Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor pα qβ
نویسندگان
چکیده
Several recent cryptographic constructions – including a public key encryption scheme, a fully homomorphic encryption scheme, and a candidate multilinear map construction – rely on the hardness of the short generator principal ideal problem (SG-PIP): given a Z-basis of some principal (fractional) ideal in an algebraic number field that is guaranteed to have an exceptionally short generator with respect to the logarithmic embedding, find a shortest generator of the principal ideal. The folklore approach to solve this problem is to split it into two subproblems. First, recover some arbitrary generator of the ideal, which is known as the principal ideal problem (PIP). Second, solve a bounded distance decoding (BDD) problem in the log-unit lattice to transform this arbitrary generator into a shortest generator of the ideal. The first problem, i.e., solving the PIP, is known to be solvable in polynomial time on quantum computers for arbitrary number fields under the generalized Riemann hypothesis due to Biasse and Song. Cramer, Ducas, Peikert, and Regev showed, based on the work of Campbell, Groves, and Shepherd, that the second problem can be solved in polynomial time on classical computers for cyclotomic number fields of prime-power conductor. In this work, we extend the work of Cramer, Ducas, Peikert, and Regev to cyclotomic number fields K = Q(ξm) of conductor m = pq , where p, q are distinct odd primes. In more detail, we show that the second problem can be solved in classical polynomial time (with quantum polynomial time precomputation) under some sufficient conditions, if (p, q) is an (α, β)-generator prime pair, a new notion introduced in this work. We further provide experimental evidence that suggests that roughly 35% of all prime pairs are (α, β)-generator prime pairs for all α and β. Combined with the work of Biasse and Song our results show that under sufficient conditions the SG-PIP can be solved in quantum polynomial time in cyclotomic number fields of composite conductor of the form pq .
منابع مشابه
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
In this paper, we analyze the security of cryptosystems using short generators over ideal lattices such as candidate multilinear maps by Garg, Gentry and Halevi and fully homomorphic encryption by Smart and Vercauteren. Our approach is based on a recent work by Cramer, Ducas, Peikert and Regev on analysis of recovering a short generator of an ideal in the q-th cyclotomic field for a prime power...
متن کاملNotes on class field theory and complex multiplication
2 Class field theory 2 2.1 Number fields and their completions . . . . . . . . . . . . . . . 2 2.1.1 Number fields, prime ideals . . . . . . . . . . . . . . . . 2 2.1.2 Fractional Ideals . . . . . . . . . . . . . . . . . . . . . . 3 2.1.3 Completions . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.4 Adeles and ideles . . . . . . . . . . . . . . . . . . . . . . 4 2.1.5 Cycles . . . . . . ....
متن کاملRecovering Short Generators of Principal Ideals in Cyclotomic Rings
A handful of recent cryptographic proposals rely on the conjectured hardness of the following problem in the ring of integers of a cyclotomic number field: given a basis of a principal ideal that is guaranteed to have a “rather short” generator, find such a generator. Recently, Bernstein and Campbell-Groves-Shepherd sketched potential attacks against this problem; most notably, the latter autho...
متن کاملCryptography Based on Number Fields with Large Regulator
We explain a variant of the Fiat-Shamir identification and signature protocol which is based on the intractability of computing generators of principal ideals in algebraic number fields. We also show how to use the Cohen-Lenstra-Martinet heuristics for class groups to construct number fields in which computing generators of principal ideals is intractable.
متن کاملCryptography based on number fields with large regulator par
We explain a variant of the Fiat-Shamir identification and signature protocol that is based on the intractability of computing generators of principal ideals in algebraic number fields. We also show how to use the Cohen-Lenstra-Martinet heuristics for class groups to construct number fields in which computing generators of principal ideals is intractable.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017