Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case
From MaRDI portal
Abstract: Let and be two sets of nonlinear polynomials over ( being a field). We consider the computational problem of finding -- if any -- an invertible transformation on the variables mapping to . The corresponding equivalence problem is known as { t Isomorphism of Polynomials with one Secret} ({ t IP1S}) and is a fundamental problem in multivariate cryptography. The main result is a randomized polynomial-time algorithm for solving { t IP1S} for quadratic instances, a particular case of importance in cryptography and somewhat justifying {it a posteriori} the fact that {it Graph Isomorphism} reduces to only cubic instances of { t IP1S} (Agrawal and Saxena). To this end, we show that { t IP1S} for quadratic polynomials can be reduced to a variant of the classical module isomorphism problem in representation theory, which involves to test the orthogonal simultaneous conjugacy of symmetric matrices. We show that we can essentially {it linearize} the problem by reducing quadratic-{ t IP1S} to test the orthogonal simultaneous similarity of symmetric matrices; this latter problem was shown by Chistov, Ivanyos and Karpinski to be equivalent to finding an invertible matrix in the linear space of matrices over and to compute the square root in a matrix algebra. While computing square roots of matrices can be done efficiently using numerical methods, it seems difficult to control the bit complexity of such methods. However, we present exact and polynomial-time algorithms for computing the square root in for various fields (including finite fields). We then consider \#{ t IP1S}, the counting version of { t IP1S} for quadratic instances. In particular, we provide a (complete) characterization of the automorphism group of homogeneous quadratic polynomials. Finally, we also consider the more general {it Isomorphism of Polynomials} ({ t IP}) problem where we allow an invertible linear transformation on the variables emph{and} on the set of polynomials. A randomized polynomial-time algorithm for solving { t IP} when (mathbf{f}=(x_1^d,ldots,x_n^d)) is presented. From an algorithmic point of view, the problem boils down to factoring the determinant of a linear matrix (emph{i.e.} a matrix whose components are linear polynomials). This extends to { t IP} a result of Kayal obtained for { t PolyProj}.
Recommendations
- scientific article; zbMATH DE number 1303122
- Graph-theoretic algorithms for the ``isomorphism of polynomials problem
- scientific article; zbMATH DE number 4132307
- scientific article; zbMATH DE number 4101330
- scientific article; zbMATH DE number 88948
- Explicit isogenies in quadratic time in any characteristic
- Efficient algorithms for some special cases of the polynomial equivalence problem
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- Algorithmic regularity for polynomials and applications
- The Complexity of Solving Polynomial Equations by Quadrature
Cites work
- scientific article; zbMATH DE number 1703931 (Why is no real title available?)
- scientific article; zbMATH DE number 3138903 (Why is no real title available?)
- scientific article; zbMATH DE number 4070803 (Why is no real title available?)
- scientific article; zbMATH DE number 3651744 (Why is no real title available?)
- scientific article; zbMATH DE number 149364 (Why is no real title available?)
- scientific article; zbMATH DE number 1253966 (Why is no real title available?)
- scientific article; zbMATH DE number 1262434 (Why is no real title available?)
- scientific article; zbMATH DE number 1303122 (Why is no real title available?)
- scientific article; zbMATH DE number 691245 (Why is no real title available?)
- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
- A novel group signature scheme based on MPKC
- Additive groups associated with points of a projective space
- Affine projections of polynomials (extended abstract)
- COMPUTING JORDAN NORMAL FORMS EXACTLY FOR COMMUTING MATRICES IN POLYNOMIAL TIME
- Computing Hironaka's invariants: ridge and directrix
- Computing symmetric rank for symmetric tensors
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
- Efficient algorithms for some special cases of the polynomial equivalence problem
- Equivalence of $\mathbb{F}$ -Algebras and Cubic Forms
- Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems
- Explicit lower bounds via geometric complexity theory
- Gaussian elimination is not optimal
- Geometric complexity theory and tensor rank
- Geometric complexity theory. I: An approach to the P vs. NP and related problems
- Graph-theoretic algorithms for the ``isomorphism of polynomials problem
- Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
- Invariance of simultaneous similarity and equivalence of matrices under extension of the ground field
- Modern computer algebra
- New insight into the isomorphism of polynomial problem IP1S and its use in cryptography
- On enumeration of polynomial equivalence classes and their application to MPKC
- On representations of general linear groups over principal ideal local rings of length two.
- Partial derivatives in arithmetic complexity and beyond
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem
- Reducing the number of variables of a polynomial
- Representation by quadratic forms in a finite field
- Structured Factorizations in Scalar Product Spaces
- Symmetric Tensors and Symmetric Tensor Rank
- Systems of distinct representatives and linear algebra
- The Magma algebra system. I: The user language
- The complexity of computing the permanent
- The distribution of polynomials over finite fields, with applications to the Gowers norms
- Tight lower bounds for testing linear isomorphism
- Two classical theorems on commuting matrices
Cited in
(13)- General linear group action on tensors: a candidate for post-quantum cryptography
- Efficient algorithms for some special cases of the polynomial equivalence problem
- Quadratic-Time Algorithms for Normal Elements
- Algorithms based on \(*\)-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
- Solving the problem of blockwise isomorphism of polynomials with circulant matrices
- Graph-theoretic algorithms for the ``isomorphism of polynomials problem
- On the Complexity of Isomorphism Problems for Tensors, Groups, and Polynomials I: Tensor Isomorphism-Completeness
- Algorithms based on \(\ast\)-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
- On enumeration of polynomial equivalence classes
- Average-case algorithms for testing isomorphism of polynomials, algebras, and multilinear forms
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms
This page was built for publication: Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2349096)