11,022 research outputs found
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Ideas from Fourier analysis have been used in cryptography for the last three
decades. Akavia, Goldwasser and Safra unified some of these ideas to give a
complete algorithm that finds significant Fourier coefficients of functions on
any finite abelian group. Their algorithm stimulated a lot of interest in the
cryptography community, especially in the context of `bit security'. This
manuscript attempts to be a friendly and comprehensive guide to the tools and
results in this field. The intended readership is cryptographers who have heard
about these tools and seek an understanding of their mechanics and their
usefulness and limitations. A compact overview of the algorithm is presented
with emphasis on the ideas behind it. We show how these ideas can be extended
to a `modulus-switching' variant of the algorithm. We survey some applications
of this algorithm, and explain that several results should be taken in the
right context. In particular, we point out that some of the most important bit
security problems are still open. Our original contributions include: a
discussion of the limitations on the usefulness of these tools; an answer to an
open question about the modular inversion hidden number problem
Hard isogeny problems over RSA moduli and groups with infeasible inversion
We initiate the study of computational problems on elliptic curve isogeny
graphs defined over RSA moduli. We conjecture that several variants of the
neighbor-search problem over these graphs are hard, and provide a comprehensive
list of cryptanalytic attempts on these problems. Moreover, based on the
hardness of these problems, we provide a construction of groups with infeasible
inversion, where the underlying groups are the ideal class groups of imaginary
quadratic orders.
Recall that in a group with infeasible inversion, computing the inverse of a
group element is required to be hard, while performing the group operation is
easy. Motivated by the potential cryptographic application of building a
directed transitive signature scheme, the search for a group with infeasible
inversion was initiated in the theses of Hohenberger and Molnar (2003). Later
it was also shown to provide a broadcast encryption scheme by Irrer et al.
(2004). However, to date the only case of a group with infeasible inversion is
implied by the much stronger primitive of self-bilinear map constructed by
Yamakawa et al. (2014) based on the hardness of factoring and
indistinguishability obfuscation (iO). Our construction gives a candidate
without using iO.Comment: Significant revision of the article previously titled "A Candidate
Group with Infeasible Inversion" (arXiv:1810.00022v1). Cleared up the
constructions by giving toy examples, added "The Parallelogram Attack" (Sec
5.3.2). 54 pages, 8 figure
The sixth Painleve transcendent and uniformization of algebraic curves
We exhibit a remarkable connection between sixth equation of Painleve list
and infinite families of explicitly uniformizable algebraic curves. Fuchsian
equations, congruences for group transformations, differential calculus of
functions and differentials on corresponding Riemann surfaces, Abelian
integrals, analytic connections (generalizations of Chazy's equations), and
other attributes of uniformization can be obtained for these curves. As
byproducts of the theory, we establish relations between Picard-Hitchin's
curves, hyperelliptic curves, punctured tori, Heun's equations, and the famous
differential equation which Apery used to prove the irrationality of Riemann's
zeta(3).Comment: Final version. Numerous improvements; English, 49 pages, 1 table, no
figures, LaTe
On uniformization of Burnside's curve
Main objects of uniformization of the curve are studied: its
Burnside's parametrization, corresponding Schwarz's equation, and accessory
parameters. As a result we obtain the first examples of solvable Fuchsian
equations on torus and exhibit number-theoretic integer -series for
uniformizing functions, relevant modular forms, and analytic series for
holomorphic Abelian integrals. A conjecture of Whittaker for hyperelliptic
curves and its hypergeometric reducibility are discussed. We also consider the
conversion between Burnside's and Whittaker's uniformizations.Comment: Final version. LaTeX, 23 pages, 1 figure. The handbook for elliptic
functions has been moved to arXiv:0808.348
Elliptic Curves and Hyperdeterminants in Quantum Gravity
Hyperdeterminants are generalizations of determinants from matrices to
multi-dimensional hypermatrices. They were discovered in the 19th century by
Arthur Cayley but were largely ignored over a period of 100 years before once
again being recognised as important in algebraic geometry, physics and number
theory. It is shown that a cubic elliptic curve whose Mordell-Weil group
contains a Z2 x Z2 x Z subgroup can be transformed into the degree four
hyperdeterminant on a 2x2x2 hypermatrix comprising its variables and
coefficients. Furthermore, a multilinear problem defined on a 2x2x2x2
hypermatrix of coefficients can be reduced to a quartic elliptic curve whose
J-invariant is expressed in terms of the hypermatrix and related invariants
including the degree 24 hyperdeterminant. These connections between elliptic
curves and hyperdeterminants may have applications in other areas including
physics.Comment: 7 page
Notes on the Riemann Hypothesis
These notes were written from a series of lectures given in March 2010 at the
Universidad Complutense of Madrid and then in Barcelona for the centennial
anniversary of the Spanish Mathematical Society (RSME). Our aim is to give an
introduction to the Riemann Hypothesis and a panoramic view of the world of
zeta and L-functions. We first review Riemann's foundational article and
discuss the mathematical background of the time and his possible motivations
for making his famous conjecture. We discuss some of the most relevant
developments after Riemann that have contributed to a better understanding of
the conjecture.Comment: 2 sections added, 55 pages, 6 figure
Cryptography from tensor problems
We describe a new proposal for a trap-door one-way function. The new proposal belongs to the "multivariate quadratic" family but the trap-door is different from existing methods, and is simpler
Efficient Unified Arithmetic for Hardware Cryptography
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1], the US federal Digital Signature Standard [2], elliptic curve cryptography [3, 4], and also recently identity based cryptography [5, 6]. Most popular finite fields that are heavily used in cryptographic applications due to elliptic curve based schemes are prime fields GF(p) and binary extension fields GF(2n). Recently, identity based cryptography based on pairing operations defined over elliptic curve points has stimulated a significant level of interest in the arithmetic of ternary extension fields, GF(3^n)
- …