Asymptotically faster quantum algorithms to solve multivariate quadratic equations

This paper designs and analyzes a quantum algorithm to solve a system of m quadratic equations in n variables over a finite field \({\mathbf {F}}_q\). In the case \(m=n\) and \(q=2\), under standard assumptions, the algorithm takes time \(2^{(t+o(1))n}\) on a mesh-connected computer of area \(2^{(a+o(1))n}\), where \(t\approx 0.45743\) and \(a\approx 0.01467\). The area-time product has asymptotic exponent \(t+a\approx 0.47210\).

[1]  C. Chester,et al.  An extension of the method of steepest descents , 1957, Mathematical Proceedings of the Cambridge Philosophical Society.

[2]  Daniel Lazard,et al.  Resolution des Systemes d'Equations Algebriques , 1981, Theor. Comput. Sci..

[3]  H. T. Kung,et al.  The Area-Time Complexity of Binary Multiplication , 1981, JACM.

[4]  Douglas H. Wiedemann Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.

[5]  Charles H. Bennett Time/Space Trade-Offs for Reversible Computation , 1989, SIAM J. Comput..

[6]  Emanuel Knill,et al.  An analysis of Bennett's pebble game , 1995, ArXiv.

[7]  Jacques Patarin,et al.  Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.

[8]  N. Courtois,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[9]  Roderick Wong,et al.  Asymptotic approximations of integrals , 1989, Classics in applied mathematics.

[10]  Daniel J. Bernstein,et al.  Circuits for Integer Factorization: A Proposal , 2001 .

[11]  Claus Diem,et al.  The XL-Algorithm and a Conjecture from Commutative Algebra , 2004, ASIACRYPT.

[12]  Bo-Yin Yang,et al.  On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis , 2004, ICICS.

[13]  Bo-Yin Yang,et al.  Theoretical Analysis of XL over Small Fields , 2004, ACISP.

[14]  Philippe Flajolet,et al.  Analytic Combinatorics , 2009 .

[15]  P. Flajolet,et al.  Analytic Combinatorics: RANDOM STRUCTURES , 2009 .

[16]  Jean-Charles Faugère,et al.  Algebraic Cryptanalysis of McEliece Variants with Compact Keys , 2010, EUROCRYPT.

[17]  Information and Communications Security , 2010, Lecture Notes in Computer Science.

[18]  Henri Gilbert,et al.  Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings , 2010, EUROCRYPT.

[19]  Chen-Mou Cheng,et al.  Solving Quadratic Equations with XL on Parallel Architectures , 2012, CHES.

[20]  Kasper Green Larsen,et al.  Faster Online Matrix-Vector Multiplication , 2016, SODA.

[21]  Huacheng Yu,et al.  Beating Brute Force for Systems of Polynomial Equations over Finite Fields , 2017, SODA.