Solving Systems of Polynomial Equations over GF(2) by a Parity-Counting Self-Reduction

Authors Andreas Björklund, Petteri Kaski, Ryan Williams



PDF
Thumbnail PDF

File

LIPIcs.ICALP.2019.26.pdf
  • Filesize: 442 kB
  • 13 pages

Document Identifiers

Author Details

Andreas Björklund
  • Department of Computer Science, Lund University, Sweden
Petteri Kaski
  • Department of Computer Science, Aalto University, Finland
Ryan Williams
  • Department of Electrical Engineering and Computer Science & CSAIL, MIT, Cambridge, MA, USA

Cite AsGet BibTex

Andreas Björklund, Petteri Kaski, and Ryan Williams. Solving Systems of Polynomial Equations over GF(2) by a Parity-Counting Self-Reduction. In 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019). Leibniz International Proceedings in Informatics (LIPIcs), Volume 132, pp. 26:1-26:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
https://doi.org/10.4230/LIPIcs.ICALP.2019.26

Abstract

We consider the problem of finding solutions to systems of polynomial equations over a finite field. Lokshtanov et al. [SODA'17] recently obtained the first worst-case algorithms that beat exhaustive search for this problem. In particular for degree-d equations modulo two in n variables, they gave an O^*(2^{(1-1/(5d))n}) time algorithm, and for the special case d=2 they gave an O^*(2^{0.876n}) time algorithm. We modify their approach in a way that improves these running times to O^*(2^{(1-1/(2.7d))n}) and O^*{2^{0.804n}), respectively. In particular, our latter bound - that holds for all systems of quadratic equations modulo 2 - comes close to the O^*(2^{0.792n}) expected time bound of an algorithm empirically found to hold for random equation systems in Bardet et al. [J. Complexity, 2013]. Our improvement involves three observations: 1) The Valiant-Vazirani lemma can be used to reduce the solution-finding problem to that of counting solutions modulo 2. 2) The monomials in the probabilistic polynomials used in this solution-counting modulo 2 have a special form that we exploit to obtain better bounds on their number than in Lokshtanov et al. [SODA'17]. 3) The problem of solution-counting modulo 2 can be "embedded" in a smaller instance of the original problem, which enables us to apply the algorithm as a subroutine to itself.

Subject Classification

ACM Subject Classification
  • Mathematics of computing → Combinatorial algorithms
Keywords
  • equation systems
  • polynomial method

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Magali Bardet, Jean-Charles Faugère, Bruno Salvy, and Pierre-Jean Spaenlehauer. On the complexity of solving quadratic Boolean systems. J. Complexity, 29(1):53-75, 2013. URL: http://dx.doi.org/10.1016/j.jco.2012.07.001.
  2. Andreas Björklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto, Jesper Nederlof, and Pekka Parviainen. Fast zeta transforms for lattices with few irreducibles. ACM Trans. Algorithms, 12(1):Art. 4, 19, 2016. Google Scholar
  3. Bruno Buchberger. Ein Algorithmus zum Auffinden der Basiselemente des Restklassenrings nach einem nulldimensionalen Polynomideal. PhD thesis, Department of Mathematics, University of Innsbruck, 1965. Google Scholar
  4. David A. Cox, John Little, and Donal O'Shea. Ideals, Varieties, and Algorithms. Undergraduate Texts in Mathematics. Springer, Cham, fourth edition, 2015. URL: http://dx.doi.org/10.1007/978-3-319-16721-3.
  5. Aviezri S. Fraenkel and Yaacov Yesha. Complexity of problems in games, graphs and algebraic equations. Discrete Applied Mathematics, 1(1-2):15-30, 1979. URL: http://dx.doi.org/10.1016/0166-218X(79)90012-X.
  6. Antoine Joux and Vanessa Vitse. A crossbred algorithm for solving Boolean polynomial systems. Cryptology ePrint Archive, Report 2017/372, 2017. URL: https://eprint.iacr.org/2017/372.
  7. Petteri Kaski, Jukka Kohonen, and Thomas Westerbäck. Fast Möbius inversion in semimodular lattices and ER-labelable posets. Electron. J. Combin., 23(3):Paper 3.26, 13, 2016. Google Scholar
  8. Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced Oil and Vinegar Signature Schemes. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, volume 1592 of Lecture Notes in Computer Science, pages 206-222. Springer, 1999. URL: http://dx.doi.org/10.1007/3-540-48910-X_15.
  9. Daniel Lokshtanov, Ramamohan Paturi, Suguru Tamaki, R. Ryan Williams, and Huacheng Yu. Beating Brute Force for Systems of Polynomial Equations over Finite Fields. In Philip N. Klein, editor, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 2190-2202. SIAM, 2017. URL: http://dx.doi.org/10.1137/1.9781611974782.143.
  10. Yuri V. Matiyasevich. Hilbert’s Tenth Problem. Foundations of Computing Series. MIT Press, Cambridge, MA, 1993. Google Scholar
  11. Ernst W. Mayr. Some complexity results for polynomial ideals. J. Complexity, 13(3):303-325, 1997. URL: http://dx.doi.org/10.1006/jcom.1997.0447.
  12. Michael Mitzenmacher and Eli Upfal. Probability and Computing. Cambridge University Press, Cambridge, second edition, 2017. Google Scholar
  13. Robin A. Moser and Dominik Scheder. A full derandomization of Schöning’s k-SAT algorithm. In Lance Fortnow and Salil P. Vadhan, editors, Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June 2011, pages 245-252. ACM, 2011. URL: http://dx.doi.org/10.1145/1993636.1993670.
  14. Ruben Niederhagen, Kai-Chun Ning, and Bo-Yin Yang. Implementing Joux-Vitse’s Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs. Cryptology ePrint Archive, Report 2017/1181, 2017. URL: https://eprint.iacr.org/2017/1181.
  15. Jacques Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In Ueli M. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, volume 1070 of Lecture Notes in Computer Science, pages 33-48. Springer, 1996. URL: http://dx.doi.org/10.1007/3-540-68339-9_4.
  16. A. A. Razborov. Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function. Mat. Zametki, 41(4):598-607, 623, 1987. Google Scholar
  17. Roman Smolensky. Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity. In Alfred V. Aho, editor, Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA, pages 77-82. ACM, 1987. URL: http://dx.doi.org/10.1145/28395.28404.
  18. Leslie G. Valiant and Vijay V. Vazirani. NP is as easy as detecting unique solutions. Theor. Comput. Sci., 47(3):85-93, 1986. URL: http://dx.doi.org/10.1016/0304-3975(86)90135-0.
  19. F. Yates. The Design and Analysis of Factorial Experiments. Imperial Bureau of Soil Science, Harpenden, 1937. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail