首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
Survey on SAP and its application in public-key cryptography SAP及其在公钥加密中的应用综述
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2016-0004
Neha Goel, Indivar Gupta, B. K. Dass
Abstract The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was extended using different mathematical structures. In this paper, we discuss the concept of SAP and present a detailed survey of the work which has been done using it in public-key cryptography.
半群作用问题(semi - group action problem, SAP)的概念最早是由Monico在2002年提出的。Monico在他的论文中解释了离散对数问题(DLP)可以推广到SAP。在定义了半群中的作用问题之后,使用不同的数学结构对这个概念进行了扩展。在本文中,我们讨论了SAP的概念,并详细介绍了在公钥加密中使用SAP所做的工作。
{"title":"Survey on SAP and its application in public-key cryptography","authors":"Neha Goel, Indivar Gupta, B. K. Dass","doi":"10.1515/jmc-2016-0004","DOIUrl":"https://doi.org/10.1515/jmc-2016-0004","url":null,"abstract":"Abstract The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was extended using different mathematical structures. In this paper, we discuss the concept of SAP and present a detailed survey of the work which has been done using it in public-key cryptography.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"144 - 152"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2016-0004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41903539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A variant of the large sieve inequality with explicit constants 带显式常数的大筛不等式的一种变体
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2019-0022
Maciej Grzeskowiak
Abstract We give an effective version with explicit constants of the large sieve inequality for imaginary quadratic fields. Explicit results of this kind are useful for estimating the computational complexity of algorithms which generate elements, whose norm is a rational prime, in an arithmetic progression of the corresponding ring of integers.
摘要给出了虚二次域大筛不等式的一个带显式常数的有效版本。这类显式结果对于估计在相应的整数环的等差数列中产生范数为有理数的元素的算法的计算复杂度是有用的。
{"title":"A variant of the large sieve inequality with explicit constants","authors":"Maciej Grzeskowiak","doi":"10.1515/jmc-2019-0022","DOIUrl":"https://doi.org/10.1515/jmc-2019-0022","url":null,"abstract":"Abstract We give an effective version with explicit constants of the large sieve inequality for imaginary quadratic fields. Explicit results of this kind are useful for estimating the computational complexity of algorithms which generate elements, whose norm is a rational prime, in an arithmetic progression of the corresponding ring of integers.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"307 - 315"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44492828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action 逆CM群作用的一种亚指数时间多项式量子空间算法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2015-0057
David Jao, Jason Legrow, Christopher Leonardi, Luis Ruiz-Lopez
Abstract We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space. One application of this algorithm is that it can be used to find the private key from the public key in the isogeny-based CRS and CSIDH cryptosystems. Prior claims by Childs, Jao, and Soukharev of such a polynomial quantum space algorithm for this problem are false; our algorithm (along with contemporaneous, independent work by Biasse, Iezzi, and Jacobson) is the first such result.
摘要提出了一种量子算法,利用次指数时间,在多项式量子空间中计算同质普通椭圆曲线上复乘法群作用的逆。该算法的一个应用是,它可以用于在基于等基因的CRS和CSIDH密码系统中从公钥中找到私钥。Childs, Jao和Soukharev先前对这种多项式量子空间算法的声明是错误的;我们的算法(以及同期Biasse、Iezzi和Jacobson的独立研究)是第一个这样的结果。
{"title":"A subexponential-time, polynomial quantum space algorithm for inverting the CM group action","authors":"David Jao, Jason Legrow, Christopher Leonardi, Luis Ruiz-Lopez","doi":"10.1515/jmc-2015-0057","DOIUrl":"https://doi.org/10.1515/jmc-2015-0057","url":null,"abstract":"Abstract We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space. One application of this algorithm is that it can be used to find the private key from the public key in the isogeny-based CRS and CSIDH cryptosystems. Prior claims by Childs, Jao, and Soukharev of such a polynomial quantum space algorithm for this problem are false; our algorithm (along with contemporaneous, independent work by Biasse, Iezzi, and Jacobson) is the first such result.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"129 - 138"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2015-0057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42506814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation? 我们可以通过表示打败𝔽p2上ECDLP的平方根界限吗?
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2019-0025
Claire Delaplace, Alexander May
Abstract We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem. Our solution of this problem using bivariate polynomial multi-evaluation yields a p1.314-algorithm for ECDLP. While this is inferior to Pollard’s Rho algorithm with square root (in the field size) complexity 𝓞(p), it still has the potential to open a path to an o(p)-algorithm for ECDLP, since all involved lists are of size as small as p34, $begin{array}{} p^{frac 3 4}, end{array}$ only their computation is yet too costly.
摘要给出了求解某二次域上椭圆曲线离散对数(ECDLP)的一种4-列表算法𝔽p2。利用表示技术,我们将ECDLP简化为一个多元多项式零检验问题。我们使用二元多项式多重求值解决了这个问题,为ECDLP提供了一个p1.314算法。虽然这不如Pollard的Rho算法的平方根(字段大小)复杂度为 (p),但它仍然有可能为ECDLP打开一条通往0 (p)算法的路径,因为所有涉及的列表的大小都小到p34, $begin{array}{} p^{frac 3 4}, end{array}$只是它们的计算成本太高。
{"title":"Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?","authors":"Claire Delaplace, Alexander May","doi":"10.1515/jmc-2019-0025","DOIUrl":"https://doi.org/10.1515/jmc-2019-0025","url":null,"abstract":"Abstract We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem. Our solution of this problem using bivariate polynomial multi-evaluation yields a p1.314-algorithm for ECDLP. While this is inferior to Pollard’s Rho algorithm with square root (in the field size) complexity 𝓞(p), it still has the potential to open a path to an o(p)-algorithm for ECDLP, since all involved lists are of size as small as p34, $begin{array}{} p^{frac 3 4}, end{array}$ only their computation is yet too costly.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"293 - 306"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48850213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiently Processing Complex-Valued Data in Homomorphic Encryption 同态加密中复值数据的高效处理
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2015-0051
Carl Bootland, W. Castryck, Ilia Iliashenko, F. Vercauteren
Abstract We introduce a new homomorphic encryption scheme that is natively capable of computing with complex numbers. This is done by generalizing recent work of Chen, Laine, Player and Xia, who modified the Fan–Vercauteren scheme by replacing the integral plaintext modulus t by a linear polynomial X − b. Our generalization studies plaintext moduli of the form Xm + b. Our construction significantly reduces the noise growth in comparison to the original FV scheme, so much deeper arithmetic circuits can be homomorphically executed.
摘要提出了一种新的具有复数运算能力的同态加密方案。这是通过推广Chen, Laine, Player和Xia最近的工作来完成的,他们通过用线性多项式X - b替换整数明文模t来修改Fan-Vercauteren方案。我们的推广研究了形式为Xm + b的明文模。与原始FV方案相比,我们的构造显著降低了噪声增长,因此可以同态执行更深的算术电路。
{"title":"Efficiently Processing Complex-Valued Data in Homomorphic Encryption","authors":"Carl Bootland, W. Castryck, Ilia Iliashenko, F. Vercauteren","doi":"10.1515/jmc-2015-0051","DOIUrl":"https://doi.org/10.1515/jmc-2015-0051","url":null,"abstract":"Abstract We introduce a new homomorphic encryption scheme that is natively capable of computing with complex numbers. This is done by generalizing recent work of Chen, Laine, Player and Xia, who modified the Fan–Vercauteren scheme by replacing the integral plaintext modulus t by a linear polynomial X − b. Our generalization studies plaintext moduli of the form Xm + b. Our construction significantly reduces the noise growth in comparison to the original FV scheme, so much deeper arithmetic circuits can be homomorphically executed.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"55 - 65"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2015-0051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44141406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Retraction of: An elementary proof of Fermat’s Last Theorem for all even exponents 关于所有偶数指数的Fermat最后定理的一个初等证明
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/JMC-2017-2000
S. B. Karmakar
{"title":"Retraction of: An elementary proof of Fermat’s Last Theorem for all even exponents","authors":"S. B. Karmakar","doi":"10.1515/JMC-2017-2000","DOIUrl":"https://doi.org/10.1515/JMC-2017-2000","url":null,"abstract":"","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"143 - 143"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/JMC-2017-2000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44075491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New number-theoretic cryptographic primitives 新的数论密码原语
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2019-0035
Éric Brier, Houda Ferradi, M. Joye, D. Naccache
Abstract This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform. In the basic signature scheme, the signer generates multiple RSA-like moduli ni = pi2qi and keeps their factors secret. The signature is a bounded-size prime whose Jacobi symbols with respect to the ni’s match the message digest. The generalized signature schemes replace the Jacobi symbol with higher-power residue symbols. Given of their very unique design, the proposed signature schemes seem to be overlooked “missing species” in the corpus of known signature algorithms.
摘要本文介绍了新的基于prq的单向函数和伴随签名方案。新的签名方案很有趣,因为它们不属于两个常见的设计蓝图,即活板门排列的反转和Fiat–Shamir变换。在基本签名方案中,签名者生成多个RSA样模ni=pi2qi,并对其因子保密。签名是一个有界大小的素数,其相对于ni的雅可比符号与消息摘要匹配。广义签名方案用高幂残差符号代替Jacobi符号。鉴于其非常独特的设计,所提出的签名方案在已知签名算法的语料库中似乎被忽视了“缺失物种”。
{"title":"New number-theoretic cryptographic primitives","authors":"Éric Brier, Houda Ferradi, M. Joye, D. Naccache","doi":"10.1515/jmc-2019-0035","DOIUrl":"https://doi.org/10.1515/jmc-2019-0035","url":null,"abstract":"Abstract This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform. In the basic signature scheme, the signer generates multiple RSA-like moduli ni = pi2qi and keeps their factors secret. The signature is a bounded-size prime whose Jacobi symbols with respect to the ni’s match the message digest. The generalized signature schemes replace the Jacobi symbol with higher-power residue symbols. Given of their very unique design, the proposed signature schemes seem to be overlooked “missing species” in the corpus of known signature algorithms.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"224 - 235"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42946214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Self-dual DeepBKZ for finding short lattice vectors 寻找短格矢量的自对偶DeepBKZ
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2015-0053
Masaya Yasuda
Abstract In recent years, the block Korkine-Zolotarev (BKZ) and its variants such as BKZ 2.0 have been used as de facto algorithms to estimate the security of a lattice-based cryptosystem. In 2017, DeepBKZ was proposed as a mathematical improvement of BKZ, which calls LLL with deep insertions (DeepLLL) as a subroutine alternative to LLL. DeepBKZ can find a short lattice vector by smaller blocksizes than BKZ. In this paper, we develop a self-dual variant of DeepBKZ, as in the work of Micciancio and Walter for self-dual BKZ. Like DeepBKZ, our self-dual DeepBKZ calls both DeepLLL and its dual variant as main subroutines in order to accelerate to find a very short lattice vector. We also report experimental results of DeepBKZ and our self-dual DeepBKZ for random bases on the Darmstadt SVP challenge.
摘要近年来,块Korkine-Zolotarev(BKZ)及其变体(如BKZ 2.0)已被用作估计基于格的密码系统安全性的事实算法。2017年,DeepBKZ被提出作为BKZ的数学改进,它调用带有深度插入的LLL(DeepLLL)作为LLL的子例程替代。DeepBKZ可以通过比BKZ更小的块大小找到短的晶格矢量。在本文中,我们开发了DeepBKZ的自对偶变体,就像Micciancio和Walter为自对偶BKZ所做的工作一样。与DeepBKZ一样,我们的自对偶DeepBKZ调用DeepLLL及其对偶变体作为主要子程序,以便加速找到一个非常短的格向量。我们还报道了DeepBKZ和我们的自对偶DeepBKZ在达姆施塔特SVP挑战上对随机碱基的实验结果。
{"title":"Self-dual DeepBKZ for finding short lattice vectors","authors":"Masaya Yasuda","doi":"10.1515/jmc-2015-0053","DOIUrl":"https://doi.org/10.1515/jmc-2015-0053","url":null,"abstract":"Abstract In recent years, the block Korkine-Zolotarev (BKZ) and its variants such as BKZ 2.0 have been used as de facto algorithms to estimate the security of a lattice-based cryptosystem. In 2017, DeepBKZ was proposed as a mathematical improvement of BKZ, which calls LLL with deep insertions (DeepLLL) as a subroutine alternative to LLL. DeepBKZ can find a short lattice vector by smaller blocksizes than BKZ. In this paper, we develop a self-dual variant of DeepBKZ, as in the work of Micciancio and Walter for self-dual BKZ. Like DeepBKZ, our self-dual DeepBKZ calls both DeepLLL and its dual variant as main subroutines in order to accelerate to find a very short lattice vector. We also report experimental results of DeepBKZ and our self-dual DeepBKZ for random bases on the Darmstadt SVP challenge.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"84 - 94"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2015-0053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44392763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A framework for cryptographic problems from linear algebra 线性代数密码问题的一个框架
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2019-0032
Carl Bootland, W. Castryck, Alan Szepieniec, F. Vercauteren
Abstract We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography. The framework allows to easily instantiate new hard problems and to automatically construct plausibly post-quantum secure primitives from them. As a first basic application, we introduce two new hard problems and the corresponding encryption schemes. Concretely, we study generalisations of hard problems such as SIS, LWE and NTRU to free modules over quotients of ℤ[X] by ideals of the form (f, g), where f is a monic polynomial and g ∈ ℤ[X] is a ciphertext modulus coprime to f. For trivial modules (i.e. of rank one), the case f = Xn + 1 and g = q ∈ ℤ>1 corresponds to ring-LWE, ring-SIS and NTRU, while the choices f = Xn – 1 and g = X – 2 essentially cover the recently proposed Mersenne prime cryptosystems. At the other extreme, when considering modules of large rank and letting deg(f) = 1, one recovers the framework of LWE and SIS.
摘要我们介绍了一个包含基于格的密码学中出现的主要难题的通用框架,其中自然包括最近提出的Mersenne素数密码系统,也包括来自基于代码的密码学的问题。该框架允许轻松地实例化新的难题,并从中自动构建看似合理的后量子安全原语。作为第一个基本应用,我们介绍了两个新的难题和相应的加密方案。具体地,我们研究了SIS、LWE和NTRU等难题对商上自由模的推广ℤ[X] 通过形式为(f,g)的理想,其中f是一个monic多项式,g∈ℤ[X] 是与f互质的密文模。对于平凡模(即秩为一),情况f=Xn+1,g=q∈fℤ>1对应于环LWE、环SIS和NTRU,而选择f=Xn–1和g=X–2基本上涵盖了最近提出的Mersenne素数密码系统。在另一个极端,当考虑大秩的模块并使deg(f)=1时,可以恢复LWE和SIS的框架。
{"title":"A framework for cryptographic problems from linear algebra","authors":"Carl Bootland, W. Castryck, Alan Szepieniec, F. Vercauteren","doi":"10.1515/jmc-2019-0032","DOIUrl":"https://doi.org/10.1515/jmc-2019-0032","url":null,"abstract":"Abstract We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography. The framework allows to easily instantiate new hard problems and to automatically construct plausibly post-quantum secure primitives from them. As a first basic application, we introduce two new hard problems and the corresponding encryption schemes. Concretely, we study generalisations of hard problems such as SIS, LWE and NTRU to free modules over quotients of ℤ[X] by ideals of the form (f, g), where f is a monic polynomial and g ∈ ℤ[X] is a ciphertext modulus coprime to f. For trivial modules (i.e. of rank one), the case f = Xn + 1 and g = q ∈ ℤ>1 corresponds to ring-LWE, ring-SIS and NTRU, while the choices f = Xn – 1 and g = X – 2 essentially cover the recently proposed Mersenne prime cryptosystems. At the other extreme, when considering modules of large rank and letting deg(f) = 1, one recovers the framework of LWE and SIS.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"202 - 217"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44446540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preface to the First Annual MathCrypt Proceedings Volume 第一年度MathCrypt文集卷序
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-01 DOI: 10.1515/jmc-2020-0060
J. Cheon, K. Lauter, Donggeon Yhee
In 2017, we decided to start the annual series of MathCryptWorkshops in order to encouragemore mathematicians and computational number theorists to propose and work on hard problems in cryptography. This is the first volume of papers from our first annual MathCrypt conference hosted at Crypto 2018, on August 19, 2018 in Santa Barbara. We were motivated to launch this series of workshops to attract more mathematicians to work on hard problems in cryptography. There is a gap in the publishing culture betweenmathematics and computer science which we hope to bridge with this effort. Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferenceswhich are themost prestigious venues for the research area. Manymathematicians are not accustomed to the model of submitting a paper by the conference deadline, presenting the work at the conference, and publishing in the proceedings volume.Wewanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal of Mathematical Cryptology was an ideal place and a willing partner to create this opportunity. We are at a point in time where it is increasingly important for mathematicians to be involved in cryptography research, as we set out to determine the next generation of cryptographic systems based on hard math problems which can withstand attacks from a quantum computer once it is built. In 2017, NIST launched a 5-year international competition to determine post-quantum cryptosystems (PQC). MathCrypt can play a complimentary role by encouragingmathematicians to work on and publish attacks on new proposals, including both preliminary results and also even results which represent the failure of a certain approach to effectively attack a new system. This creates the culture of sharing information on approacheswhich have been tried and their measure of success. Currently there is such a high bar for publishing papers with new attacks. Attacking the underlying hard math problems in cryptography is an extremely challenging endeavor, and so the incentives are not aligned to encourage new researchers and young researchers to work and commit themselves to this direction. The opportunity to publish intermediate results in venues like MathCrypt should help to de-risk this endeavor and encourage more mathematician to pursue these research directions. The MathCrypt proceedings volumes are also intended as a place to publish proposals for new cryptographic systems based on new ideas for hard math problems. The post quantum era provides both an opportunity and a challenge tomathematicians to create new systems based on new ideas.When an idea for a hard math problem is first proposed, it can be hard to evaluate the long-term potential in the span of a few weeks during a short review cycle. Thus more established venues may be reluctant to
2017年,我们决定启动一年一度的MathCryptWorkshop系列,以鼓励数学家和计算数论者提出并研究密码学中的难题。这是我们于2018年8月19日在圣巴巴拉举行的Crypto 2018第一届年度MathCrypt会议的第一卷论文。我们有动机发起这一系列研讨会,以吸引更多的数学家来研究密码学中的难题。数学和计算机科学之间的出版文化存在差距,我们希望通过这一努力来弥合这一差距。数学家主要认可期刊上的出版物,而密码学家几乎总是在会议记录卷上快速发表他们的结果,而会议记录卷是研究领域最负盛名的场所。许多数学家不习惯在会议截止日期前提交论文,在会议上介绍工作,并在会议记录册上发表论文的模式。我们希望为数学家提供一个定期的年度场所,以这种加速的速度为密码研究社区做出贡献,而《数学密码学杂志》是创造这一机会的理想场所和愿意合作的伙伴。我们正处于一个数学家参与密码学研究变得越来越重要的时刻,因为我们开始基于数学难题来确定下一代密码系统,这些难题一旦建成,就可以抵御量子计算机的攻击。2017年,NIST发起了一项为期5年的国际竞赛,以确定后量子密码系统(PQC)。MathCrypt可以通过鼓励数学家研究和发布对新提案的攻击来发挥补充作用,包括初步结果,甚至代表某种方法无法有效攻击新系统的结果。这创造了一种文化,即分享已经尝试过的方法及其成功衡量标准的信息。目前,发表带有新攻击的论文的门槛如此之高。攻击密码学中潜在的数学难题是一项极具挑战性的工作,因此激励措施并不一致,无法鼓励新的研究人员和年轻的研究人员朝着这个方向努力。有机会在MathCrypt这样的网站上发表中间结果,应该有助于降低这一努力的风险,并鼓励更多的数学家追求这些研究方向。MathCrypt论文集还旨在发布基于数学难题新思想的新密码系统提案。后量子时代为自动化工作者提供了基于新思想创建新系统的机会和挑战。当一个数学难题的想法首次被提出时,很难在短的审查周期内在几周内评估其长期潜力。因此,更成熟的场馆可能不愿意在竞争激烈的过程中接受此类文件,因为如果在相对较短的时间内发现这些文件是薄弱的提案,则可能会将其视为一种风险。MathCrypt为讨论和发布新提案提供了一个论坛和社区。存在重大的资助机会,例如在美国,国家科学基金会(NSF)的SaTC网络安全项目,新系统和数学密码学研究方向的提案可能是获得联邦拨款支持的好人选。事实上,美国国家科学基金会的一位项目官员在8月份的第一次MathCrypt研讨会上发表了讲话,鼓励参与者向美国国家科学委员会SaTC项目申请潜在的研究支持。
{"title":"Preface to the First Annual MathCrypt Proceedings Volume","authors":"J. Cheon, K. Lauter, Donggeon Yhee","doi":"10.1515/jmc-2020-0060","DOIUrl":"https://doi.org/10.1515/jmc-2020-0060","url":null,"abstract":"In 2017, we decided to start the annual series of MathCryptWorkshops in order to encouragemore mathematicians and computational number theorists to propose and work on hard problems in cryptography. This is the first volume of papers from our first annual MathCrypt conference hosted at Crypto 2018, on August 19, 2018 in Santa Barbara. We were motivated to launch this series of workshops to attract more mathematicians to work on hard problems in cryptography. There is a gap in the publishing culture betweenmathematics and computer science which we hope to bridge with this effort. Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferenceswhich are themost prestigious venues for the research area. Manymathematicians are not accustomed to the model of submitting a paper by the conference deadline, presenting the work at the conference, and publishing in the proceedings volume.Wewanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal of Mathematical Cryptology was an ideal place and a willing partner to create this opportunity. We are at a point in time where it is increasingly important for mathematicians to be involved in cryptography research, as we set out to determine the next generation of cryptographic systems based on hard math problems which can withstand attacks from a quantum computer once it is built. In 2017, NIST launched a 5-year international competition to determine post-quantum cryptosystems (PQC). MathCrypt can play a complimentary role by encouragingmathematicians to work on and publish attacks on new proposals, including both preliminary results and also even results which represent the failure of a certain approach to effectively attack a new system. This creates the culture of sharing information on approacheswhich have been tried and their measure of success. Currently there is such a high bar for publishing papers with new attacks. Attacking the underlying hard math problems in cryptography is an extremely challenging endeavor, and so the incentives are not aligned to encourage new researchers and young researchers to work and commit themselves to this direction. The opportunity to publish intermediate results in venues like MathCrypt should help to de-risk this endeavor and encourage more mathematician to pursue these research directions. The MathCrypt proceedings volumes are also intended as a place to publish proposals for new cryptographic systems based on new ideas for hard math problems. The post quantum era provides both an opportunity and a challenge tomathematicians to create new systems based on new ideas.When an idea for a hard math problem is first proposed, it can be hard to evaluate the long-term potential in the span of a few weeks during a short review cycle. Thus more established venues may be reluctant to ","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"14 1","pages":"1 - 4"},"PeriodicalIF":1.2,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43783959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1