This paper is about the design of improved algorithms to solve Isomorphisms of Polynomials (IP) problems. These problems were first explicitly related to the problem of finding the secret key of some asymmetric cryptographic algorithms (such as Matsumoto and Imai's C* scheme of [12], or some variations of Patarin's HFE scheme of [14]). Moreover, in [14], it was shown that IP can be used in order to design an asymmetric authentication or signature scheme in a straightforward way. We also introduce the more general Morphisms of Polynomials problem (MP). As we see in this paper, these problems IP and MP have deep links with famous problems such as the Isomorphism of Graphs problem or the problem of fast multiplication of n x n matrices. The complexities of our algorithms for IP are still not polynomial, but they are much more efficient than the previously known algorithms. For example, for the IP problem of finding the two secret matrices of a Matsumoto-Imai C* scheme over K = Fq, the complexity of our algorithms is \(\mathcal{O}(q^{n/2} )\) instead of \(\mathcal{O}(q^{(n^2 )} )\) for previous algorithms. (In [13], the C* scheme was broken, but the secret key was not found). Moreover, we have algorithms to achieve a complexity \(\mathcal{O}(q^{\tfrac{3}{2}n} )\) on any system of n quadratic equations with n variables over K = Fq (not only equations from C*). We also show that the problem of deciding whether a polynomial isomorphism exists between two sets of equations is not NP-complete (assuming the classical hypothesis about Arthur-Merlin games), but solving IP is at least as difficult as the Graph Isomorphism problem (GI) (and perhaps much more difficult), so that IP is unlikely to be solvable in polynomial time. Moreover, the more general Morphisms of Polynomials problem (MP) is NP-hard. Finally, we suggest some variations of the IP problem that may be particularly convenient for cryptographic use.
[1]
V. Strassen.
Gaussian elimination is not optimal
,
1969
.
[2]
Silvio Micali,et al.
The Knowledge Complexity of Interactive Proof Systems
,
1989,
SIAM J. Comput..
[3]
Scott Fortin.
The Graph Isomorphism Problem
,
1996
.
[4]
Rudolf Lide,et al.
Finite fields
,
1983
.
[5]
Shafi Goldwasser,et al.
Private coins versus public coins in interactive proof systems
,
1986,
STOC '86.
[6]
Stathis Zachos,et al.
Does co-NP Have Short Interactive Proofs?
,
1987,
Inf. Process. Lett..
[7]
Jacques Patarin,et al.
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
,
1996,
EUROCRYPT.
[8]
V. Strassen.
The asymptotic spectrum of tensors.
,
1988
.
[9]
Srinivas Aluru,et al.
Massively Parallel Searching for Better Algorithms or How to Do a Cross Product with Five Multiplications
,
1996,
Sci. Program..
[10]
László Babai,et al.
Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes
,
1988,
J. Comput. Syst. Sci..
[11]
Don Coppersmith,et al.
Matrix multiplication via arithmetic progressions
,
1987,
STOC.
[12]
Erez Petrank,et al.
Is code equivalence easy to decide?
,
1997,
IEEE Trans. Inf. Theory.
[13]
Hideki Imai,et al.
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption
,
1988,
EUROCRYPT.
[14]
Silvio Micali,et al.
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
,
1986,
27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[15]
Jacques Patarin,et al.
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
,
1995,
CRYPTO.
[16]
Johan Håstad.
Tensor Rank is NP-Complete
,
1990,
J. Algorithms.