Algorithms for the Generalized NTRU Equations and their Storage Analysis

被引:0
|
作者
Cho, Gook Hwa [1 ]
Lim, Seongan [1 ]
Lee, Hyang-Sook [2 ]
机构
[1] Ewha Womans Univ, Inst Math Sci, Seoul, South Korea
[2] Ewha Womans Univ, Dept Math, Seoul, South Korea
关键词
NTRU; LATTE; hierarchical identity-based encryption;
D O I
10.3233/FI-2020-1982
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In LATTE, a lattice based hierarchical identity-based encryption (HIBE) scheme, each hierarchical level user delegates a trapdoor basis to the next level by solving a generalized NTRU equation of level l >= 3. For l = 2, Howgrave-Graham, Pipher, Silverman, and Whyte presented an algorithm using resultant and Pornin and Prest presented an algorithm using a field norm with complexity analysis. Even though their ideas of solving NTRU equations can be conceptually extended for l >= 3, no explicit algorithmic extensions with the storage analysis are known so far. In this paper, we interpret the generalized NTRU equation as the determinant of a matrix. By using the mathematical properties of the determinant, we show that how to construct algorithms for solving the generalized NTRU equation either using resultant or a field norm for any l >= 3. We also obtain an upper bound of the size of solutions by using the properties of the determinant. From our analysis, the storage requirement of the algorithm using resultant is O(l(2)n(2) log B) and that of the algorithm using a field norm is O(l(2)n log B), where B is an upper bound of the coefficients of the input polynomials of the generalized NTRU equations. We present examples of our algorithms for l = 3 and the average storage requirements for l = 3, 4.
引用
收藏
页码:115 / 139
页数:25
相关论文
共 50 条
  • [11] A solution for generalized eigen fuzzy sets equations by genetic algorithms and its application to image analysis
    Nobuhara, H
    Iyoda, EM
    Bede, B
    Hirota, K
    2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 208 - 212
  • [12] Sensitivity Analysis of Generalized Equations
    A. Shapiro
    Journal of Mathematical Sciences, 2003, 115 (4) : 2554 - 2565
  • [13] Solitary waves of the generalized Zakharov equations via integration algorithms
    Alotaibi, Hammad
    AIMS MATHEMATICS, 2024, 9 (05): : 12650 - 12677
  • [14] Two algorithms for solving generalized coupled Sylvester tensor equations
    Li, Tao
    Feng, Chi-Hua
    Zhang, Xin-Fang
    FILOMAT, 2023, 37 (30) : 10249 - 10264
  • [15] GENERALIZED EIGENPROBLEM ALGORITHMS AND SOFTWARE FOR ALGEBRAIC RICCATI-EQUATIONS
    ARNOLD, WF
    LAUB, AJ
    PROCEEDINGS OF THE IEEE, 1984, 72 (12) : 1746 - 1754
  • [16] Three approximation algorithms for solving the generalized segregated storage problem
    Barbucha, D
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2004, 156 (01) : 54 - 72
  • [17] Generalized filtering algorithms for infeasibility analysis
    Atlihan, Mustafa K.
    Schrage, Linus
    COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (05) : 1446 - 1464
  • [18] ANALYSIS OF GENERALIZED ACCELERANT IDENTIFICATION ALGORITHMS
    PLATONOV, AA
    POZNYAK, AS
    TIKHONOV, SN
    SHABATIN, E
    AUTOMATION AND REMOTE CONTROL, 1993, 54 (02) : 311 - 322
  • [19] Power analysis on ntru prime
    Huang W.-L.
    Chen J.-P.
    Yang B.-Y.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (01): : 123 - 151
  • [20] ANALYSIS OF FREE-STORAGE ALGORITHMS
    MARGOLIN, BH
    PARMELEE, RP
    SCHATZOF.M
    IBM SYSTEMS JOURNAL, 1971, 10 (04) : 283 - &