191 research outputs found
Pseudo-Free Families of Finite Computational Elementary Abelian -Groups
Loosely speaking, a family of computational groups is a family of groups (where is a set of bit strings) whose elements are represented by bit strings in such a way that equality testing, multiplication, inversion, computing the identity element, and sampling random elements in can be performed efficiently when is given. A family of computational groups is called pseudo-free if, given a random index (for an arbitrary value of the security parameter) and random elements , it is computationally hard to find a system of group equations , , and elements such that this system of equations is unsatisfiable in the free group freely generated by (over variables ), but in for all . If a family of computational groups satisfies this definition with the additional requirement that , then this family is said to be weakly pseudo-free. The definition of a (weakly) pseudo-free family of computational groups can be easily generalized to the case when all groups in the family belong to a fixed variety of groups.
In this paper, we initiate the study of (weakly) pseudo-free families of computational elementary abelian -groups, where is an arbitrary fixed prime. We restrict ourselves to families of computational elementary abelian -groups such that for every index , each element of is represented by a single bit string of length polynomial in the length of .
First, we prove that pseudo-freeness and weak pseudo-freeness for families of computational elementary abelian -groups are equivalent. Second, we give some necessary and sufficient conditions for a family of computational elementary abelian -groups to be pseudo-free (provided that at least one of two additional conditions holds). These necessary and sufficient conditions are formulated in terms of collision-intractability or one-wayness of certain homomorphic families of knapsack functions. Third, we establish some necessary and sufficient conditions for the existence of pseudo-free families of computational elementary abelian -groups. With one exception, these conditions are the existence of certain homomorphic collision-intractable families of -ary hash functions or certain homomorphic one-way families of functions.
As an example, we construct a Diffie-Hellman-like key agreement protocol from an arbitrary family of computational elementary abelian -groups. Unfortunately, we do not know whether this protocol is secure under reasonable assumptions
Pseudo-Free Families and Cryptographic Primitives
In this paper, we study the connections between pseudo-free families of computational -algebras (in appropriate varieties of -algebras for suitable finite sets of finitary operation symbols) and certain standard cryptographic primitives. We restrict ourselves to families of computational -algebras (where ) such that for every , each element of is represented by a unique bit string of length polynomial in the length of . Very loosely speaking, our main results are as follows: (i) pseudo-free families of computational mono-unary algebras with one-to-one fundamental operation (in the variety of all mono-unary algebras) exist if and only if one-way families of permutations exist; (ii) for any , pseudo-free families of computational -unary algebras with one-to-one fundamental operations (in the variety of all -unary algebras) exist if and only if claw-resistant families of -tuples of permutations exist; (iii) for a certain and a certain variety of -algebras, the existence of pseudo-free families of computational -algebras in implies the existence of families of trapdoor permutations
Quantum Copy-Protection and Quantum Money
Forty years ago, Wiesner proposed using quantum states to create money that
is physically impossible to counterfeit, something that cannot be done in the
classical world. However, Wiesner's scheme required a central bank to verify
the money, and the question of whether there can be unclonable quantum money
that anyone can verify has remained open since. One can also ask a related
question, which seems to be new: can quantum states be used as copy-protected
programs, which let the user evaluate some function f, but not create more
programs for f? This paper tackles both questions using the arsenal of modern
computational complexity. Our main result is that there exist quantum oracles
relative to which publicly-verifiable quantum money is possible, and any family
of functions that cannot be efficiently learned from its input-output behavior
can be quantumly copy-protected. This provides the first formal evidence that
these tasks are achievable. The technical core of our result is a
"Complexity-Theoretic No-Cloning Theorem," which generalizes both the standard
No-Cloning Theorem and the optimality of Grover search, and might be of
independent interest. Our security argument also requires explicit
constructions of quantum t-designs. Moving beyond the oracle world, we also
present an explicit candidate scheme for publicly-verifiable quantum money,
based on random stabilizer states; as well as two explicit schemes for
copy-protecting the family of point functions. We do not know how to base the
security of these schemes on any existing cryptographic assumption. (Note that
without an oracle, we can only hope for security under some computational
assumption.)Comment: 14-page conference abstract; full version hasn't appeared and will
never appear. Being posted to arXiv mostly for archaeological purposes.
Explicit money scheme has since been broken by Lutomirski et al
(arXiv:0912.3825). Other quantum money material has been superseded by
results of Aaronson and Christiano (coming soon). Quantum copy-protection
ideas will hopefully be developed in separate wor
Society-oriented cryptographic techniques for information protection
Groups play an important role in our modern world. They are more reliable and more trustworthy than individuals. This is the reason why, in an organisation, crucial decisions are left to a group of people rather than to an individual. Cryptography supports group activity by offering a wide range of cryptographic operations which can only be successfully executed if a well-defined group of people agrees to co-operate. This thesis looks at two fundamental cryptographic tools that are useful for the management of secret information. The first part looks in detail at secret sharing schemes. The second part focuses on society-oriented cryptographic systems, which are the application of secret sharing schemes in cryptography. The outline of thesis is as follows
Analysis of BCNS and Newhope Key-exchange Protocols
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. Following increasing interest from both companies and government agencies in building quantum computers, a number of works have proposed instantiations of practical post-quantum key-exchange protocols based on hard problems in lattices, mainly based on the Ring Learning With Errors (R-LWE) problem.
In this work we present an analysis of Ring-LWE based key-exchange mechanisms and compare two implementations of Ring-LWE based key-exchange protocol: BCNS and NewHope. This is important as NewHope protocol implementation outperforms state-of-the art elliptic curve based Diffie-Hellman key-exchange X25519, thus showing that using quantum safe key-exchange is not only a viable option but also a faster one. Specifically, this thesis compares different reconciliation methods, parameter choices, noise sampling algorithms and performance
Hard Mathematical Problems in Cryptography and Coding Theory
In this thesis, we are concerned with certain interesting computationally hard problems and the complexities of their associated algorithms. All of these problems share a common feature in that they all arise from, or have applications to, cryptography, or the theory of error correcting codes. Each chapter in the thesis is based on a stand-alone paper which attacks a particular hard problem. The problems and the techniques employed in attacking them are described in detail. The first problem concerns integer factorization: given a positive integer . the problem is to find the unique prime factors of . This problem, which was historically of only academic interest to number theorists, has in recent decades assumed a central importance in public-key cryptography. We propose a method for factorizing a given integer using a graph-theoretic algorithm employing Binary Decision Diagrams (BDD). The second problem that we consider is related to the classification of certain naturally arising classes of error correcting codes, called self-dual additive codes over the finite field of four elements, . We address the problem of classifying self-dual additive codes, determining their weight enumerators, and computing their minimum distance. There is a natural relation between self-dual additive codes over and graphs via isotropic systems. Utilizing the properties of the corresponding graphs, and again employing Binary Decision Diagrams (BDD) to compute the weight enumerators, we can obtain a theoretical speed up of the previously developed algorithm for the classification of these codes. The third problem that we investigate deals with one of the central issues in cryptography, which has historical origins in the theory of geometry of numbers, namely the shortest vector problem in lattices. One method which is used both in theory and practice to solve the shortest vector problem is by enumeration algorithms. Lattice enumeration is an exhaustive search whose goal is to find the shortest vector given a lattice basis as input. In our work, we focus on speeding up the lattice enumeration algorithm, and we propose two new ideas to this end. The shortest vector in a lattice can be written as . where are integer coefficients and are the lattice basis vectors. We propose an enumeration algorithm, called hybrid enumeration, which is a greedy approach for computing a short interval of possible integer values for the coefficients of a shortest lattice vector. Second, we provide an algorithm for estimating the signs or of the coefficients of a shortest vector . Both of these algorithms results in a reduction in the number of nodes in the search tree. Finally, the fourth problem that we deal with arises in the arithmetic of the class groups of imaginary quadratic fields. We follow the results of Soleng and Gillibert pertaining to the class numbers of some sequence of imaginary quadratic fields arising in the arithmetic of elliptic and hyperelliptic curves and compute a bound on the effective estimates for the orders of class groups of a family of imaginary quadratic number fields. That is, suppose is a sequence of positive numbers tending to infinity. Given any positive real number . an effective estimate is to find the smallest positive integer depending on such that for all . In other words, given a constant . we find a value such that the order of the ideal class in the ring (provided by the homomorphism in Soleng's paper) is greater than for any . In summary, in this thesis we attack some hard problems in computer science arising from arithmetic, geometry of numbers, and coding theory, which have applications in the mathematical foundations of cryptography and error correcting codes
- …