skip to main content
10.1145/1837934.1837984acmotherconferencesArticle/Chapter ViewAbstractPublication PagesissacConference Proceedingsconference-collections
research-article

Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology

Published: 25 July 2010 Publication History

Abstract

Computing loci of rank defects of linear matrices (also called the MinRank problem) is a fundamental NP-hard problem of linear algebra which has applications in Cryptology, in Error Correcting Codes and in Geometry. Given a square linear matrix (i.e. a matrix whose entries are k-variate linear forms) of size n and an integer r, the problem is to find points such that the evaluation of the matrix has rank less than r + 1. The aim of the paper is to obtain the most efficient algorithm to solve this problem. To this end, we give the theoretical and practical complexity of computing Gröbner bases of two algebraic formulations of the MinRank problem. Both modelings lead to structured algebraic systems.
The first modeling, proposed by Kipnis and Shamir generates bi-homogeneous equations of bi-degree (1, 1). The second one is classically obtained by the vanishing of the (r + 1)-minors of the given matrix, giving rise to a determinantal ideal. In both cases, under genericity assumptions on the entries of the considered matrix, we give new bounds on the degree of regularity of the considered ideal which allows us to estimate the complexity of the whole Gröbner bases computations. For instance, the exact degree of regularity of the determinantal ideal formulation of a generic well-defined MinRank problem is r(n - r) + 1. We also give optimal degree bounds of the loci of rank defect which are reached under genericity assumptions; the new bounds are much lower than the standard multi-homogeneous Bézout bounds (or mixed volume of Newton polytopes).
TAs a by-product, we prove that the generic MinRank problem could be solved in polynomial time in n (when n - r is fixed) as announced in a previous paper of Faugère, Levy-dit-Vehel and Perret. Moreover, using the determinantal ideal formulation, these results are used to break a cryptographic challenge (which was untractable so far) and allow us to evaluate precisely the security of the cryptosystem w.r.t. n, r and k. Our practical results suggest that, up to the software state of the art, this latter formulation is more adapted in the context of Gröbner bases computations.

References

[1]
B. Bank, M. Giusti, J. Heintz, M. Safey El Din, and E. Schost. On the geometry of polar varieties. Applicable Algebra in Engineering, Communication and Computing, 21(1):33--83, 2010.
[2]
M. Bardet, J.-C. Faugère, and B. Salvy. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In Proceedings of the International Conference on Polynomial System Solving, pages 71--74, 2004.
[3]
M. Bardet, J.-C. Faugère, B. Salvy, and B. Yang. Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In Proceedings of MEGA, 2005.
[4]
W. Bruns and U. Vetter. Determinantal rings. Springer, 1988.
[5]
J. Buss, G. Frandsen, and J. Shallit. The computational complexity of some problems of linear algebra. Journal of Computer and System Sciences, 58(3):572--596, 1999.
[6]
A. Conca and J. Herzog. On the Hilbert function of determinantal rings and their canonical module. Proceedings of the American Mathematical Society, pages 677--681, 1994.
[7]
N. Courtois. Efficient zero-knowledge authentication based on a linear algebra problem MinRank. In Advances in Cryptology - Asiacrypt 2001, volume 2248 of LNCS, pages 402--421. Springer.
[8]
D. Cox, J. Little, and D. O'Shea. Ideals, varieties, and algorithms: an introduction to computational algebraic geometry and commutative algebra. Springer, 1997.
[9]
D. Eisenbud. Commutative algebra with a view toward algebraic geometry. Springer, 2004.
[10]
I. Emiris and J. Canny. Efficient incremental algorithms for the sparse resultant and the mixed volume. Journal of Symbolic Computation, 20(2):117--149, 1995.
[11]
J.-C. Faugère. A new efficient algorithm for computing Gröbner bases (F4). Journal of Pure and Applied Algebra, 139(1--3):61--88, 1999.
[12]
J.-C. Faugère. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, pages 75--83. ACM, 2002.
[13]
J.-C. Faugère, P. Gianni, D. Lazard, and T. Mora. Efficient computation of zero-dimensional Gröbner bases by change of ordering. Journal of Symbolic Computation, 16(4):329--344, 1993.
[14]
J.-C. Faugère, F. Levy-dit Vehel, and L. Perret. Cryptanalysis of MinRank. In Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, page 296. Springer, 2008.
[15]
J.-C. Faugère, M. Safey El Din, and P.-J. Spaenlehauer. Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree (1, 1): Algorithms and complexity. arXiv:1001.4004v1 {cs.SC}, 2010.
[16]
H. Flenner, L. van Gastel, and W. Vogel. Joins and intersections. Springer, 1991.
[17]
R. Fröberg. An inequality for Hilbert series of graded algebras. Math. Scand., 56(2):117--144, 1985.
[18]
W. Fulton. Intersection theory. Springer, 1984.
[19]
A. Kipnis and A. Shamir. Cryptanalysis of the HFE public key cryptosystem by relinearization. In Advances in Cryptology - CRYPTO' 99, volume 1666 of LNCS, pages 19--30. Springer, 1999.
[20]
D. Lazard. Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations. In Computer Algebra, EUROCAL'83, volume 162 of LNCS, pages 146--156. Springer, 1983.
[21]
A.-V. Ourivski and T. Johansson. New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission, 38(3):237--246, 2002.

Cited By

View all
  • (2025)On the arithmetic complexity of computing Gröbner bases of comaximal determinantal idealsJournal of Algebra10.1016/j.jalgebra.2025.01.014Online publication date: Jan-2025
  • (2024)Solving systems of algebraic equations over finite commutative rings and applicationsApplicable Algebra in Engineering, Communication and Computing10.1007/s00200-024-00652-8Online publication date: 24-Apr-2024
  • (2024)MinRank Gabidulin Encryption Scheme on Matrix CodesAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0894-2_3(68-100)Online publication date: 13-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISSAC '10: Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
July 2010
366 pages
ISBN:9781450301503
DOI:10.1145/1837934
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Gesellschaft fur Informtatik

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 July 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Gröbner bases
  2. degree of regularity
  3. determinantal ideals
  4. generalized nonlinear eigenvalue problem
  5. multi-homogeneous ideals
  6. multivariate cryptography
  7. polynomial systems solving

Qualifiers

  • Research-article

Conference

ISSAC '10
Sponsor:

Acceptance Rates

ISSAC '10 Paper Acceptance Rate 45 of 110 submissions, 41%;
Overall Acceptance Rate 395 of 838 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)On the arithmetic complexity of computing Gröbner bases of comaximal determinantal idealsJournal of Algebra10.1016/j.jalgebra.2025.01.014Online publication date: Jan-2025
  • (2024)Solving systems of algebraic equations over finite commutative rings and applicationsApplicable Algebra in Engineering, Communication and Computing10.1007/s00200-024-00652-8Online publication date: 24-Apr-2024
  • (2024)MinRank Gabidulin Encryption Scheme on Matrix CodesAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0894-2_3(68-100)Online publication date: 13-Dec-2024
  • (2024)Practical and Theoretical Cryptanalysis of VOXPost-Quantum Cryptography10.1007/978-3-031-62746-0_9(186-208)Online publication date: 12-Jun-2024
  • (2023)A New Analysis of the Kipnis-Shamir Method Solving the MinRank ProblemIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2022CIP0014E106.A:3(203-211)Online publication date: 1-Mar-2023
  • (2023)A New Approach Based on Quadratic Forms to Attack the McEliece CryptosystemAdvances in Cryptology – ASIACRYPT 202310.1007/978-981-99-8730-6_1(3-38)Online publication date: 18-Dec-2023
  • (2023)MinRank in the HeadProgress in Cryptology - AFRICACRYPT 202310.1007/978-3-031-37679-5_1(3-27)Online publication date: 19-Jul-2023
  • (2022)Algebraic Relation of Three MinRank Algebraic ModelingsArithmetic of Finite Fields10.1007/978-3-031-22944-2_15(239-249)Online publication date: 29-Aug-2022
  • (2022)MR-DSS – Smaller MinRank-Based (Ring-)SignaturesPost-Quantum Cryptography10.1007/978-3-031-17234-2_8(144-169)Online publication date: 28-Sep-2022
  • (2022)Improvement of Algebraic Attacks for Solving Superdetermined MinRank InstancesPost-Quantum Cryptography10.1007/978-3-031-17234-2_6(107-123)Online publication date: 28-Sep-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media