23 research outputs found
New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem
We consider the decoding problem or the problem of finding low weight
codewords for rank metric codes. We show how additional information about the
codeword we want to find under the form of certain linear combinations of the
entries of the codeword leads to algorithms with a better complexity. This is
then used together with a folding technique for attacking a McEliece scheme
based on LRPC codes. It leads to a feasible attack on one of the parameters
suggested in \cite{GMRZ13}.Comment: A shortened version of this paper will be published in the
proceedings of the IEEE International Symposium on Information Theory 2015
(ISIT 2015
Cryptography from tensor problems
We describe a new proposal for a trap-door one-way function. The new proposal belongs to the "multivariate quadratic" family but the trap-door is different from existing methods, and is simpler
Deterministic Polynomial Time Algorithms for Matrix Completion Problems
We present new deterministic algorithms for several cases of the maximum rank
matrix completion problem (for short matrix completion), i.e. the problem of
assigning values to the variables in a given symbolic matrix as to maximize the
resulting matrix rank. Matrix completion belongs to the fundamental problems in
computational complexity with numerous important algorithmic applications,
among others, in computing dynamic transitive closures or multicast network
codings (Harvey et al SODA 2005, Harvey et al SODA 2006).
We design efficient deterministic algorithms for common generalizations of
the results of Lovasz and Geelen on this problem by allowing linear functions
in the entries of the input matrix such that the submatrices corresponding to
each variable have rank one. We present also a deterministic polynomial time
algorithm for finding the minimal number of generators of a given module
structure given by matrices. We establish further several hardness results
related to matrix algebras and modules. As a result we connect the classical
problem of polynomial identity testing with checking surjectivity (or
injectivity) between two given modules. One of the elements of our algorithm is
a construction of a greedy algorithm for finding a maximum rank element in the
more general setting of the problem. The proof methods used in this paper could
be also of independent interest.Comment: 14 pages, preliminar
Zero forcing in iterated line digraphs
Zero forcing is a propagation process on a graph, or digraph, defined in
linear algebra to provide a bound for the minimum rank problem. Independently,
zero forcing was introduced in physics, computer science and network science,
areas where line digraphs are frequently used as models. Zero forcing is also
related to power domination, a propagation process that models the monitoring
of electrical power networks.
In this paper we study zero forcing in iterated line digraphs and provide a
relationship between zero forcing and power domination in line digraphs. In
particular, for regular iterated line digraphs we determine the minimum
rank/maximum nullity, zero forcing number and power domination number, and
provide constructions to attain them. We conclude that regular iterated line
digraphs present optimal minimum rank/maximum nullity, zero forcing number and
power domination number, and apply our results to determine those parameters on
some families of digraphs often used in applications
On the Complexity of the Generalized MinRank Problem
We study the complexity of solving the \emph{generalized MinRank problem},
i.e. computing the set of points where the evaluation of a polynomial matrix
has rank at most . A natural algebraic representation of this problem gives
rise to a \emph{determinantal ideal}: the ideal generated by all minors of size
of the matrix. We give new complexity bounds for solving this problem
using Gr\"obner bases algorithms under genericity assumptions on the input
matrix. In particular, these complexity bounds allow us to identify families of
generalized MinRank problems for which the arithmetic complexity of the solving
process is polynomial in the number of solutions. We also provide an algorithm
to compute a rational parametrization of the variety of a 0-dimensional and
radical system of bi-degree . We show that its complexity can be bounded
by using the complexity bounds for the generalized MinRank problem.Comment: 29 page
An algebraic approach to the Rank Support Learning problem
Rank-metric code-based cryptography relies on the hardness of decoding a
random linear code in the rank metric. The Rank Support Learning problem (RSL)
is a variant where an attacker has access to N decoding instances whose errors
have the same support and wants to solve one of them. This problem is for
instance used in the Durandal signature scheme. In this paper, we propose an
algebraic attack on RSL which clearly outperforms the previous attacks to solve
this problem. We build upon Bardet et al., Asiacrypt 2020, where similar
techniques are used to solve MinRank and RD. However, our analysis is simpler
and overall our attack relies on very elementary assumptions compared to
standard Gr{\"o}bner bases attacks. In particular, our results show that key
recovery attacks on Durandal are more efficient than was previously thought