Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity
Abstract
:1. Introduction
2. Background
2.1. Ore Polynomial Rings
2.2. Euclidean Domain
3. Elimination
3.1. Dieudonné Determinant of Matrices with Skew Polynomial Entries
3.2. Deriving a Resultant Formula for Bivariate Skew Polynomials
Algorithm 1: Skew extended euclidean algorithm | |
Input: , where is a (skew) field | |
Output: , where d is a gcrd of f and g together with such that | |
1 | := f; := 1; := 0 |
2 | := g; := 0; := 1 |
3 | i := 2 |
4 | while repeat |
5 | := // rquo is the right quotient |
6 | := // rrem is the right remainder |
7 | := |
8 | := |
9 | i := |
10 | return () |
3.3. Uniqueness of the Resultant
3.3.1. Almost Commutative Rings
3.3.2. Hermite Form
- (i)
- It is an upper triangular matrix, serving as a normal form of the original matrix;
- (ii)
- The diagonal entries are monic; that is, the leading coefficient is 1 for each of them;
- (iii)
- The degrees of the off-diagonal entries are strictly less than the corresponding degree of the diagonal entry in the same column.
3.4. Operator Elimination
- (i)
- With a mix of differential and difference operators
- (ii)
- With only a difference operator
- (iii)
- With only a differential operator
4. Efficient Computing Through Evaluation and Interpolation
4.1. Skew Polynomial Evaluation
4.2. Efficiency Steps and Challenges Encountered
- (i)
- Evaluation: Choose distinct values (), and then compute the evaluation of f and g at with respect to . These become univariate polynomials in .
- (ii)
- Partial resultants: Obtain the partial resultants of these evaluated polynomials f and g (step i) with respect to .
- (iii)
- Interpolation: Combine these partial resultants using a suitable interpolation technique to recover the complete resultant of the original f and g.
- (i)
- Evaluation values: Since there are several evaluation maps to choose from, evaluating a polynomial using a specific evaluation map (in this case operator evaluation at and then applying it to a value a) may not be the actual evaluation value that is expected by the chosen interpolation method (such as a Lagrange or Newton interpolation technique). A suitable interpolation method should be used to match the chosen evaluation map.
- (ii)
- Validity of the evaluation map: The evaluation map needs to be a ring homomorphism to preserve the product.
- (iii)
- Distinct conjugacy classes: All chosen evaluation values must belong to pairwise distinct conjugacy classes for the evaluation and interpolation techniques to function correctly. We can achieve this by choosing primitive elements in which they inherently belong to different conjugacy classes.
- (iv)
- Unlucky evaluations: To avoid unlucky evaluations, where a chosen value eliminates the leading coefficient and alters the original polynomial’s degree, we need to identify and exclude such unconstructive values. This can be determined by examining the leading term status at the time of evaluation; if it is unlucky, then skip to the next value, and continue only if the evaluation is valid/lucky.
- (v)
- Insufficient evaluation values: In some cases, we may not have enough valid values for the evaluation stage. To address this, we can extend the domain by including additional valid values. Then, these new values can be utilised by the evaluation map as long as they belong to distinct conjugacy classes (as in Section 4.2).
4.3. Skew Polynomial Interpolation
4.3.1. Galois Theory (Finite and Infinite Field Extensions)
4.3.2. Normal Basis (Finite and Infinite Cases)
4.3.3. Cyclotomic Extension
4.3.4. Interpolation
4.4. Evaluation and Interpolation Technique
4.5. Examples
- 1.
- From the right side of the resultant formula (37) we compute the composition product (39)Then, we apply it to (45):We call this result the evaluated resultant polynomial (denoted by ), which in this case is
- 2.
- We select evaluation values from the following normal basis that starts with the normal element :
- 3.
- To perform our actual evaluations, we need a bound on the number of evaluations required to recover the original resultant, which is the sum of the degrees of plus one (that is 6). Therefore, we compute (46) at the first six values in the normal basis as
- 4.
- Let V be a vector whose entries are given by the actual evaluation of the evaluated resultant polynomial (46) at the corresponding values , as mentioned in the previous step. For example, the first evaluation
- 5.
- For the left side of the resultant Formula (37), let us assume that the original resultant R is in the generic form as in (38)
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Burger, R.; Heinle, A. A New Primitive for a Diffie–Hellman-like Key Exchange Protocol Based on Multivariate Ore Polynomials. arXiv 2014, arXiv:1407.1270. [Google Scholar] [CrossRef]
- Ore, O. Theory of Non-Commutative Polynomials. Ann. Math. 1933, 34, 480–508. [Google Scholar] [CrossRef]
- Chyzak, F.; Salvy, B. Non-commutative elimination in Ore algebras proves multivariate identities. J. Symb. Comput. 1998, 26, 187–227. [Google Scholar] [CrossRef]
- Collins, G.E. Subresultant and reduced polynomial remainder sequences. ACM Commun. Comput. Algebra 1967, 14, 128–142. [Google Scholar] [CrossRef]
- Li, Z. A subresultant theory for Ore polynomials with applications. In Proceedings of the ISSAC ’98, Rostock, Germany, 13–15 August 1998. [Google Scholar]
- Erić, A.L. The resultant of non-commutative polynomials. Mat. Vesn. 2008, 60, 3–8. [Google Scholar]
- Rasheed, R. Modular Methods for Solving Nonlinear Polynomial Systems. Master’s Thesis, University of Western Ontario, London, ON, Canada, 2007. [Google Scholar]
- Caruso, X.; Borgne, J. Fast Multiplication for Skew Polynomials. In Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, Kaiserslautern, Germany, 25–28 July 2017; pp. 77–84. [Google Scholar] [CrossRef]
- Giesbrecht, M.; Huang, Q.; Schost, E. Sparse Multiplication for Skew Polynomials. In Proceedings of the 45th International Symposium on Symbolic and Algebraic Computation, Kalamata, Greece, 20–23 July 2020; pp. 194–201. [Google Scholar] [CrossRef]
- Rasheed, R. Resultant-based Elimination for Skew Polynomials. In Proceedings of the 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, Romania, 7–10 December 2021; pp. 11–18. [Google Scholar] [CrossRef]
- Mora, T. Solving Polynomial Equation Systems: Encyclopedia of Mathematics and Its Applications; Cambridge University Press: Cambridge, UK, 2003; Volume 4. [Google Scholar]
- Bueso, J.L.; Gómez-Torrecillas, J.; Verschoren, A. Mathematical Modelling: Theory and Applications. In Algorithmic Methods in Non-Commutative Algebra: Applications to Quantum Groups; Springer: Dordrecht, The Netherlands, 2003. [Google Scholar]
- Carpentier, S.; Mikhailov, A.; Wang, J. Rational recursion operators for integrable differential-difference equations. Commun. Math. Phys. 2019, 370, 807–851. [Google Scholar] [CrossRef] [PubMed]
- Draxl, P. Eine Liftung der Dieudonné-Determinante und Anwendungen die Multiplikative Gruppe eines Schiefkörpers Betreffend; Lecture Notes in Mathematics; Springer: Berlin/Heidelberg, Germany, 1980; Volume 778, pp. 101–116. [Google Scholar] [CrossRef]
- Cohn, P.M. Free Ideal Rings and Localization in General Rings; University Press: Cambridge, UK, 2006. [Google Scholar] [CrossRef]
- Taelman, L. Dieudonné determinants for skew polynomial rings. J. Algebra Its Appl. 2006, 5, 89–93. [Google Scholar] [CrossRef]
- McConnell, J.C.; Robson, J.C. Noncommutative Noetherian Rings, revised ed.; Graduate Studies in Mathematics, 30; American Mathematical Society: Providence, RI, USA, 2001. [Google Scholar]
- Khalkhali, M. Basic Noncommutative Geometry; European Mathematical Society: Zürich, Switzerland, 2013. [Google Scholar]
- Giesbrecht, M.; Kim, M.S. Computing the Hermite form of a matrix of Ore polynomials. J. Algebra 2013, 376, 341–362. [Google Scholar] [CrossRef]
- Bell, W. Special Functions for Scientists and Engineers; Dover Books on Mathematics; Dover Publications: Mineola, NY, USA, 2004. [Google Scholar]
- Basu, S.; Pollack, R.; Roy, M.F.; Cohen, A.M.; Cohen, H.; Eisenbud, D.; Singer, M.F.; Sturmfels, B. Algorithms in Real Algebraic Geometry; Algorithms and Computation in Mathematics; Springer: Berlin/Heidelberg, Germany, 2006; Volume 10. [Google Scholar] [CrossRef]
- Mishra, B. Algorithmic Algebra; Springer: New York, NY, USA, 1993. [Google Scholar] [CrossRef]
- Cox, D.; Little, J.; O’Shea, D. Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra; Undergraduate Texts in Mathematics; Springer International Publishing: Cham, Switzerland, 2015. [Google Scholar]
- Cohn, P.M. Free Rings and Their Relations, 2nd ed.; London Mathematical Society Monographs 19; Academic Press: London, UK, 1985. [Google Scholar]
- Boucher, D.; Ulmer, F. Linear codes using skew polynomials with automorphisms and derivations. Des. Codes Cryptogr. 2013, 70, 405–431. [Google Scholar] [CrossRef]
- Lam, T.; Leroy, A. Vandermonde and Wronskian matrices over division rings. J. Algebra 1988, 119, 308–336. [Google Scholar] [CrossRef]
- Conrad, K. Infinite Galois Theory (Draf, CTNT 2020); Technical Report; UCONN: Storrs, CT, USA, 2020. [Google Scholar]
- Stewart, I. Algebraic Number Theory and Fermat’s Last Theorem, 4th ed.; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
- Hachenberger, D. Finite Fields: Normal Bases and Completely Free Elements; The Springer International Series in Engineering and Computer Science; Springer US: New York, NY, USA, 2012. [Google Scholar]
- Lenstra, H. A normal basis theorem for infinite Galois extensions. Indag. Math. (Proc.) 1985, 88, 221–228. [Google Scholar] [CrossRef]
- Hachenberger, D. Universal normal bases for the abelian closure of the field of rational numbers. Acta Arith. 2000, 93, 329–341. [Google Scholar] [CrossRef]
Operator | Commutation Rule of | |||
---|---|---|---|---|
Differential | ||||
Difference | ||||
Shift | 0 | |||
Eulerian | ||||
q-differential | ||||
q-difference | ||||
q-shift | 0 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rasheed, R.; Sadiq, A.S.; Kaiwartya, O. Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity. Mathematics 2024, 12, 3258. https://doi.org/10.3390/math12203258
Rasheed R, Sadiq AS, Kaiwartya O. Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity. Mathematics. 2024; 12(20):3258. https://doi.org/10.3390/math12203258
Chicago/Turabian StyleRasheed, Raqeeb, Ali Safaa Sadiq, and Omprakash Kaiwartya. 2024. "Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity" Mathematics 12, no. 20: 3258. https://doi.org/10.3390/math12203258
APA StyleRasheed, R., Sadiq, A. S., & Kaiwartya, O. (2024). Elimination Algorithms for Skew Polynomials with Applications in Cybersecurity. Mathematics, 12(20), 3258. https://doi.org/10.3390/math12203258