On the Hidden Shifted Power Problem

We consider the problem of recovering a hidden element $s$ of a finite field $\F_q$ of $q$ elements from queries to an oracle that for a given $x\in \F_q$ returns $(x+s)^e$ for a given divisor $e\mid q-1$. We use some techniques from additive combinatorics and analytic number theory that lead to more efficient algorithms than the naive interpolation algorithm, for example, they use substantially fewer queries to the oracle.

[1]  J. Voloch,et al.  Fermat curves over finite fields , 1988 .

[2]  村田 玲音 On the Average of the Least Primitive Root Modulo $p$(Analytic Number Theory) , 1996 .

[3]  I. Shkredov,et al.  On additive shifts of multiplicative subgroups , 2012 .

[4]  M. Garaev,et al.  The equation x1x2=x3x4+λ in fields of prime order and applications , 2008 .

[5]  H. Iwaniec,et al.  Analytic Number Theory , 2004 .

[6]  Sean Hallgren,et al.  Quantum algorithms for some hidden shift problems , 2003, SODA '03.

[7]  Igor E. Shparlinski,et al.  Corrigenda to: Product Sets of Rationals, Multiplicative Translates of Subgroups in Residue Rings and Fixed Points of the Discrete Logarithm , 2009 .

[8]  Nitin Saxena,et al.  Algebraic independence and blackbox identity testing , 2011, Inf. Comput..

[9]  Richard J. Lipton,et al.  Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) , 1996, CRYPTO.

[10]  H. Montgomery Ten lectures on the interface between analytic number theory and harmonic analysis , 1994 .

[11]  Igor E. Shparlinski,et al.  On the Divisibility of Fermat Quotients , 2010 .

[12]  Igor E. Shparlinski,et al.  Isomorphism classes of elliptic curves over a finite field in some thin families , 2012 .

[13]  Igor E. Shparlinski,et al.  On the smallest pseudopower , 2009 .

[14]  S. I.D.,et al.  On additive shifts of multiplicative subgroups , 2011, 1102.1172.

[15]  C. Pomerance,et al.  Prime Numbers: A Computational Perspective , 2002 .

[16]  G. Tenenbaum,et al.  Integers without large prime factors , 1993 .

[17]  M. Z. Garaev,et al.  Concentration of Points on Two and Three Dimensional Modular Hyperbolas and Applications , 2010, 1007.1526.

[18]  Wieb Bosma,et al.  Algorithmic Number Theory , 2000, Lecture Notes in Computer Science.

[19]  Igor E. Shparlinski,et al.  On the value set of Fermat quotients , 2012 .

[20]  Ronald Joseph Burthe Upper bounds for least witnesses and generating sets , 1997 .

[21]  Mei-Chu Chang,et al.  Factorization in generalized arithmetic progressions and application to the Erdős-Szemerédi sum-product problems , 2003 .

[22]  Frederik Vercauteren,et al.  The Hidden Root Problem , 2008, Pairing.

[23]  Mei-Chu Chang,et al.  BURGESS INEQUALITY IN Fp 2 , 2009 .

[24]  Wim van Dam,et al.  Quantum Algorithms for Weighing Matrices and Quadratic Residues , 2000, Algorithmica.

[25]  Igor E. Shparlinski,et al.  Character Sums with Exponential Functions and their Applications: Applications to Coding Theory and Combinatorics , 1999 .

[26]  Igor E. Shparlinski,et al.  On vanishing Fermat quotients and a bound of the Ihara sum , 2011, 1104.3910.

[27]  P. D. T. A. Elliott,et al.  The average of the least primitive root , 1968 .

[28]  Enrico Bombieri,et al.  Roots of Polynomials in Subgroups of and Applications to Congruences , 2008 .

[29]  Igor Shparlinski,et al.  On congruences with products of variables from short intervals and applications , 2012, 1203.0017.

[30]  R. Gregory Taylor,et al.  Modern computer algebra , 2002, SIGA.

[31]  Alexander Russell,et al.  Classical and quantum function reconstruction via character evaluation , 2004, J. Complex..

[32]  W. Narkiewicz Elementary and Analytic Theory of Algebraic Numbers , 1990 .

[33]  James A. Anderson,et al.  Number Theory with Applications , 1996 .

[34]  Jeffrey Hoffstein,et al.  The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream Cipher , 2001 .

[35]  Dorian Goldfeld,et al.  Zeta functions, one-way functions, and pseudorandom number generators , 1997 .

[36]  Alfred Menezes,et al.  Pairing-Based Cryptography at High Security Levels , 2005, IMACC.

[37]  Ivan Damgård,et al.  On the Randomness of Legendre and Jacobi Sequences , 1990, CRYPTO.

[38]  J. Bourgain,et al.  On the distribution of the residues of small multiplicative subgroups of $$ \mathbb{F}_p $$ , 2009 .

[39]  Igor E. Shparlinski,et al.  Product Sets of Rationals, Multiplicative Translates of Subgroups in Residue Rings, and Fixed Points of the Discrete Logarithm , 2010 .

[40]  Igor E. Shparlinski,et al.  Distribution of Elements of Cosets of Small Subgroups and Applications , 2011, 1103.0567.

[41]  Mei-Chu Chang,et al.  On a question of Davenport and Lewis and new character sum bounds in finite fields , 2008 .

[42]  Igor E. Shparlinski,et al.  Pseudorandomness and Dynamics of Fermat Quotients , 2010, SIAM J. Discret. Math..

[43]  H. Koch,et al.  Basic Number Theory , 1997 .

[44]  Sergei Konyagin,et al.  Estimates of character sums in finite fields , 2010 .

[45]  Teresa Krick,et al.  Sharp estimates for the arithmetic Nullstellensatz , 1999, math/9911094.