsqrt{l}})} , and let K 2 ( 1 ) {K_{2}^{(1)}} be its Hilbert 2-class field, and let K 2 ( 2 ) {K_{2}^{(2)}} be its second Hilbert 2-class field. The field K is a cyclic quartic number field, and its 2-class group is of type ( 2 , 2 , 2 ) {(2,2,2)} . Our goal is to prove that the length of the 2-class field tower of K is 2, to determine the structure of the 2-group G = Gal ⁡ ( K 2 ( 2 ) / K ) {G=operatorname{Gal}(K_{2}^{(2)}/K)} , and thus to study the capitulation of the 2-ideal classes of K in all its unramified abelian extensions within K 2 ( 1 ) {K_{2}^{(1)}} . Additionally, these extensions are constructed, and their abelian-type invariants are given.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"27 - 46"},"PeriodicalIF":1.2,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2017-0037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46836836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack 混合格归约和中间相遇攻击的详细分析
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-03-01 DOI: 10.1515/jmc-2016-0044
T. Wunderer
Abstract Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more. However, unfortunately, none of the previous analyses of the hybrid attack is entirely satisfactory: They are based on simplifying assumptions that may distort the security estimates. Such simplifying assumptions include setting probabilities equal to 1, which, for the parameter sets we analyze in this work, are in fact as small as 2 - 80 2^{-80} . Many of these assumptions lead to underestimating the scheme’s security. However, some lead to security overestimates, and without further analysis, it is not clear which is the case. Therefore, the current security estimates against the hybrid attack are not reliable, and the actual security levels of many lattice-based schemes are unclear. In this work, we present an improved runtime analysis of the hybrid attack that is based on more reasonable assumptions. In addition, we reevaluate the security against the hybrid attack for the NTRU, NTRU Prime and R-BinLWEEnc encryption schemes as well as for the BLISS and GLP signature schemes. Our results show that there exist both security over- and underestimates in the literature.
摘要在过去的十年中,混合格约简和中间相遇攻击(称为混合攻击)被用于评估许多基于格的密码方案的安全性,如NTRU、NTRU Prime、BLISS等。然而,不幸的是,之前对混合攻击的分析没有一个是完全令人满意的:它们是基于简化的假设,可能会扭曲安全性估计。这种简化的假设包括设置概率等于1,对于我们在这项工作中分析的参数集,它实际上小到2 - 802 ^{-80}。许多这样的假设导致了对方案安全性的低估。然而,有些会导致安全性高估,如果没有进一步的分析,就不清楚是哪种情况。因此,目前针对混合攻击的安全估计是不可靠的,而且许多基于格的方案的实际安全级别也不清楚。在这项工作中,我们提出了一种基于更合理假设的改进的混合攻击运行时分析。此外,我们重新评估了NTRU、NTRU Prime和R-BinLWEEnc加密方案以及BLISS和GLP签名方案对混合攻击的安全性。我们的研究结果表明,文献中存在安全性高估和低估两种情况。
{"title":"A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack","authors":"T. Wunderer","doi":"10.1515/jmc-2016-0044","DOIUrl":"https://doi.org/10.1515/jmc-2016-0044","url":null,"abstract":"Abstract Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more. However, unfortunately, none of the previous analyses of the hybrid attack is entirely satisfactory: They are based on simplifying assumptions that may distort the security estimates. Such simplifying assumptions include setting probabilities equal to 1, which, for the parameter sets we analyze in this work, are in fact as small as 2 - 80 2^{-80} . Many of these assumptions lead to underestimating the scheme’s security. However, some lead to security overestimates, and without further analysis, it is not clear which is the case. Therefore, the current security estimates against the hybrid attack are not reliable, and the actual security levels of many lattice-based schemes are unclear. In this work, we present an improved runtime analysis of the hybrid attack that is based on more reasonable assumptions. In addition, we reevaluate the security against the hybrid attack for the NTRU, NTRU Prime and R-BinLWEEnc encryption schemes as well as for the BLISS and GLP signature schemes. Our results show that there exist both security over- and underestimates in the literature.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"1 - 26"},"PeriodicalIF":1.2,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2016-0044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43226288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Estimation of the hardness of the learning with errors problem with a restricted number of samples 样本数量有限的带误差学习问题的硬度估计
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-03-01 DOI: 10.1515/jmc-2017-0040
Markus Schmidt, Nina Bindel
Abstract The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht, Player and Scott presented the software tool LWE-Estimator to estimate the hardness of concrete LWE instances, making the choice of parameters for lattice-based primitives easier and better comparable. To give lower bounds on the hardness, it is assumed that each algorithm has given the corresponding optimal number of samples. However, this is not the case for many cryptographic applications. In this work we first analyze the hardness of LWE instances given a restricted number of samples. For this, we describe LWE solvers from the literature and estimate their runtime considering a limited number of samples. Based on our theoretical results we extend the LWE-Estimator. Furthermore, we evaluate LWE instances proposed for cryptographic schemes and show the impact of restricting the number of available samples.
带误差学习(LWE)问题是基于格结构安全性的最重要的硬度假设之一。2015年,Albrecht、Player和Scott提出了一种软件工具LWE- estimator,用于估计具体LWE实例的硬度,从而使基于格元的参数选择更加容易,并且具有更好的可比性。为了给出硬度的下界,我们假设每个算法都给出了相应的最优样本数。然而,对于许多加密应用程序来说,情况并非如此。在这项工作中,我们首先分析了给定有限样本数量的LWE实例的硬度。为此,我们从文献中描述LWE求解器,并在考虑有限样本数量的情况下估计其运行时间。基于我们的理论结果,我们扩展了lwe估计量。此外,我们评估了为加密方案提出的LWE实例,并展示了限制可用样本数量的影响。
{"title":"Estimation of the hardness of the learning with errors problem with a restricted number of samples","authors":"Markus Schmidt, Nina Bindel","doi":"10.1515/jmc-2017-0040","DOIUrl":"https://doi.org/10.1515/jmc-2017-0040","url":null,"abstract":"Abstract The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht, Player and Scott presented the software tool LWE-Estimator to estimate the hardness of concrete LWE instances, making the choice of parameters for lattice-based primitives easier and better comparable. To give lower bounds on the hardness, it is assumed that each algorithm has given the corresponding optimal number of samples. However, this is not the case for many cryptographic applications. In this work we first analyze the hardness of LWE instances given a restricted number of samples. For this, we describe LWE solvers from the literature and estimate their runtime considering a limited number of samples. Based on our theoretical results we extend the LWE-Estimator. Furthermore, we evaluate LWE instances proposed for cryptographic schemes and show the impact of restricting the number of available samples.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"13 1","pages":"47 - 67"},"PeriodicalIF":1.2,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2017-0040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41706736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1