Computing discrete logarithms in subfields of residue class rings
نویسندگان
چکیده
Recent breakthrough methods [GGMZ, Jou, BGJT] on computing discrete logarithms in small characteristic finite fields share an interesting feature in common with the earlier medium prime function field sieve method [JL]. To solve discrete logarithms in a finite extension of a finite field F, a polynomial h(x) ∈ F[x] of a special form is constructed with an irreducible factor g(x) ∈ F[x] of the desired degree. The special form of h(x) is then exploited in generating multiplicative relations that hold in the residue class ring F[x]/h(x)F[x] hence also in the target residue class field F[x]/g(x)F[x]. An interesting question in this context and addressed in this paper is: when and how does a set of relations on the residue class ring determine the discrete logarithms in the finite fields contained in it? We give necessary and sufficient conditions for a set of relations on the residue class ring to determine discrete logarithms in the finite fields contained in it. We also present efficient algorithms to derive discrete logarithms from the relations when the conditions are met. The derived necessary conditions allow us to clearly identify structural obstructions intrinsic to the special polynomial h(x) in each of the aforementioned methods, and propose modifications to the selection of h(x) so as to avoid obstructions. Joux's relation generation algorithm with our modified polynomial selection, the Barbulescu-Gaudry-Joux-Thome descent, the Pohlig-Hellman algorithm and our method for determining discrete logarithms in subfields of residue class rings together imply a heuristic quasi polynomial time algorithm for computing discrete logarithms in small characteristic finite fields. In addition, a generator (primitive element) for the multiplicative group of the finite field can be efficiently constructed by our method. This is especially interesting when the factorization of the order of the unit group (F[x]/g(x)F[x]) × is not known.
منابع مشابه
On Black-Box Ring Extraction and Integer Factorization
The black-box extraction problem over rings has (at least) two important interpretations in cryptography: An efficient algorithm for this problem implies (i) the equivalence of computing discrete logarithms and solving the Diffie-Hellman problem and (ii) the in-existence of secure ring-homomorphic encryption schemes. In the special case of a finite field, Boneh/Lipton [BL96] and Maurer/Raub [MR...
متن کاملComputing Discrete Logarithms with Quadratic Number Rings
At present, there are two competing index calculus variants for computing discrete logarithms in (Z/pZ)* in practice. The purpose of this paper is to summarize the recent practical experience with a generalized implementation covering both a variant of the Number Field Sieve and the Gaussian integer method. By this implementation we set a record with p consisting of 85 decimal digits. With rega...
متن کاملFaster Individual Discrete Logarithms with the Qpa and Nfs Variants
Computing discrete logarithms in finite fields is a main concern in cryptography. The best algorithms known are the Number Field Sieve and its variants (special, high-degree, tower) in large and medium characteristic fields (e.g. GF(p2), GF(p12)); the Function Field Sieve and the Quasi Polynomialtime Algorithm in small characteristic finite fields (e.g. GF(36·509)). The last step of this family...
متن کاملComputing the multiplicative group of residue class rings
Let k be a global field with maximal order ok and let m0 be an ideal of ok. We present algorithms for the computation of the multiplicative group (ok/m0) ∗ of the residue class ring ok/m0 and the discrete logarithm therein based on the explicit representation of the group of principal units. We show how these algorithms can be combined with other methods in order to obtain more efficient algori...
متن کاملComputing discrete logarithms in real quadratic congruence function fields of large genus
The discrete logarithm problem in various finite abelian groups is the basis for some well known public key cryptosystems. Recently, real quadratic congruence function fields were used to construct a public key distribution system. The security of this public key system is based on the difficulty of a discrete logarithm problem in these fields. In this paper, we present a probabilistic algorith...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1402.6658 شماره
صفحات -
تاریخ انتشار 2014