Graph-theoretic algorithms for the "isomorphism of polynomials" problem

19Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

We give three new algorithms to solve the "isomorphism of polynomial" problem, which was underlying the hardness of recovering the secret-key in some multivariate trapdoor one-way functions. In this problem, the adversary is given two quadratic functions, with the promise that they are equal up to linear changes of coordinates. Her objective is to compute these changes of coordinates, a task which is known to be harder than Graph-Isomorphism. Our new algorithm build on previous work in a novel way. Exploiting the birthday paradox, we break instances of the problem in time q2n/3 (rigorously) and qn/2 (heuristically), where q n is the time needed to invert the quadratic trapdoor function by exhaustive search. These results are obtained by turning the algebraic problem into a combinatorial one, namely that of recovering partial information on an isomorphism between two exponentially large graphs. These graphs, derived from the quadratic functions, are new tools in multivariate cryptanalysis. © 2013 International Association for Cryptologic Research.

References Powered by Scopus

The Magma algebra system I: The user language

4929Citations
N/AReaders
Get full text

PROOFS THAT YIELD NOTHING BUT THEIR VALIDITY AND A METHODOLOGY OF CRYPTOGRAPHIC PROTOCOL DESIGN.

299Citations
N/AReaders
Get full text

An algorithmic proof theory for hypergeometric (ordinary and "q") multisum/integral identities

247Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications

25Citations
N/AReaders
Get full text

Algorithms based on *-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing

24Citations
N/AReaders
Get full text

General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography

24Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bouillaguet, C., Fouque, P. A., & Véber, A. (2013). Graph-theoretic algorithms for the “isomorphism of polynomials” problem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7881 LNCS, pp. 211–227). https://doi.org/10.1007/978-3-642-38348-9_13

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 21

68%

Professor / Associate Prof. 4

13%

Lecturer / Post doc 4

13%

Researcher 2

6%

Readers' Discipline

Tooltip

Computer Science 22

73%

Mathematics 4

13%

Physics and Astronomy 2

7%

Engineering 2

7%

Save time finding and organizing research with Mendeley

Sign up for free