素数伽罗瓦域GF(p)上的确定性多项式公钥算法

Randy Kuang
{"title":"素数伽罗瓦域GF(p)上的确定性多项式公钥算法","authors":"Randy Kuang","doi":"10.1109/ACCC54619.2021.00020","DOIUrl":null,"url":null,"abstract":"The ancient Vieta's formulas reveal the relationships between coefficients of an nth-degree polynomial and its roots. It is surprisingly found that there exists a hidden secret for a potential public key exchange: decoupling the product of all roots or constant term from summations of root products or coefficients of a polynomial to establish a keypair. The proposed deterministic polynomial public key algorithm or DPPK is built on the fact that a polynomial cannot be factorized without its constant term. DPPK allows the keypair generator to combine a base polynomial, eliminable during the decryption, with two solvable polynomials and creates two entangled polynomials. Two coefficient vectors of the entangled polynomials form a public key, and their constant terms, together with the two solvable polynomials, form the private key. By only publishing coefficients of polynomials without their constant terms, we greatly restrict polynomial factoring techniques for the private key extraction. We demonstrate that the time complexity, in terms of field operations, of the private key extraction from the known public key is a super-exponential difficulty O(p2) for classical attacks and an exponential difficulty O(p) for quantum attacks, respectively, in comparison with the low sub-exponential complexity for the PQC algorithms. The best-known deterministic complexity of the polynomial factoring problem for the secret key extraction from intercepted ciphertexts is O(npl/2) for classical attacks and O(pl/2) for quantum attacks, respectively, at the same complexity level as Grover's search algorithm. Performance comparisons with the PQC finalists for keypair generations, encryptions, and decryptions are presented.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p)\",\"authors\":\"Randy Kuang\",\"doi\":\"10.1109/ACCC54619.2021.00020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ancient Vieta's formulas reveal the relationships between coefficients of an nth-degree polynomial and its roots. It is surprisingly found that there exists a hidden secret for a potential public key exchange: decoupling the product of all roots or constant term from summations of root products or coefficients of a polynomial to establish a keypair. The proposed deterministic polynomial public key algorithm or DPPK is built on the fact that a polynomial cannot be factorized without its constant term. DPPK allows the keypair generator to combine a base polynomial, eliminable during the decryption, with two solvable polynomials and creates two entangled polynomials. Two coefficient vectors of the entangled polynomials form a public key, and their constant terms, together with the two solvable polynomials, form the private key. By only publishing coefficients of polynomials without their constant terms, we greatly restrict polynomial factoring techniques for the private key extraction. We demonstrate that the time complexity, in terms of field operations, of the private key extraction from the known public key is a super-exponential difficulty O(p2) for classical attacks and an exponential difficulty O(p) for quantum attacks, respectively, in comparison with the low sub-exponential complexity for the PQC algorithms. The best-known deterministic complexity of the polynomial factoring problem for the secret key extraction from intercepted ciphertexts is O(npl/2) for classical attacks and O(pl/2) for quantum attacks, respectively, at the same complexity level as Grover's search algorithm. Performance comparisons with the PQC finalists for keypair generations, encryptions, and decryptions are presented.\",\"PeriodicalId\":215546,\"journal\":{\"name\":\"2021 2nd Asia Conference on Computers and Communications (ACCC)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Asia Conference on Computers and Communications (ACCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCC54619.2021.00020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Asia Conference on Computers and Communications (ACCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCC54619.2021.00020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

古代的维耶塔公式揭示了n次多项式的系数和它的根之间的关系。令人惊讶的是,在潜在的公钥交换中存在一个隐藏的秘密:将所有根或常数项的乘积与多项式的根积或系数的和解耦以建立对。本文提出的确定性多项式公钥算法(DPPK)是建立在没有常数项的多项式不能被分解的基础上的。DPPK允许密钥对生成器将解密过程中可消除的基多项式与两个可解多项式结合起来,并创建两个纠缠多项式。纠缠多项式的两个系数向量构成公钥,其常数项与两个可解多项式构成私钥。由于只公布多项式的系数而不公布其常数项,我们极大地限制了多项式分解技术用于私钥提取。我们证明了从已知公钥中提取私钥的时间复杂度,就现场操作而言,对于经典攻击来说是一个超指数难度O(p2),对于量子攻击来说是一个指数难度O(p),与PQC算法的低次指数复杂度相比。从截获的密文中提取密钥的多项式分解问题的最著名的确定性复杂性分别是经典攻击的O(npl/2)和量子攻击的O(pl/2),其复杂性级别与Grover的搜索算法相同。给出了与PQC决赛选手在密钥对生成、加密和解密方面的性能比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p)
The ancient Vieta's formulas reveal the relationships between coefficients of an nth-degree polynomial and its roots. It is surprisingly found that there exists a hidden secret for a potential public key exchange: decoupling the product of all roots or constant term from summations of root products or coefficients of a polynomial to establish a keypair. The proposed deterministic polynomial public key algorithm or DPPK is built on the fact that a polynomial cannot be factorized without its constant term. DPPK allows the keypair generator to combine a base polynomial, eliminable during the decryption, with two solvable polynomials and creates two entangled polynomials. Two coefficient vectors of the entangled polynomials form a public key, and their constant terms, together with the two solvable polynomials, form the private key. By only publishing coefficients of polynomials without their constant terms, we greatly restrict polynomial factoring techniques for the private key extraction. We demonstrate that the time complexity, in terms of field operations, of the private key extraction from the known public key is a super-exponential difficulty O(p2) for classical attacks and an exponential difficulty O(p) for quantum attacks, respectively, in comparison with the low sub-exponential complexity for the PQC algorithms. The best-known deterministic complexity of the polynomial factoring problem for the secret key extraction from intercepted ciphertexts is O(npl/2) for classical attacks and O(pl/2) for quantum attacks, respectively, at the same complexity level as Grover's search algorithm. Performance comparisons with the PQC finalists for keypair generations, encryptions, and decryptions are presented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信