Chosen-ciphertext attack on noncommutative Polly Cracker
نویسنده
چکیده
1 Noncommutative Polly Cracker and preliminaries from noncommutative algebra The noncommutative Polly Cracker cryptosystems were developed by T.Rai in his Ph.D. dissertation ([1]), and rely on the fact that there are ideals of noncom-mutative algebras over finite fields that have infinite reduced Groebner bases. First let us briefly present notations that will be used further in the text. Everything in this section is based on [1].We will be working with a noncom-mutative algebra F q < X >, where X = {x 1 ,. .. , x n }, which is an algebra of noncommutative polynomials. By a monomial, we mean a finite noncommuta-tive word in the alphabet X. We use the letter B to denote the set of monomials. We define multiplication in the set B of monomials by concatenation. The next important thing is the notion of an admissible ordering. A well-ordering > on B is said to be admissible if it satisfies the following conditions for all p, q, r, s ∈ B: • if p < q then pr < qr; • if p < q then sp < sq ; • if p = qr then p > q and p > r. Let > be an admissible ordering on the monomials and f ∈ F q < X >. We say that a monomial b i occurs in f if the coefficient of b i in f = α i b i is not zero. We say that b i is the tip of f , denoted tip(f), if b i occurs in f and b i ≥ b j for all b j occurring in f. We denote the coefficient of tip(f) by Ctip(f). If S ⊆ F q < X >, then we write T ip(S) = {b ∈ B : b = tip(f) for some nonzero f ∈ S} and N onT ip(S) = B − T ip(S). Another thing we need is the notion of division of a polynomial g ∈ F q < X >
منابع مشابه
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems
In [2], Stanislav Bulygin presents a chosen-ciphertext attack against certain instances of noncommutative polly cracker-type cryptosystems which were proposed in [7] and [9]. In this article, we present generalized versions of this attack, which can be used against virtually all polly cracker-type cryptosystems. We then present a simple but effective techique to counter these attacks. We also p...
متن کاملNoncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several versions of these attacks, as well as techniques to counter them. First we introduce a chosen-ciphertext attack, which assumes a very simple private key. We then present generalizations of this attack which are valid in more general situations, and propose a simple but...
متن کاملPractical Fully Homomorphic Encryption for Integers over Polynomial Quotient Rings
In this article we describe a simplified version of Polly Cracker-style fully homomorphic encryption scheme. The main feature of our scheme is an ability to define a strict upper bound of ciphertext size when performing calculations on it for both addition and multiplication. Combined with homomorphic properties of Polly Cracker it’s able to reach high calculation performance without degrading ...
متن کاملPolly Cracker, Revisited
In this work, we initiate the formal treatment of cryptographic constructions (“Polly Cracker”) based on the hardness of computing remainders modulo an ideal. We start by formalising and studying the relation between the ideal remainder problem and the problem of computing a Gröbner basis. We show both positive and negative results. On the negative side, we define a symmetric Polly Cracker encr...
متن کاملWhat about Bob? The Inadequacy of CPA Security for Proxy Reencryption
Consider three parties: Alice, Bob, and Polly. Alice keeps some encrypted data that she can decrypt with a secret key known to her. She wants to communicate the data to Bob, but not to Polly (nor anybody else). Assuming Alice knows Bob’s public key, how can she communicate the data to him? Proxy reencryption provides an elegant answer: Alice creates a reencryption key that will enable Polly (th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/cs/0508015 شماره
صفحات -
تاریخ انتشار 2005