Next Article in Journal
Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference
Previous Article in Journal
Attacking Windows Hello for Business: Is It What We Were Promised?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC

1
Cybersecurity Research Institute, National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei City 184-8795, Japan
2
Graduate School of Engineering Science, Akita University, Tegatagakuen-machi, Akita City 010-8502, Japan
3
Graduate School of Science, Tokyo Metropolitan University, Minami-Osawa, Hachioji City 192-0397, Japan
*
Author to whom correspondence should be addressed.
Cryptography 2023, 7(1), 10; https://doi.org/10.3390/cryptography7010010
Submission received: 1 December 2022 / Revised: 11 February 2023 / Accepted: 22 February 2023 / Published: 27 February 2023

Abstract

:
Multivariate public-key cryptosystems are potential candidates for post-quantum cryptography. The security of multivariate public-key cryptosystems relies on the hardness of solving a system of multivariate quadratic polynomial equations. Faugère’s F4 algorithm is one of the solution techniques based on the theory of Gröbner bases and selects critical pairs to compose the Macaulay matrix. Reducing the matrix size is essential. Previous research has not fully examined how many critical pairs it takes to reduce to zero when echelonizing the Macaulay matrix in rows. Ito et al. (2021) proposed a new critical-pair selection strategy for solving multivariate quadratic problems associated with encryption schemes. Instead, this paper extends their selection strategy for solving the problems associated with digital signature schemes. Using the OpenF4 library, we compare the software performance between the integrated F4-style algorithm of the proposed methods and the original F4-style algorithm. Our experimental results demonstrate that the proposed methods can reduce the processing time of the F4-style algorithm by up to a factor of about seven under certain specific parameters. Moreover, we compute the minimum number of critical pairs to reduce to zero and propose their extrapolation outside our experimental scope for further research.

1. Introduction

Shor demonstrated that solving both the integer factorization problem (IFP) and the discrete logarithm problem (DLP) is theoretically tractable in polynomial time [1]. Both Rivest–Shamir–Adleman (RSA) public-key cryptography and elliptic curve cryptography (ECC) are widely used, and their security depends on the IFP and DLP, respectively. In recent years, research and development of quantum computers have progressed rapidly. For example, noisy intermediate-scale quantum computers are already in practical use. Since system migration takes time in general, preparation for migration to PQC is a significant issue. Research, development, and standardization projects for post-quantum cryptography (PQC) are ongoing within these contexts. The PQC standardization process was started by the National Institute of Standards and Technology (NIST) in 2016 [2]. Several cryptosystems have been proposed for the NIST PQC project, including lattice-based, code-based, and hash-based cryptosystems. The multivariate public-key cryptosystem (MPKC) is one of the cryptosystems proposed for the NIST PQC project. At the end of the third round, NIST selected four candidates to be standardized, as shown in Table 1, and moved four candidates to the fourth-round evaluation, as shown in Table 2. Moreover, NIST issued a request for proposals of digital signature schemes with short signatures and fast verification [3]. MPKCs are often more efficient than other public-key cryptosystems, primarily digital signature schemes, as described in the subsequent paragraph; therefore, researching the security of MPKCs is still important.
An MPKC is basically an asymmetric cryptosystem that has a trapdoor one-way multivariate (quadratic) polynomial map F over a finite field F q . Let F : F q n F q m a (quadratic) polynomial map whose inverse can be computed easily, and two randomly selected invertible affine linear maps S : F q n F q n and T : F q m F q m . The secret key consists of F , S , and T . The public key consists of the composite map P : F q n F q m such that P = T F S . The public key can be regarded as a set P of m (quadratic) polynomials in n variables:
P = p 1 x 1 , , x n , , p m x 1 , , x n : F q n F q m ,
where each p i is a non-linear (quadratic) polynomial.
Multivariate quadratic (MQ) problem: Find a solution x = x 1 , , x n F q n such that the system of (quadratic) polynomial equations: p 1 x = = p m x = 0 .
Then, the MQ problem is closely related to the attack that forges signatures for the MPKC.
Isomorphism of polynomials (IP) problem: Let A and B be two polynomial maps from F q n to F q m . Find two invertible affine linear maps S : F q n F q n and T : F q m F q m such that B = T A S .
Then, the IP problem is closely related to the attack for finding secret keys for the MPKC.
One of the most well-known public-key cryptosystems based on multivariate polynomials over a finite field was proposed by Matsumoto and Imai [12]. Patarin [13] later demonstrated that the Matsumoto–Imai cryptosystem is insecure, proposed the hidden field equation (HFE) public-key cryptosystem by repairing their cryptosystems [14] and designed the Oil and Vinegar (OV) scheme [15]. There are several variations of the HFE and OV schemes, e.g., Kipnis et al. proposed the unbalanced OV (UOV) scheme [16] as described in Section 2.5.
Several MPKCs were proposed for the NIST PQC project [17], e.g., GeMSS [18], LUOV [19], MQDSS [20], and Rainbow [21] MPKCs. Ding et al. found a forgery attack on LUOV [22], and Kales and Zaverucha found a forgery attack on MQDSS [23]. At the end of the second round, NIST selected Rainbow as a third-round finalist and moved GeMSS to an alternate candidate [24].
MinRank problem: Let r be a positive integer and k matrices M 1 , , M k F q m × n . Find x 1 , , x k F q such that x 1 , , x k 0 and
Rank i = 1 k x i M i r .
The MinRank problem can be reduced to the MQ problem [25,26,27]. By solving the MinRank problem, Tao et al. found a key recovery attack on GeMSS [28], and Beullens found a key recovery attack on Rainbow [29,30].
NIST reported that a third-round finalist of the digital signature scheme, Rainbow, had the property that its signing and verification were efficient, and the signature size was very short [31]. Beullens et al. also demonstrated that the (U)OV scheme performed comparably to the algorithms selected by NIST [32].
As noted above, the security of an MPKC is highly dependent on the hardness of the MQ problem because multivariate polynomial equations are transformed into MQ polynomial equations by increasing the number of variables and equations. To break a cryptosystem, we translate its underlying algebraic structure into a system of multivariate polynomial equations. There are three well-known algebraic approaches to solving the MQ problem: the extended linearization (XL) algorithm proposed by Courtois et al. [33] and the F4 and F5 algorithms proposed by Faugère [34,35]. The XL algorithm is described in Section 2.2. Gröbner bases algorithm is described in Section 2.3 and Section 3.1 and the F4 algorithm is described in Section 3.2.
In addition to the theoretical evaluations of the computational complexity, practical evaluations are also crucial in the research of cryptography, e.g., such as many efforts addressing the RSA [36], ECC [37], and Lattice challenges [38]. The Fukuoka MQ challenge project [39,40] was started in 2015 to evaluate the security of the MQ problem. In this project, the MQ problems were classified into encryption and digital signature schemes. Each scheme was then classified into three categories according to the number of quadratic equations (m), the number of variables (n), and the characteristic of the finite field. The encryption schemes were classified into types I to III, which correspond to the condition where m = 2 n over F 2 , F 256 , and F 31 , respectively. The digital-signature schemes were classified into types IV to VI, which correspond to the condition where n 1.5 m over F 2 , F 256 , and F 31 , respectively. Up to the time of writing this paper, all the best records in the Fukuoka MQ challenge, except type IV, have been set by variant algorithms of both the XL and F4 algorithms. For example, the authors improved the F4-style algorithm and set new records of both type II and III, as described below, but a variant of the XL algorithm later surpassed the record of type III.
The F4 algorithm proposed by Faugère is an improvement of Buchberger’s algorithm for computing Gröbner bases [41,42], as described in Section 3.2. In Buchberger’s algorithm, it is fundamental to compute the S-polynomial of two polynomials, as described in Section 3.1. The critical pair is defined by a set of data (two polynomials, the least common multiple ( LCM ) of their leading terms, and two associated monomials required to compute the S-polynomial, as described in Section 2.3. The F4 algorithm computes many S-polynomials simultaneously using Gaussian elimination. A variant of the F4 algorithm involving these matrix operations is referred to as an F4-style algorithm in this paper. There are several variants of the F4-style algorithm. For example, Joux and Vitse [43] designed an efficient variant algorithm to compute Gröbner bases for similar polynomial systems. Additionally, Makarim and Stevens [44] proposed a variant M4GB algorithm that could reduce the leading and lower terms of a polynomial. Using the M4GB algorithm, they set the best record for the Fukuoka MQ challenge of type VI with up to 20 equations ( m = 20 ), at the time of writing this paper.
Recently, Ito et al. [45] also proposed a variant algorithm that could solve the Fukuoka MQ challenge for both types II and III, with up to 37 equations ( m = 37 ), and set the best record of type II at the time of writing. In their paper, the following selection strategy for critical pairs was proposed: (a) a set of critical pairs is partitioned into smaller subsets C 1 , , C k such that | C i | = 256 ( 1 i k 1 ) ; (b) Gaussian elimination is performed for an associated Macaulay matrix composed of each subset; and (c) the remaining subsets are omitted if some S-polynomials are reduced to zero. Herein, we refer to the subdividing method as (a) and the removal method as (c). Their strategy was then validated only under the following two situations: systems of MQ polynomial equations associated with encryption schemes, i.e., the m = 2 n case and the | C i | = 256 case. Thus, in this paper, we propose several types of partitions related to the subdividing method and focus on their validity for solving systems of MQ polynomial equations associated with digital-signature schemes, i.e., the n > m case. We evaluate the performance of the proposed methods for the m = n + 1 case only because we focus on evaluating the performance of the proposed methods. In other words, before executing the F4-style algorithm combined with the proposed methods, we assume that random values or specific values have already been substituted for some n m + 1 variables in the system, according to the hybrid approach [46].
Our contribution. In general, the size of a matrix affects the computational complexity of Gaussian elimination. Reducing the number of critical pairs is essential because they determine the size of the Macauley matrix. First, we propose three basic subdividing methods SD1, SD2, and SD3, which have different types of partitions for a set of critical pairs. Then, we integrate both the proposed subdividing methods and the removal method into the OpenF4 library [47] and compare their software performance with that of the original library using similar settings to those of types V and VI of the Fukuoka MQ challenge, i.e., ( n , m ) = ( 9 , 10 ) , , ( 15 , 16 ) over F 256 and ( n , m ) = ( 9 , 10 ) , , ( 16 , 17 ) over F 31 . To validate the removal method, we then verify that neither a temporary base nor critical pair of a higher degree arises from unused critical pairs in omitted subsets. Here, D max denotes the highest degree of critical pairs appearing in the Gröbner bases computation or the F4-style algorithm. The process by which the degree of a critical pair reaches D max for the first time is referred to as the first half, and the remaining process is referred to as the second half. Then, our experiments show that a combination of two different basic methods (i.e., SD3 followed by SD1) is faster than all other methods because of the difference between the first and second halves of the computation. Finally, our experiments show that the number of critical pairs that generate a reduction to zero for the first time is approximately constant under the condition where m = n + 1 in the sense that a similar number is obtained with a high probability. We also propose two derived subdividing methods (SD4 and SD5) for the first half. The experimental results show that SD4 followed by SD1 is the fastest method and SD5 is as fast as SD4, as long as n < 16 over F 256 and n < 17 over F 31 hold. Moreover, we propose an extrapolation outside the scope of the experiments for further research. Our findings make a unique contribution toward improving the security evaluation of MPKC.
Organization. The remainder of this paper is organized as follows. First, we introduce basic notations and preliminaries in Section 2. Next, we present background to Gröbner bases computation in Section 3. Then, we describe the proposed method in Section 3.4. Afterward, we present the performance result of the proposed method in Section 4. Finally, the paper is concluded in Section 5.

2. Preliminaries

In the following, we define the notations and terminology used in this paper.

2.1. Notations

Let N be the set of all natural numbers, Z the set of all integers, Z 0 the set of all non-negative integers, and F q a finite field with q elements. R denotes a polynomial ring of n variables over F q , i.e., R = F q [ x 1 , , x n ] = F q [ x ] .
A monomial x a is defined by a product x 1 a 1 x n a n , where the a = ( a 1 , , a n ) is an element of Z 0 n . Furthermore, M denotes the set of all monomials in R , i.e., M = { x 1 a 1 x n a n a 1 , , a n Z 0 } . For c F q and u M , we call the product c u a term and c the coefficient of u. T denotes the set of all terms, i.e., T = { c u c F q , u M } . For a polynomial, f = i c i u i R for c i F q \ { 0 } and u i M , T ( f ) denotes the set { c i u i } , and M ( f ) denotes the set { u i } .
The total degree of x a is defined by the sum a 1 + + a n , which is denoted by deg ( x a ) . The total degree of f is defined by max { deg ( u ) u M ( f ) } and is denoted by deg ( f ) .
Definition 1.
A total order ≺ on M is called a monomial order if the following conditions hold:
(i)
s, t, u M , ts u t u s ,
(ii)
t M , 1 ⪯ t.
Here, if s t or s = t holds, then we denote s t .
Definition 2.
The degree reverse lexicographical order ≺ is defined by
x 1 a 1 x n a n x 1 b 1 x n b n a 1 + + a n < b 1 + + b n o r a 1 + + a n = b 1 + + b n and k s . t . a k > b k and l ( l > k ) s . t . a l = b l .
For example, in R [ x 1 , x 2 , x 3 ] ,
1 x 3 x 2 x 1 x 3 2 x 2 x 3 x 1 x 3 x 2 2 x 1 x 2 x 1 2 x 3 3 .
The degree reverse lexicographical order ≺ is fixed throughout this paper as a monomial order.
For a polynomial f R , LM ( f ) denotes the leading monomial of f, i.e., LM ( f ) = max M ( f ) , and LT ( f ) denotes the leading term of f, i.e., LT ( f ) = max T ( f ) . In addition, LC ( f ) denotes the corresponding coefficient for LT ( f ) . A polynomial f is called monic if LC ( f ) = 1 .
For a subset F R , LM ( F ) denotes the set of leading monomials of polynomials f F , i.e., LM ( F ) = { LM ( f ) f F } .
For two monomials x a = x 1 a 1 x n a n and x b = x 1 b 1 x n b n where a = ( a 1 , , a n ) and b = ( b 1 , , b n ) Z 0 n , their corresponding least common multiple (LCM) and the greatest common divisor (GCD) are defined as LCM ( x a , x b ) = x c where c = ( max ( a 1 , b 1 ) , , max ( a n , b n ) ) , and GCD ( x a , x b ) = x c where c = ( min ( a 1 , b 1 ) , , min ( a n , b n ) ) .
For two subsets A and B, A B is defined if a b holds for a A and b B .

2.2. The XL Algorithm

Let D be the parameter of the XL algorithm. Let { p 1 , , p m } be a set of polynomials over a finite field F q . The XL algorithm executes the following steps:
  • Multiply: Generate all the products ( j = 1 k x i j ) p i with k D deg ( p i ) .
  • Multiply: Consider each monomial in x i of degree D as a new variable and perform Gaussian elimination on the linear equation obtained in step 1. The ordering on the monomials must be such that all the terms containing one variables (say x 1 ) are eliminated last.
  • Solve: Assume that step 2 yields at least one univariate equation in the power of x 1 . Solve this equation over F q .
  • Repeat: Simplify the equations and repeat the process to find the values of the other variables.
Step 1 is regarded as the construction of the Macaulay matrix with the ordering specified in step 2, as described in Section 3.2. It is difficult to estimate the parameter D in advance. The computational complexity of the XL algorithm is roughly
O n + D D ω ,
where n is the number of variables and 2 < ω 3 is the linear algebra constant [48].

2.3. Gröbner Bases

The concept of Gröbner bases was introduced by Buchberger [49] in 1979. Computing Gröbner bases is a standard tool for solving simultaneous equations. This section presents the definitions and notations used in Gröbner bases. Methods to compute Gröbner bases are explained in Section 3.
Here, G denotes an ideal generated by a subset G R . G I is called a basis of an ideal I if I = G holds. We refer to G as Gröbner bases of I if for all f I there exists g G such that LM ( g ) | LM ( f ) . To compute Gröbner bases, we need to compute polynomials called S-polynomials.
Here, let f R and G R . It is said that f is reducible by G if there exist u M ( f ) and g G such that LM ( g ) | u . Thus, we can eliminate c u from f by computing f c u LT ( g ) g , where c is the coefficient of u in f. In this case, g is said to be a reductor of u. If f is not reducible by G, then f is said to be a normal form of G. Repeatedly reducing f using a polynomial of G to obtain a normal form is referred to as normalization, and the function normalizing f using G is represented by NF ( f , G ) .
For example, let f = x 1 x 2 + x 3 , g 1 = x 1 x 3 , g 2 = x 2 x 3 + 1 F q [ x 1 , x 2 , x 3 ] and G = { g 1 , g 2 } . First, the term x 1 x 2 in f is divisible by LM ( g 1 ) = x 1 and f x 2 g 1 = f 1 is obtained. Next, the term x 2 x 3 in f 1 is divisible by LM ( g 2 ) = x 2 x 3 and f 1 g 2 = x 3 1 = f 2 is obtained. Finally, f 2 is the normal form of f by G since f 2 is not reducible by G.
A critical pair of two polynomials ( g 1 , g 2 ) is defined by the tuple ( LCM ( LCM ( g 1 ) , LCM ( g 2 ) ) , t 1 , g 1 , t 2 , g 2 ) R × M × R × M × R such that
LM ( t 1 g 1 ) = LM ( t 2 g 2 ) = LCM ( LM ( g 1 ) , LM ( g 2 ) ) .
For example, let h 1 = x 1 x 2 + x 3 , h 2 = x 2 x 3 + 1 F q [ x 1 , x 2 , x 3 ] . LM ( h 1 ) = x 1 x 2 and LM ( h 2 ) = x 2 x 3 . We have LCM ( LM ( h 1 ) , LM ( h 2 ) ) = x 1 x 2 x 3 . Then, t 1 = x 3 and t 2 = x 1 .
For a critical pair p of ( g 1 , g 2 ) , GCD ( p ) , LCM ( p ) , and deg ( p ) denote GCD ( p ) = GCD ( LM ( g 1 ) , LM ( g 2 ) ) , LCM ( p ) = LCM ( LM ( g 1 ) , LM ( g 2 ) ) , and deg ( p ) = deg ( LCM ( p ) ) , respectively.
The S-polynomial, Spoly ( p ) (or Spoly ( g 1 , g 2 ) ), of a critical pair p of ( g 1 , g 2 ) is defined as follows:
Spoly ( p ) = Spoly ( g 1 , g 2 ) = v 1 g 1 v 2 g 2 , v 1 = LCM ( p ) LT ( g 1 ) , v 2 = LCM ( p ) LT ( g 2 ) .
Left ( p ) and Right ( p ) denote Left ( p ) = v 1 g 1 and  Right ( p ) = v 2 g 2 , respectively.

2.4. MQ Problem

Let F be a subset { f 1 , , f m } R , and let f j F be a quadratic polynomial (i.e., deg ( f j ) = 2 ). The MQ problem is to compute a common zero ( x 1 , , x n ) F q n for a system of quadratic polynomial equations defined by F, i.e.,
f j ( x 1 , , x n ) = 0 for all j = 1 , , m .
The MQ problem is discussed frequently in terms of MPKCs because representative MPKCs, e.g., UOV, Rainbow, and GeMSS, use quadratic polynomials. These schemes are signature schemes and employ a system of MQ polynomial equations under the condition where n > m .
The computation of Gröbner bases is a fundamental tool for solving the MQ problem. If n < m , the system of F tends to have no solution or exactly one solution. If the system of F has no solution, 1 can be obtained as a Gröbner basis of F . If it has a solution, α = ( α 1 , , α n ) F q n , x 1 α 1 , , x n α n can be obtained as Gröbner bases of F . Thus, it is easy to obtain the solution of the system of F from the Gröbner bases of F .
If n > m , it is generally necessary to compute Gröbner bases concerning lexicographic order using a Gröbner -basis conversion algorithm, e.g., FGLM [50]. Another method is to convert the system associated with F to a system of multivariate polynomial equations by substituting random values for some variables and then computing its Gröbner bases. The process is repeated with other random values if there is no solution. This method is called the hybrid approach and typically substitutes random values for n m + 1 variables. Hence, it is important to solve the MQ problem with m = n + 1 .

2.5. The (Unbalanced) Oil and Vinegar Signature Scheme

Let K = F q be a finite field. Let o, v N , m = o , and n = o + v . For a message y = ( y 1 , , y m ) K m to be signed, we define a signature x = ( x 1 , , x n ) K n of y as follows.

2.5.1. Key Generation

The secret key consists of two parts:
  • a bijective affine transformation s : K n K n (coefficients in K),
  • m equations:
    i , 1 i m , y i = j , k γ i j k a j a k + j , k λ i j k a j a k + j ξ i j a j + j ξ i j a j + δ i
    where γ i j k , λ i j k , ξ i j , ξ i j , and δ i are secret coefficients in K.
The public key is the following m quadratic equations:
(i)
Let A = ( a 1 , , a o , a 1 , , a v ) K n .
(ii)
Compute x = s 1 ( A ) .
(iii)
We have m quadratic equations in n variables:
i , 1 i m , y i = P i ( x 1 , , x n ) .

2.5.2. Signature Generation

(i)
We generate a 1 , , a o , a 1 , , a v K such that (1) holds.
(ii)
Compute x = s 1 ( A ) where A = ( a 1 , , a o , a 1 , , a v ) .

2.5.3. Signature Verification

If (2) is satisfied, then we find a signature x of y valid.
If (2) is solved, then we find another solution x = ( x 1 , , x n ) . Thus, we can find another signature x of y. Therefore, the difficulty of forging signatures can be related to the difficulty of the MQ problem.

3. Materials and Methods

In this section, we introduce three algorithms to compute Gröbner bases: the Buchberger-style algorithm, the F 4 algorithm proposed by Faugère, and the F 4 -style algorithm proposed by Ito et al., which is the primary focus of this paper.

3.1. Buchberger-Style Algorithm

In 1979, Buchberger introduced the concept of Gröbner bases and proposed an algorithm to compute them. He found that Gröbner bases can be computed by repeatedly generating S-polynomials and reducing them. Algorithm 1 describes the Buchberger-style algorithm to compute Gröbner bases. First, we generate a polynomial set G and a set of critical pairs P from the input polynomials F. We then repeat the following steps until P is empty: one critical pair p from P is selected, an S-polynomial s is generated, s is reduced to the polynomial h by G, and G and P are updated from ( G , P , h ) if h is a nonzero polynomial. The Update function (Algorithm 2) is frequently used to update G and P, omitting some redundant critical pairs [51]. If a polynomial h is reduced to zero, then G and P are not updated; thus, the critical pair that generates an S-polynomial to be reduced to zero is redundant. Here, the critical pair selection method that selects the pair with the lowest LCM (referred to as the normal strategy) is frequently employed. If the degree reverse lexicographic order is used as a monomial order, then the critical pair with the lowest degree is naturally selected under the normal strategy.
Algorithm 1 Buchberger-style algorithm
Input: F = { f 1 , , f m } R .
Output: A Gröbner bases of F .
1:
( G , P ) ( , ) , i 0
2:
for f F do
3:
     ( G , P ) Update ( G , P , f )
4:
end for
5:
while P do
6:
     i i + 1
7:
     p i an element of P
8:
     P P \ { p i }
9:
     s i Spoly ( p i )
10:
     h i NF ( s i , G )
11:
    if  h i 0  then
12:
         ( G , P ) Update ( G , P , h i )
13:
    end if
14:
end while
15:
returnG
Algorithm 2 Update
Input: G R , P is a set of critical pairs, and h R .
Output: G new and P new .
1:
h h LC ( h )
2:
C { ( h , g ) g G } , D
3:
while C do
4:
     p an element of C, C C \ { p }
5:
    if  GCD ( p ) = 1 or p C D , LCM ( p ) LCM ( p )  then
6:
         D D { p }
7:
    end if
8:
end while
9:
P new { p D GCD ( p ) 1 }
10:
for p = ( g 1 , g 2 ) P do
11:
    if  LM ( h ) LCM ( p ) or
12:
    LCM ( LM ( h ) , LM ( g 1 ) ) = LCM ( p ) or
13:
    LCM ( LM ( h ) , LM ( g 2 ) ) = LCM ( p )  then
14:
         P new P new { p }
15:
    end if
16:
end for
17:
G new { g G LM ( h ) LM ( g ) } { h }
18:
return ( G new , P new )

3.2. F 4 -Style Algorithm

The F4 algorithm, which is a representative algorithm for computing Gröbner bases, was proposed by Faugère in 1999, and it reduces S-polynomials simultaneously. Herein, we present an F4-style algorithm with this feature.
Here, let G be a subset of R . A matrix in which the coefficients of polynomials in G are represented as corresponding to their monomials is referred to as a Macaulay matrix of G. G is said to be a row echelon form if LC ( g 1 ) = 1 and LM ( g 1 ) LM ( g 2 ) for all g 1 g 2 G . The F4-style algorithm reduces polynomials by computing row echelon forms of Macaulay matrices. For example, let f = x 1 x 2 + x 3 , g 1 = x 1 z 3 , g 2 = x 2 x 3 + 1 F q [ x 1 , x 2 , x 3 ] as in the fourth paragraph of Section 2.3. We use x 2 g 1 and g 2 to compute NF ( f , { g 1 , g 2 } ) = x 3 1 . The Macaulay matrix M of { f , g 1 , g 2 } is given as follows:
x 1 x 2   x 2 x 3    x 3    1 f x 2 g 1 g 2 1 0 1 0 1 1 0 0 0 1 0 1 = M .
In addition, a row echelon form M ˜ of M is given as follows:
M ˜ = 1 0 0 1 0 1 0 1 0 0 1 1 .
We can obtain x 3 1 from M ˜ .
The F4-style algorithm is described in Algorithm 3. The main process is described in lines 5 to 14, where some critical pairs are selected using the Select function (Algorithm 4), and the polynomials of the pairs are reduced using the Reduction function (Algorithm 5). The Select function selects critical pairs with the lowest degree on the basis of the normal strategy. In particular, the F4-style algorithm selects all critical pairs with the lowest degree. It takes the subset P d of P and integer d so that d = min { deg ( LCM ( p ) ) p P } and P d = { p P deg ( p ) = d } . The Reduction function collects reductors to reduce the polynomials and computes the row echelon form of the polynomial set. In addition, the Simplify function (Algorithm 6) determines the reductor with the lowest degree from the polynomial set obtained during the computation of the Gröbner bases.
Algorithm 3 F4-style algorithm
Input: F = { f 1 , , f m } R .
Output: A Gröbner basis of F .
1:
( G , P ) ( , ) , i 0
2:
for f F do
3:
     ( G , P ) Update ( G , P , f )
4:
end for
5:
while P do
6:
     i i + 1
7:
     P d , d Select ( P )
8:
     P P \ P d
9:
     L { Left ( p ) p P d } { Right ( p ) p P d }
10:
     ( H i ˜ + , H i ) Reduction ( L , G , ( H j ) j = 1 , , i 1 )
11:
    for  h H i ˜ +  do
12:
         ( G , P ) Update ( G , P , h )
13:
    end for
14:
end while
15:
returnG
Algorithm 4 Select
Input: P R × R .
Output:: P d P and d N .
1:
d = min { deg ( LCM ( p ) ) p P }
2:
P d = { p P deg ( p ) = d }
3:
return ( P d , d )
Algorithm 5 Reduction
Input: L M × R , G R , and H = ( H j ) j = 1 , , i 1 , where H j R .
Output: H ˜ + and H R .
1:
L { Simplify ( t , f , H ) ( t , f ) L }
2:
H { t f ( t , f ) L }
3:
Done = LM ( H )
4:
while Done M ( H )  do
5:
     u an element of M ( H ) \ Done
6:
    Done ← Done { u }
7:
    if  g 1 G s.t. LM ( g 1 ) divides u then
8:
         u 1 u LM ( g 1 )
9:
         ( u 2 , g 2 ) Simplify ( u 1 , g 1 , H )
10:
         H H { u 2 g 2 }
11:
    end if
12:
end while
13:
H ˜ row echelon form of H
14:
H ˜ + { h H ˜ LM ( h ) LM ( H ) }
15:
return ( H ˜ + , H )
Algorithm 6 Simplify
Input: u M , f R , and H = ( H j ) j = 1 , , i 1 , where H j R .
Output: ( u new , f new ) M × R .
1:
for t list of divisors of u do
2:
    if  j s.t. t f H j  then
3:
         H j ˜ row echelon form of H j
4:
         h an element of H j ˜ s.t. LM ( h ) = LM ( t f )
5:
        if  u t  then
6:
return Simplify ( u t , h , H )
7:
        else
8:
return ( 1 , h )
9:
        end if
10:
    end if
11:
end for
12:
return ( u , f )
The computational complexity of the F4-style algorithm can be evaluated from above by the same order of magnitude as that of Gaussian elimination of the Macaulay matrix. The size of the Macaulay matrix of degree D is bounded above by the number of monomials of degree D , which is equal to
n + D D .
The computational complexity of Gaussian elimination is bounded above by N ω if the matrix size is N ( 2 < ω 3 is the linear algebra constant). D max denotes the highest degree of critical pairs appearing in the Gröbner bases computation. Then, the computational complexity of the F4-style algorithm is roughly
O n + D max D max ω .
We can reduce the computational complexity by omitting redundant critical pairs.

3.3. The Algorithm Proposed by Ito et al.

Redundant critical pairs do not necessarily vanish after applying the Update function. Here, we introduce a method to omit many redundant pairs. We assume that the degree reverse lexicographic order is employed as a monomial order, and the normal strategy is used as the pair selection strategy in the Gröbner bases computation. When solving the MQ problem in the Gröbner bases computation, in many cases, the degree d of the critical pairs changes, as described below.
2 , 3 , , D max 1 , D max Ascending part d = 2 , 3 , , D max 1 First half D max , D max 1 , D max 2 , Second half .
Herein, the computation until the degree of the selected pair becomes D max is referred to as the first half. In the first half of the computation, many redundant pairs are reduced to zero. When solving the MQ problem, Ito et al. found that if a critical pair of degree d is reduced to zero, all pairs of degree d stored at that time are also reduced to zero with a high probability. Thus, redundant critical pairs can be efficiently eliminated by ignoring all stored pairs of degree d after the critical pairs of degree d are reduced to zero. Algorithm 7 introduces the above method into Algorithm 3. In Algorithm 7, P d is the set of pairs with the lowest degree d that are not tested. The subset P contains critical pairs selected from P d , and H + refers to new polynomials obtained by reducing P . If the number of new polynomials H + is less than the number of selected pairs P , a reduction to zero has occurred, and then P d is deleted.
Algorithm 7 F4-style algorithm proposed by Ito et al.
Input: F = { f 1 , , f m } R .
Output: A Gröbner basis of F .
1:
( G , P ) ( , ) , i 0 , D max 0
2:
for f F do
3:
     ( G , P ) Update ( G , P , f )
4:
end for
5:
while P do
6:
     ( P d , d ) Select ( P )
7:
    if  D max < d  then
8:
         D max d
9:
    end if
10:
    while  P d  do
11:
         i i + 1
12:
         P a subset of P d
13:
         ( P , P d ) ( P \ P , P d \ P )
14:
         L { Left ( p ) p P } { Right ( p ) p P }
15:
         ( H i ˜ + , H i ) Reduction ( L , G , ( H j ) j = 1 , , i 1 )
16:
        for  h H i ˜ + \ { 0 }  do
17:
            ( G , P ) Update ( G , P , h )
18:
        end for
19:
        if  h H i ˜ + \ { 0 } s.t. deg ( h ) < d  then
20:
           break
21:
        end if
22:
        if  | H i ˜ + | < | P | and D max = d  then
23:
            ( P , P d ) ( P \ P d , )
24:
        end if
25:
    end while
26:
end while
27:
returnG
Note that Ito et al. stated that the proposed method was valid for MQ problems associated with encryption schemes, i.e., of type m = 2 n , but other MQ problems, including those of type m = n + 1 , were not discussed. Moreover, they set the number of selected pairs | P | to 256 to divide P d . Hence, they did not guarantee that this subdividing method is optimal.

3.4. Proposed Methods

We explain the subdividing methods and the removal method in Section 3.4.1 and Section 3.4.2, respectively. The proposed methods were integrated into the F4-style algorithm as described in Algorithm 8. The OpenF4 library was used for these implementations. The OpenF4 library is an open-source implementation of the F4-style algorithm and, thus, is suitable for this purpose.
Algorithm 8 F4-style algorithm integrating the proposed methods
Input: F = { f 1 , , f m } R .
Output: A basis of F .
1:
( G , P ) ( , ) , i 0
2:
for h F do
3:
     ( G , P ) Update ( G , P , h )
4:
end for
5:
while P   do
6:
     ( P d , d ) Select ( P )
7:
     P P \ P d
8:
    while  P d  do
9:
        // Use the method presented in Section 3.4.1
10:
         { C 1 , , C k } SubDividePd ( P d )
11:
        for  l = 1 to k  do
12:
            i i + 1
13:
            P d P d \ C l
14:
            L { Left ( p ) p C l } { Right ( p ) p C l }
15:
            ( H i ˜ + , H i ) Reduction ( L , G , ( H j ) j = 1 , , i 1 )
16:
           for  h H i ˜ + \ { 0 }  do
17:
                ( G , P ) Update ( G , P , h )
18:
           end for
19:
           // Use the method presented in Section 3.4.2
20:
           if  0 H i ˜ +  then
21:
                P d
22:
               break
23:
           end if
24:
        end for
25:
    end while
26:
end while
27:
returnG
Algorithm 9 SubDividePd
Input: P d P and d N .
Output: C 1 , , C k P d
1:
P d = C 1 C 2 C k (disjoint union) s.t. C i C j for i < j
2:
return { C 1 , , C k }
As mentioned above, the SelectPd function serves to select a subset P d of all the critical pairs at each step for the reduction part of the F4-style algorithm. Ito et al. proposed a method where they subdivide P d into smaller subsets { C 1 , , C k } as described in Algorithm 9, and perform the Reduction and Update functions for each set C i consecutively when no S-polynomials are reduced to zero during the reduction. On the other hand, if some S-polynomials reduce to zero during the reduction of a set C j for the first time, this method ignores the remaining sets { C j + 1 , , C k } and removes them from all the critical pairs.
The authors confirmed that their method was effective in solving the MQ problems under the condition where m = 2 n and k = 256 only and they did not mention other types, especially m = n + 1 , or other subdividing methods.
In our experiments, as described in Section 4.1, we generated the MQ problems ( m = n + 1 ) with random polynomial coefficients to have at least one solution in the same manner as the Fukuoka MQ challenges ([40], Algorithm 2 and Step 4 of Algorithm 1), and we assumed that LC ( f j ) 0 for all input polynomials f j ( j = 1 , , m ) because such polynomials are obtained with non-negligible probability for experimental purposes. Taking a change in variables into account, the probability is exactly 1 { 1 ( 1 1 / q ) m } n . For example, it is close to 1 for q = 31 and ( n , m ) = ( 16 , 17 ) .

3.4.1. Subdividing Methods

To solve the MQ problems, Ito et al. fixed the number of elements of each C i to 256, i.e., | C i | = 256 . In our experiments, we propose three types of subdividing methods:
SD1: 
The number of elements in C i ( i < k ) is fixed except C k .
We set | C i | = 128 , 256, 512, 768, 1024, 2048, and 4096.
SD2: 
The number of subdivided subsets is fixed.
We set k = 5 , 10, and 15.
SD3: 
The fraction of elements to be processed in the remaining element in P d is fixed; i.e., C 1 = max ( r P d , 1 ) and C i = max ( r P d \ l = 1 i 1 C l , 1 ) for i > 1 .
We set r = 1 / 5 , 1 / 10 , and 1 / 15 .
Furthermore, we propose two subdividing methods based on SD1 in Section 4.2.

3.4.2. A Removal Method

It is important to skip redundant critical pairs in the F 4 -style algorithm because it takes extra time to compute reductions of larger matrix sizes. To solve the MQ problems that are defined as systems of m quadratic polynomial equations over n variables, Ito et al. experimentally confirmed that once a reduction to zero occurs for some critical pairs in P P , nothing but a reduction to zero will be generated for all subsequently selected critical pairs in P in the case of R = F 256 or F 31 with the number of polynomials m = 2 n and the number of variables n = 16 , , 25 .
We checked Hypothesis 1 through computational experiments.
Hypothesis 1.
If a Macaulay matrix composed of critical pairs p P ( P ) has some reductions to zero, i.e., 0 H ˜ in line 15 in Algorithm 8 with the normal strategy, then all remaining critical pairs p P s.t. deg ( LCM ( p ) ) = deg ( LCM ( p ) ) will be reduced to zero with a high probability.
The difference between a measuring algorithm and a checking algorithm is as follows: in the algorithm measuring the software performance of the OpenF4 library and our methods, as defined in Algorithm 8, once a reduction to zero occurs, the remaining critical pairs in P d are removed. In other words, in such an algorithm, a new next P d is selected immediately after a reduction to zero. On the other hand, in the algorithm checking Hypothesis 1 as described above, we need to continue reducing all remaining critical pairs and monitor whether reductions to zero are consecutively generated after the first one. However, because the behavior of the checking algorithm needs to match that of the measuring one, every internal state just before processing the remaining critical pairs in the checking algorithm is reset to the state immediately after a reduction to zero.
To check Hypothesis 1, we solved the MQ problems of random coefficients over F 31 for the condition where m = n + 1 and n = 9 , , 16 using Algorithm 8 with SD1. Due to processing times, a hundred samples and fifty samples were generated for each problem for n < 16 and n = 16 , respectively. Furthermore, C i of SD1 was fixed to 1, 16, 32, 256, and 512 for n = 9 , , 12 ; n = 13 ; n = 14 ; n = 15 ; and n = 16 , respectively.
Our programs were terminated normally with about 0.9 probability. Thus, the experiments showed that Hypothesis 1 was valid with about 0.9 probability. The remaining events, which coincided with a probability of approximately 0.1, corresponded to an OpenF4 library’s warning concerning the number of temporary basis. Although the warning was output, neither temporary basis (i.e., an element in G, in line 17 of Algorithm 8) nor a critical pair of higher degree arose from unused critical pairs in omitted subsets. Moreover, all outputs of all problems contained the initial values with no errors.

3.5. System Architecture

Our experiments were performed on the following systems as shown in Table 3 and Table 4. In the case of ( n , m ) = ( 17 , 18 ) and ( 18 , 19 ) in Appendix A1, our experiments were performed as shown in Table 4.
Our software diagram was as shown in Figure 1.

4. Results

In this section, we describe the software performance of the proposed methods introduced in Section 3.4. Then, we describe their behavior in the first half of the computation.

4.1. Software Performance Comparisons

We integrated our proposed methods into the F4-style algorithm using the OpenF4 library version 1.0.1 and compared their software performances, including the original OpenF4. We benchmarked these implementations on the MQ problems similar to the Fukuoka MQ challenge of type V over a base field F 256 and type VI over a base field F 31 . These problems were defined as MQ polynomial systems of m equations over n variables with m = n + 1 , based on the hybrid approach. We experimented with ten samples for each parameter: m = n + 1 and n = 9 , , 15 over F 256 and m = n + 1 and n = 9 , , 16 over F 31 . Note that we could not run these programs for n > 16 over F 31 and for n > 15 over F 256 because the OpenF4 library needs significantly more memory than the RAM installed on our machine. Our results for m = n + 1 and n = 9 , , 15 over F 256 are listed in Table A2 and for m = n + 1 and n = 9 , , 16 over F 31 are listed in Table A3. For the first and second halves of the computation, the top three records produced by the proposed methods and the record by the OpenF4 library are shown in Figure 2a,b and Figure 3a,b.
These experiments demonstrated that there was no failure to compute solutions including initially selected values and standard variations ( σ ) of the CPU times were relatively small and the F4-style algorithms integrating our proposed methods were faster than that of the original OpenF4 library, e.g., by a factor of up to 7.21 in the case of SD1 under n = 15 and C i = 512 over F 256 and factor 6.02 in the case of SD1 under n = 16 and C i = 1024 over F 31 . According to these results, we could argue that SD1 is faster than all other methods. However, if we focus only on the first half of the computation, we found that SD3 with r = 15 may be the fastest in both the cases of F 256 and F 31 . This reason will be discussed in the next section. If we distinguish between the first and second halves, we conclude that it is appropriate to apply SD3 with r = 15 in the first half and SD1 with C i 512 in the second half. For example, a combination of SD3 with r = 1 / 15 for the first half and SD1 with C i = 512 for the second half (i.e., SD3 followed by SD1) is faster than otherwise, e.g., by a factor of up to 7.76 for ( n , m ) = ( 16 , 17 ) over F 31 .

4.2. The Performance Behavior of the Proposed Methods in the First Half

In our experiments, we calculated the CPU time and the number of critical pairs used at each reduction. We found that the minimum number of critical pairs that generates a reduction to zero for the first time is approximately constant. Note, however, that if more than one of the critical pairs arises, we take the maximum number among them.
The number of critical pairs that generates a reduction to zero for the first time for each ( n , m ) and d is listed in Table A1. The symbol Total in the table represents the number of critical pairs before reducing the Macaulay matrix for each ( n , m ) and d. The symbol Min represents the minimum number of critical pairs that generates a reduction to zero for the first time for each ( n , m ) and d. The ratio of Min-to-Total is shown in Figure 4a. The log-log scale version of this figure is shown in Figure 4b. Figure 4a shows that the ratios gradually decrease, and the decreasing ratios are not constant. These tendencies were likely the reason that SD3 with r = 1 / 15 was useful in the first half. Figure 4b shows that it is expected that the errors by the linear approximation will not be so large.
Here, we propose the subdividing method SD4 in the first half as follows.
SD4: 
The number of elements in the first subset C 1 is 1 plus the number Min specified in Table A1. C i   ( i > 2 ) is fixed to a small value in place.
We experimented with SD4 in the first half followed by SD1 with C i = 512 in the second half (i.e., SD4 ⇒ SD1). Our benchmark results of SD4 followed by SD1 are listed in Table A2 and Table A3. For the first half of the computation, the record by SD4 and the record by the OpenF4 library are shown in Figure 5a,b.
Here, we investigate the approximation of the ratio (r) shown in Figure 4a. The Simplify function outputs the product of x i × p such that x i is a variable and p is a polynomial with a high probability, as stated in the paper ([34], Remark 2.6). Thus, it seems likely that the rows of the Macaulay matrix are composed of the products of x 1 a 1 x i a i × p where 1 i n and p is a polynomial with a high probability because of the normal strategy.
Moreover, the elements in the leftmost columns of the Macaulay matrix come from the leading monomials. Hence, it seems reasonable to suppose that the ratio r is approximately related to the number of monomials of degree d:
{ x 1 a 1 x n a n | a 1 + + a n = d } = d + n 1 n 1 d n 1 ( n 1 ) ! + ( lower terms ) .
Accordingly, we assume that r is proportional to a power of d, i.e., r d c (c is a constant), by ignoring lower terms. We have log r = a log d + b where a and b are constants. Thus, it seems that there is a correspondence between linear approximations of the graphs in Figure 4b and the lower terms on the rightmost side of (4) are ignored. Furthermore, we assume that linear expressions in n approximate both a and b, and we distinguish between the approximations according to whether n is even or odd.
The linear regression analysis of a ( n = 9 , , 16 ) shows that
a a ( n ) = 0.0566 n 2.63 ( n is odd ) , 0.0443 n 2.38 ( n is even ) .
In addition, the regression analysis of b ( n = 9 , , 16 ) shows that
b b ( n ) = 0.0301 n + 1.15 ( n is odd ) , 0.0236 n + 1.01 ( n is even ) .
Then, we add the constant value 0.0542 as r passes over all points in Figure 4b because the expected number of critical pairs should not be less than the required number.
Finally, we propose the subdividing method SD5 in the first half as follows:
SD5: 
The number of elements in the first subset C 1 is r ( d , n ) multiplied by the number Total specified in Table A1, regarding SD1. C i   ( i > 2 ) is fixed to a small value in place. r ( n , d ) is defined as follows:
r r ( n , d ) = 0.0542 + d 0.0566 n 2.63 10 0.0301 n + 1.15 ( n is odd ) , 0.0542 + d 0.0443 n 2.38 10 0.0236 n + 1.01 ( n is even ) .
We experimented with SD5 in the first half followed by SD1 with C i = 512 in the second half (i.e., SD5 ⇒ SD1). Our benchmark results of SD5 followed by SD1 are listed in Table A2 and Table A3. For the first half of the computation, the record by SD5 and the record by the OpenF4 library are shown in Figure 5a,b.

5. Conclusions and Future Work

The experimental results of our previous study demonstrated that the subdividing method SD1 with C i = 256 and the removal method are valid for solving a system of MQ polynomial equations associated with encryption schemes. In this study, we proposed three basic (SD1, SD2, and SD3) and two extra (SD4 and SD5) subdividing methods of the F 4 -style algorithm. Our proposed methods considerably improved the performance of the F 4 -style algorithm by omitting redundant critical pairs using the removal method. Then, our experimental results validated the effectiveness of these methods in solving a system of MQ polynomial equations under m = n + 1 . Furthermore, the experiments revealed that the number of critical pairs that generates a reduction to zero for the first time was approximately constant under m = n + 1 . However, we could not estimate the number of critical pairs that generates a reduction to zero for the first time under the condition where n > 15 over F 256 or n > 16 over F 31 because of the limitations of our machine and the OpenF4 library.
As discussed in the derivation of (3), the minimum number of critical pairs that generates a reduction to zero for the first time determines the Macaulay-matrix size, and its size determines the computational complexity of the Gaussian elimination. Thus, it is expected that the minimum number is significantly related to the computational complexity of our proposed algorithm. Since the rules are not clear as far as Table A1 is concerned, further research is needed. If the resources required for further study are identified, it can be conducted efficiently. Therefore, we developed SD5 in the first half of the computation by approximating the Min-to-Total ratio specified in Table A1. SD5 can be applied to the condition where n > 15 over F 256 or n > 16 over F 31 . It should be noted that SD4 can be applied once the number of critical pairs that generates a reduction to zero for the first time under a given condition is computed and identified like that in Table A1. Our future work will mainly investigate a mechanism for generating a reduction to zero.

Author Contributions

Conceptualization, T.K.; methodology, T.K.; software, T.K. and T.I.; formal analysis, T.K.; investigation, T.K.; data curation, T.K.; writing—original draft preparation, T.K.; supervision, N.S., A.Y. and S.U. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Ministry of Internal Affairs and Communications as part of the research program R&D for Expansion of Radio Wave Resources (JPJ000254).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Source data for Figure 2a,b, Figure 3a,b, Figure 4a,b are provided in Appendix A.

Acknowledgments

We would like to thank the anonymous reviewers for their useful suggestions and valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Experimental results of the number of critical pairs that generates a reduction to zero in the first half for m = n + 1 over F 256 and F 31 are shown in Table A1. Our benchmark results for MQ problems over F 256 for m = n + 1 are shown in Table A2. Our benchmark results for MQ problems over F 31 for m = n + 1 are shown in Table A3.
Table A1. Experimental results of the minimum number of critical pairs that generates a reduction to zero in the first half for m = n + 1 over F 256 and F 31 .
Table A1. Experimental results of the minimum number of critical pairs that generates a reduction to zero in the first half for m = n + 1 over F 256 and F 31 .
( n , m ) ( 9 , 10 ) ( 10 , 11 ) ( 11 , 12 ) ( 12 , 13 ) ( 13 , 14 ) ( 14 , 15 ) ( 15 , 16 ) ( 16 , 17 ) ( 17 , 18 ) ( 18 , 19 )
d = 2 Min9101112131415161718
Total9101112131415161718
d = 3 Min20242832364045505560
Total20242832364045505560
d = 4 Min3950607691106126146165189
Total99126153187221256301347393445
d = 5 Min6388120156204248318378462550
Total2593544566047649271158138616381942
d = 6 Min13218728636453266490110891424
Total 73710591432200426123449433154436780
d = 7 Min4295729361300176824483078
Total 300340046216816411,49214,61619,614
d = 8 Min14302002309445905814
Total 11,80417,10824,48035,49645,999
d = 9 Min4862707210,336
Total 45,52670,17693,024
d = 10 Min16,796
Total 173,774
Min: the minimum number of critical pairs for a reduction to zero. Total: the total number of critical pairs appearing before a reduction. Another NUMA machine that has 3 TB RAM.
Table A2. Benchmark results for MQ problems over F 256 for m = n + 1 , total CPU time (s).
Table A2. Benchmark results for MQ problems over F 256 for m = n + 1 , total CPU time (s).
( n , m ) ( 9 , 10 ) ( 10 , 11 ) ( 11 , 12 ) ( 12 , 13 ) ( 13 , 14 ) ( 14 , 15 ) ( 15 , 16 )
Original OpenF4
Average 2.33 × 10 1 1.58 × 10 0 9.33 × 10 0 7.24 × 10 1 4.38 × 10 2 3.76 × 10 3 2.40 × 10 4
σ 9.17 × 10 3 2.32 × 10 3 5.25 × 10 3 1.10 × 10 1 2.81 × 10 1 9.77 × 10 0 5.25 × 10 2
Before D max 5.04 × 10 2 5.47 × 10 1 2.00 × 10 0 2.38 × 10 1 8.95 × 10 1 1.17 × 10 3 4.93 × 10 3
After D max 1.80 × 10 1 1.03 × 10 0 7.33 × 10 0 4.86 × 10 1 3.48 × 10 2 2.59 × 10 3 1.91 × 10 4
SD1
C i = 128  Average 1.15 × 10 1 5.74 × 10 1 2.90 × 10 0 1.54 × 10 1 8.49 × 10 1 5.72 × 10 2 3.68 × 10 3
σ 9.80 × 10 4 1.37 × 10 3 4.09 × 10 3 1.74 × 10 2 5.40 × 10 2 5.51 × 10 1 3.00 × 10 1
Before D max 3.32 × 10 2 2.82 × 10 1 9.22 × 10 1 8.91 × 10 0 3.44 × 10 1 3.82 × 10 2 1.73 × 10 3
After D max 7.77 × 10 2 2.85 × 10 1 1.96 × 10 0 6.49 × 10 0 5.04 × 10 1 1.89 × 10 2 1.96 × 10 3
C i = 256  Average 1.63 × 10 1 6.50 × 10 1 3.05 × 10 0 1.75 × 10 1 8.62 × 10 1 5.85 × 10 2 3.41 × 10 3
σ 3.53 × 10 3 9.17 × 10 4 2.42 × 10 3 1.41 × 10 1 5.02 × 10 2 8.31 × 10 1 1.44 × 10 1
Before D max 4.94 × 10 2 3.01 × 10 1 8.80 × 10 1 8.22 × 10 0 3.36 × 10 1 3.15 × 10 2 1.46 × 10 3
After D max 1.10 × 10 1 3.45 × 10 1 2.16 × 10 0 9.30 × 10 0 5.26 × 10 1 2.70 × 10 2 1.95 × 10 3
C i = 512  Average 2.18 × 10 1 9.51 × 10 1 4.03 × 10 0 1.89 × 10 1 1.11 × 10 2 6.64 × 10 2 3.33 × 10 3
σ 7.43 × 10 3 1.86 × 10 3 4.50 × 10 3 8.20 × 10 2 3.60 × 10 2 8.27 × 10 1 1.40 × 10 1
Before D max 4.99 × 10 2 4.41 × 10 1 1.28 × 10 0 7.91 × 10 0 3.46 × 10 1 3.06 × 10 2 1.36 × 10 3
After D max 1.65 × 10 1 5.05 × 10 1 2.74 × 10 0 1.10 × 10 1 7.62 × 10 1 3.58 × 10 2 1.97 × 10 3
C i = 768  Average 2.27 × 10 1 1.22 × 10 0 5.11 × 10 0 2.28 × 10 1 1.14 × 10 2 7.10 × 10 2 3.76 × 10 3
σ 7.76 × 10 3 1.50 × 10 3 3.58 × 10 3 1.24 × 10 2 3.92 × 10 2 1.01 × 10 0 7.57 × 10 0
Before D max 4.97 × 10 2 5.43 × 10 1 1.59 × 10 0 1.00 × 10 1 3.33 × 10 1 3.05 × 10 2 1.33 × 10 3
After D max 1.75 × 10 1 6.70 × 10 1 3.51 × 10 0 1.28 × 10 1 8.07 × 10 1 4.05 × 10 2 2.42 × 10 3
C i = 1024  Average 2.29 × 10 1 1.40 × 10 0 6.18 × 10 0 2.68 × 10 1 1.24 × 10 2 7.17 × 10 2 4.40 × 10 3
σ 8.80 × 10 3 3.53 × 10 3 2.80 × 10 3 4.58 × 10 2 3.18 × 10 1 4.52 × 10 1 1.35 × 10 1
Before D max 4.95 × 10 2 5.44 × 10 1 1.93 × 10 0 1.20 × 10 1 3.84 × 10 1 3.16 × 10 2 1.32 × 10 3
After D max 1.77 × 10 1 8.50 × 10 1 4.25 × 10 0 1.47 × 10 1 8.58 × 10 1 4.01 × 10 2 3.07 × 10 3
C i = 2048  Average 2.30 × 10 1 1.57 × 10 0 8.63 × 10 0 4.17 × 10 1 1.85 × 10 2 9.04 × 10 2 4.91 × 10 3
σ 9.07 × 10 3 1.19 × 10 3 5.04 × 10 2 2.42 × 10 2 3.00 × 10 1 1.80 × 10 0 9.34 × 10 0
Before D max 4.98 × 10 2 5.42 × 10 1 1.99 × 10 0 1.89 × 10 1 6.11 × 10 1 3.71 × 10 2 1.31 × 10 3
After D max 1.77 × 10 1 1.03 × 10 0 6.64 × 10 0 2.28 × 10 1 1.23 × 10 2 5.33 × 10 2 3.60 × 10 3
C i = 4096   Average 2.30 × 10 1 1.57 × 10 0 9.35 × 10 0 6.35 × 10 1 2.92 × 10 2 1.34 × 10 3 6.47 × 10 3
σ 9.19 × 10 3 6.40 × 10 4 8.52 × 10 2 1.12 × 10 2 2.14 × 10 1 5.00 × 10 1 1.73 × 10 1
Before D max 4.95 × 10 2 5.43 × 10 1 1.99 × 10 0 2.37 × 10 1 8.93 × 10 1 5.80 × 10 2 1.99 × 10 3
After D max 1.77 × 10 1 1.03 × 10 0 7.36 × 10 0 3.97 × 10 1 2.03 × 10 2 7.57 × 10 2 4.49 × 10 3
SD2
k = 5          Average 1.17 × 10 1 5.86 × 10 1 3.33 × 10 0 2.21 × 10 1 1.38 × 10 2 1.09 × 10 3 7.25 × 10 3
σ 1.14 × 10 2 1.02 × 10 3 2.54 × 10 2 9.39 × 10 3 1.68 × 10 1 9.22 × 10 1 5.91 × 10 1
Before D max 3.50 × 10 2 2.35 × 10 1 8.18 × 10 1 7.38 × 10 0 3.02 × 10 1 3.41 × 10 2 1.48 × 10 3
After D max 6.59 × 10 2 3.41 × 10 1 2.50 × 10 0 1.47 × 10 1 1.08 × 10 2 7.50 × 10 2 5.77 × 10 3
k = 10    Average 1.27 × 10 1 5.38 × 10 1 2.67 × 10 0 1.89 × 10 1 9.63 × 10 1 8.69 × 10 2 5.58 × 10 3
σ 4.58 × 10 4 7.81 × 10 4 2.51 × 10 2 1.00 × 10 2 3.96 × 10 2 1.22 × 10 0 1.03 × 10 1
Before D max 3.64 × 10 2 2.63 × 10 1 9.39 × 10 1 8.02 × 10 0 3.19 × 10 1 3.40 × 10 2 1.49 × 10 3
After D max 4.74 × 10 2 2.61 × 10 1 1.71 × 10 0 1.08 × 10 1 6.44 × 10 1 5.30 × 10 2 4.10 × 10 3
k = 15    Average 1.19 × 10 1 5.23 × 10 1 2.73 × 10 0 1.66 × 10 1 9.53 × 10 1 7.47 × 10 2 3.77 × 10 3
σ 3.00 × 10 4 1.11 × 10 3 3.87 × 10 3 8.85 × 10 3 1.19 × 10 1 9.83 × 10 1 8.57 × 10 0
Before D max 3.73 × 10 2 2.71 × 10 1 1.06 × 10 0 8.64 × 10 0 3.41 × 10 1 3.08 × 10 2 1.33 × 10 3
After D max 4.60 × 10 2 2.25 × 10 1 1.62 × 10 0 7.85 × 10 0 6.06 × 10 1 4.39 × 10 2 2.44 × 10 3
SD3
r = 1 / 5       Average 1.12 × 10 1 5.81 × 10 1 3.27 × 10 0 2.21 × 10 1 1.35 × 10 2 1.09 × 10 3 7.04 × 10 3
σ 1.02 × 10 3 8.72 × 10 4 4.84 × 10 3 6.02 × 10 3 7.38 × 10 2 6.49 × 10 1 8.54 × 10 1
Before D max 3.49 × 10 2 2.28 × 10 1 8.06 × 10 1 7.35 × 10 0 3.00 × 10 1 3.40 × 10 2 1.48 × 10 3
After D max 6.79 × 10 2 3.40 × 10 1 2.44 × 10 0 1.47 × 10 1 1.05 × 10 2 7.50 × 10 2 5.56 × 10 3
r = 1 / 10    Average 1.16 × 10 1 5.36 × 10 1 2.96 × 10 0 1.92 × 10 1 1.15 × 10 2 8.60 × 10 2 5.88 × 10 3
σ 5.39 × 10 4 4.90 × 10 4 2.23 × 10 3 7.58 × 10 3 4.53 × 10 2 1.09 × 10 0 4.79 × 10 1
Before D max 3.60 × 10 2 2.60 × 10 1 9.19 × 10 1 8.37 × 10 0 3.14 × 10 1 3.30 × 10 2 1.47 × 10 3
After D max 6.58 × 10 2 2.62 × 10 1 2.02 × 10 0 1.08 × 10 1 8.34 × 10 1 5.30 × 10 2 4.41 × 10 3
r = 1 / 15    Average 1.17 × 10 1 5.55 × 10 1 3.19 × 10 0 1.66 × 10 1 9.41 × 10 1 7.44 × 10 2 4.94 × 10 3
σ 3.00 × 10 4 7.00 × 10 4 2.88 × 10 3 1.19 × 10 1 1.12 × 10 1 1.07 × 10 0 9.59 × 10 0
Before D max 4.26 × 10 2 2.87 × 10 1 1.04 × 10 0 8.99 × 10 0 3.35 × 10 1 2.98 × 10 2 1.31 × 10 3
After D max 5.45 × 10 2 2.48 × 10 1 2.12 × 10 0 7.55 × 10 0 6.05 × 10 1 4.46 × 10 2 3.63 × 10 3
SD3 followed by SD1 with r = 1 / 15 and C i = 512
Average 2.23 × 10 1 8.20 × 10 1 3.78 × 10 0 2.01 × 10 1 1.11 × 10 2 6.53 × 10 2 3.24 × 10 3
σ 6.45 × 10 3 9.00 × 10 4 3.04 × 10 3 1.33 × 10 2 9.05 × 10 2 5.78 × 10 1 1.35 × 10 1
Before D max 4.28 × 10 2 2.89 × 10 1 1.05 × 10 0 9.00 × 10 0 3.36 × 10 1 2.96 × 10 2 1.30 × 10 3
After D max 1.65 × 10 1 5.13 × 10 1 2.71 × 10 0 1.11 × 10 1 7.69 × 10 1 3.57 × 10 2 1.94 × 10 3
SD4 followed by SD1 with C i = 512
Average 1.91 × 10 1 7.09 × 10 1 3.48 × 10 0 1.75 × 10 1 1.03 × 10 2 6.14 × 10 2 3.10 × 10 3
σ 6.78 × 10 3 6.00 × 10 4 3.29 × 10 3 1.41 × 10 2 7.21 × 10 2 1.76 × 10 0 1.11 × 10 1
Before D max 2.30 × 10 2 1.96 × 10 1 7.25 × 10 1 6.46 × 10 0 2.61 × 10 1 2.55 × 10 2 1.14 × 10 3
After D max 1.64 × 10 1 5.08 × 10 1 2.74 × 10 0 1.10 × 10 1 7.68 × 10 1 3.59 × 10 2 1.95 × 10 3
SD5 followed by SD1 with C i = 512
Average 1.39 × 10 1 6.25 × 10 1 3.33 × 10 0 1.97 × 10 1 1.09 × 10 2 8.09 × 10 2 4.26 × 10 3
σ 6.64 × 10 3 2.61 × 10 3 1.68 × 10 2 8.88 × 10 3 5.87 × 10 2 9.52 × 10 1 6.62 × 10 0
Before D max 2.49 × 10 2 2.20 × 10 1 7.96 × 10 1 7.44 × 10 0 3.04 × 10 1 3.14 × 10 2 1.42 × 10 3
After D max 1.10 × 10 1 4.00 × 10 1 2.53 × 10 0 1.23 × 10 1 7.83 × 10 1 4.95 × 10 2 2.84 × 10 3
σ stands for a standard deviation.
Table A3. Benchmark results for MQ problems over F 31 for m = n + 1 , total CPU time (s).
Table A3. Benchmark results for MQ problems over F 31 for m = n + 1 , total CPU time (s).
( n , m ) ( 9 , 10 ) ( 10 , 11 ) ( 11 , 12 ) ( 12 , 13 ) ( 13 , 14 ) ( 14 , 15 ) ( 15 , 16 ) ( 16 , 17 )
Original OpenF4
Average 1.22 × 10 1 5.89 × 10 1 2.55 × 10 0 1.38 × 10 1 8.00 × 10 1 6.30 × 10 2 3.74 × 10 3 3.04 × 10 4
σ 2.12 × 10 3 3.44 × 10 3 1.01 × 10 1 1.51 × 10 0 1.78 × 10 1 2.32 × 10 0 2.54 × 10 2 4.32 × 10 2
Before D max 2.82 × 10 2 2.04 × 10 1 5.75 × 10 1 4.39 × 10 0 1.48 × 10 1 1.88 × 10 2 7.28 × 10 2 8.46 × 10 3
After D max 8.98 × 10 2 3.81 × 10 1 1.97 × 10 0 9.40 × 10 0 6.52 × 10 1 4.42 × 10 2 3.01 × 10 3 2.20 × 10 4
SD1
| C i | = 128    Average 7.07 × 10 2 3.12 × 10 1 1.38 × 10 0 6.88 × 10 0 3.23 × 10 1 2.01 × 10 2 1.32 × 10 3 1.17 × 10 4
σ 1.00 × 10 3 1.85 × 10 3 2.41 × 10 2 1.42 × 10 1 2.70 × 10 1 5.46 × 10 1 5.33 × 10 0 6.83 × 10 1
Before D max 2.11 × 10 2 1.55 × 10 1 4.25 × 10 1 3.83 × 10 0 1.34 × 10 1 1.38 × 10 2 6.09 × 10 2 8.69 × 10 3
After D max 4.60 × 10 2 1.51 × 10 1 9.46 × 10 1 3.03 × 10 0 1.89 × 10 1 6.27 × 10 1 7.11 × 10 2 3.02 × 10 3
| C i | = 256    Average 9.17 × 10 2 3.03 × 10 1 1.24 × 10 0 6.30 × 10 0 2.79 × 10 1 1.66 × 10 2 9.76 × 10 2 7.81 × 10 3
σ 9.00 × 10 4 2.42 × 10 3 5.33 × 10 3 1.31 × 10 1 7.61 × 10 2 2.76 × 10 1 1.54 × 10 0 2.45 × 10 1
Before D max 2.73 × 10 2 1.39 × 10 1 3.43 × 10 1 2.79 × 10 0 1.03 × 10 1 9.01 × 10 1 4.02 × 10 2 5.35 × 10 3
After D max 5.93 × 10 2 1.60 × 10 1 8.85 × 10 1 3.50 × 10 0 1.76 × 10 1 7.61 × 10 1 5.74 × 10 2 2.47 × 10 3
| C i | = 512    Average 1.12 × 10 1 3.83 × 10 1 1.35 × 10 0 5.52 × 10 0 2.90 × 10 1 1.52 × 10 2 7.97 × 10 2 5.39 × 10 3
σ 2.09 × 10 3 2.24 × 10 3 2.59 × 10 2 2.65 × 10 1 1.03 × 10 2 1.36 × 10 1 1.98 × 10 0 1.70 × 10 1
Before D max 2.74 × 10 2 1.72 × 10 1 4.30 × 10 1 2.06 × 10 0 8.69 × 10 0 7.10 × 10 1 2.99 × 10 2 3.70 × 10 3
After D max 8.08 × 10 2 2.05 × 10 1 9.12 × 10 1 3.45 × 10 0 2.03 × 10 1 8.12 × 10 1 4.99 × 10 2 1.69 × 10 3
| C i | = 768    Average 1.18 × 10 1 4.57 × 10 1 1.56 × 10 0 5.91 × 10 0 2.72 × 10 1 1.52 × 10 2 8.02 × 10 2 5.12 × 10 3
σ 2.18 × 10 3 1.85 × 10 3 2.20 × 10 2 1.89 × 10 1 9.46 × 10 3 2.13 × 10 0 1.31 × 10 0 5.24 × 10 1
Before D max 2.75 × 10 2 1.99 × 10 1 4.91 × 10 1 2.41 × 10 0 7.07 × 10 0 6.51 × 10 1 2.67 × 10 2 3.25 × 10 3
After D max 8.59 × 10 2 2.53 × 10 1 1.06 × 10 0 3.49 × 10 0 2.01 × 10 1 8.67 × 10 1 5.35 × 10 2 1.86 × 10 3
| C i | = 1024    Average 1.19 × 10 1 5.17 × 10 1 1.81 × 10 0 6.70 × 10 0 2.66 × 10 1 1.49 × 10 2 8.68 × 10 2 5.05 × 10 3
σ 1.80 × 10 3 2.37 × 10 3 1.75 × 10 2 1.40 × 10 1 4.72 × 10 2 1.54 × 10 0 1.77 × 10 0 3.06 × 10 1
Before D max 2.72 × 10 2 2.00 × 10 1 5.60 × 10 1 2.75 × 10 0 7.79 × 10 0 6.28 × 10 1 2.45 × 10 2 2.75 × 10 3
After D max 8.72 × 10 2 3.13 × 10 1 1.24 × 10 0 3.95 × 10 0 1.88 × 10 1 8.61 × 10 1 6.22 × 10 2 2.30 × 10 3
| C i | = 2048    Average 1.18 × 10 1 5.79 × 10 1 2.34 × 10 0 8.98 × 10 0 3.42 × 10 1 1.56 × 10 2 8.63 × 10 2 5.20 × 10 3
σ 1.68 × 10 3 1.83 × 10 3 3.16 × 10 2 1.43 × 10 1 2.05 × 10 2 4.88 × 10 1 1.15 × 10 1 2.37 × 10 1
Before D max 2.73 × 10 2 1.99 × 10 1 5.79 × 10 1 3.71 × 10 0 1.07 × 10 1 6.16 × 10 1 2.14 × 10 2 2.46 × 10 3
After D max 8.66 × 10 2 3.76 × 10 1 1.77 × 10 0 5.26 × 10 0 2.34 × 10 1 9.39 × 10 1 6.48 × 10 2 2.73 × 10 3
| C i | = 4096 Average 1.19 × 10 1 5.81 × 10 1 2.54 × 10 0 1.23 × 10 1 5.27 × 10 1 2.16 × 10 2 1.05 × 10 3 6.09 × 10 3
σ 1.63 × 10 3 2.54 × 10 3 9.76 × 10 2 9.86 × 10 1 1.15 × 10 1 8.77 × 10 1 1.48 × 10 1 4.83 × 10 1
Before D max 2.72 × 10 2 2.00 × 10 1 5.69 × 10 1 4.36 × 10 0 1.47 × 10 1 9.12 × 10 1 3.10 × 10 2 2.44 × 10 3
After D max 8.72 × 10 2 3.76 × 10 1 1.96 × 10 0 7.91 × 10 0 3.80 × 10 1 1.25 × 10 2 7.39 × 10 2 3.65 × 10 3
SD2
k = 5          Average 7.91 × 10 2 3.01 × 10 1 1.32 × 10 0 6.13 × 10 0 2.88 × 10 1 1.83 × 10 2 1.22 × 10 3 8.53 × 10 3
σ 2.12 × 10 3 1.99 × 10 3 1.35 × 10 1 3.98 × 10 1 2.44 × 10 2 7.03 × 10 2 5.35 × 10 2 2.30 × 10 2
Before D max 2.64 × 10 2 1.32 × 10 1 3.62 × 10 1 2.07 × 10 0 6.79 × 10 0 5.97 × 10 1 2.22 × 10 2 2.42 × 10 3
After D max 4.51 × 10 1 1.60 × 10 1 9.22 × 10 1 4.03 × 10 0 2.20 × 10 1 1.23 × 10 2 1.00 × 10 3 6.11 × 10 3
k = 10    Average 1.17 × 10 1 3.38 × 10 1 1.37 × 10 0 6.67 × 10 0 2.67 × 10 1 1.65 × 10 2 9.63 × 10 2 7.10 × 10 3
σ 1.08 × 10 3 2.05 × 10 3 8.76 × 10 3 1.09 × 10 0 2.97 × 10 1 2.45 × 10 1 9.38 × 10 1 9.41 × 10 2
Before D max 3.16 × 10 2 1.74 × 10 1 4.93 × 10 1 2.89 × 10 0 9.10 × 10 0 7.15 × 10 1 2.74 × 10 2 2.58 × 10 3
After D max 3.94 × 10 2 1.48 × 10 1 8.51 × 10 1 3.72 × 10 0 1.76 × 10 1 9.38 × 10 1 6.89 × 10 2 4.51 × 10 3
k = 15    Average 1.13 × 10 1 3.68 × 10 1 1.57 × 10 0 7.05 × 10 0 4.29 × 10 1 1.56 × 10 2 8.51 × 10 2 5.73 × 10 3
σ 8.72 × 10 4 1.55 × 10 3 1.29 × 10 2 5.16 × 10 1 1.03 × 10 1 8.86 × 10 2 1.63 × 10 0 7.39 × 10 0
Before D max 3.41 × 10 2 1.93 × 10 1 6.35 × 10 1 3.64 × 10 0 1.13 × 10 1 7.28 × 10 1 2.58 × 10 2 2.28 × 10 3
After D max 4.03 × 10 2 1.47 × 10 1 8.85 × 10 1 3.32 × 10 0 3.10 × 10 1 8.36 × 10 1 5.92 × 10 2 3.45 × 10 3
SD3
r = 1 / 5    Average 8.05 × 10 2 2.99 × 10 1 1.25 × 10 0 5.89 × 10 0 2.81 × 10 1 1.80 × 10 2 1.11 × 10 3 8.39 × 10 3
σ 1.02 × 10 3 1.61 × 10 3 4.56 × 10 3 4.38 × 10 2 3.32 × 10 2 1.56 × 10 1 5.19 × 10 1 6.57 × 10 1
Before D max 2.54 × 10 2 1.30 × 10 1 3.56 × 10 1 2.03 × 10 0 6.74 × 10 0 5.89 × 10 1 2.39 × 10 2 2.41 × 10 3
After D max 4.41 × 10 2 1.57 × 10 1 8.77 × 10 1 3.84 × 10 0 2.13 × 10 1 1.21 × 10 2 8.75 × 10 2 5.97 × 10 3
r = 1 / 10       Average 9.70 × 10 2 3.34 × 10 1 1.44 × 10 0 6.54 × 10 0 2.85 × 10 1 1.63 × 10 2 9.78 × 10 2 6.65 × 10 3
σ 8.94 × 10 4 1.73 × 10 3 6.32 × 10 3 9.04 × 10 2 1.42 × 10 2 1.84 × 10 0 9.16 × 10 0 5.87 × 10 1
Before D max 3.32 × 10 2 1.73 × 10 1 4.85 × 10 1 3.19 × 10 0 8.94 × 10 0 7.07 × 10 1 2.69 × 10 2 2.52 × 10 3
After D max 5.08 × 10 2 1.44 × 10 1 9.27 × 10 1 3.32 × 10 0 1.96 × 10 1 9.22 × 10 1 7.10 × 10 2 4.13 × 10 3
r = 1 / 15    Average 1.08 × 10 1 3.84 × 10 1 1.68 × 10 0 7.02 × 10 0 3.07 × 10 1 1.56 × 10 2 9.08 × 10 2 5.71 × 10 3
σ 6.00 × 10 4 1.86 × 10 3 7.40 × 10 3 9.72 × 10 2 2.96 × 10 2 2.80 × 10 1 1.67 × 10 0 1.23 × 10 1
Before D max 3.92 × 10 2 2.10 × 10 1 6.33 × 10 1 3.97 × 10 0 1.12 × 10 1 7.22 × 10 1 2.59 × 10 2 2.25 × 10 3
After D max 4.70 × 10 2 1.51 × 10 1 1.02 × 10 0 3.01 × 10 0 1.94 × 10 1 8.39 × 10 1 6.49 × 10 2 3.46 × 10 3
SD3+SD1    r = 1 / 15 , | C i | = 512
Average 1.36 × 10 1 4.27 × 10 1 1.56 × 10 0 7.22 × 10 0 3.12 × 10 1 1.52 × 10 2 7.52 × 10 2 3.92 × 10 3
σ 1.08 × 10 3 1.64 × 10 3 2.84 × 10 2 5.30 × 10 2 2.87 × 10 2 9.05 × 10 2 1.10 × 10 0 1.23 × 10 1
Before D max 3.90 × 10 2 2.06 × 10 1 6.19 × 10 1 3.88 × 10 0 1.09 × 10 1 7.04 × 10 1 2.55 × 10 2 2.22 × 10 3
After D max 8.08 × 10 2 2.02 × 10 1 9.11 × 10 1 3.30 × 10 0 2.03 × 10 1 8.10 × 10 1 4.96 × 10 2 1.70 × 10 3
SD4+SD1    | C i | = 512
Average 1.03 × 10 1 3.21 × 10 1 1.26 × 10 0 5.38 × 10 0 2.73 × 10 1 1.33 × 10 2 7.11 × 10 2 3.78 × 10 3
σ 1.02 × 10 3 8.00 × 10 4 6.52 × 10 2 2.76 × 10 1 2.27 × 10 2 1.56 × 10 1 7.46 × 10 0 5.81 × 10 2
Before D max 1.73 × 10 2 1.07 × 10 1 3.20 × 10 1 1.83 × 10 0 6.08 × 10 0 4.89 × 10 1 1.95 × 10 2 2.00 × 10 3
After D max 8.19 × 10 2 2.08 × 10 1 9.38 × 10 1 3.54 × 10 0 2.12 × 10 1 8.43 × 10 1 5.16 × 10 2 1.78 × 10 3
SD5+SD1    | C i | = 512
Average 8.34 × 10 2 2.93 × 10 1 1.22 × 10 0 5.69 × 10 0 2.63 × 10 1 1.53 × 10 2 8.09 × 10 2 5.89 × 10 3
σ 9.14 × 10 4 1.10 × 10 3 2.47 × 10 2 2.03 × 10 1 1.06 × 10 2 2.30 × 10 1 1.34 × 10 0 5.16 × 10 0
Before D max 1.79 × 10 2 1.11 × 10 1 3.20 × 10 1 1.96 × 10 0 6.60 × 10 0 5.49 × 10 1 2.27 × 10 2 2.22 × 10 3
After D max 6.22 × 10 2 1.76 × 10 1 8.95 × 10 1 3.72 × 10 0 1.97 × 10 1 9.83 × 10 1 5.81 × 10 2 3.67 × 10 3
σ stands for a standard deviation.

References

  1. Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
  2. National Institute of Standards and Technology. Post-Quantum Cryptography: Proposed Requirements and Evaluation Criteria. Available online: https://csrc.nist.gov/News/2016/Post-Quantum-Cryptography-Proposed-Requirements (accessed on 1 December 2022).
  3. National Institute of Standards and Technology. New Call for Proposals: Call for Additional: Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process. Available online: https://csrc.nist.gov/projects/pqc-dig-sig/standardization/call-for-proposals (accessed on 1 December 2022).
  4. CRYSTALS, Cryptographic Suite for Algebraic Lattices. Available online: https://pq-crystals.org (accessed on 5 February 2023).
  5. FALCON, Fast-Fourier Lattice-Based Compact Signatures over NTRU. Available online: https://pq-crystals.org (accessed on 5 February 2023).
  6. SPHINCS+, Stateless Hash-Based Signatures. Available online: https://sphincs.org (accessed on 5 February 2023).
  7. Aragon, N.; Barreto, P.S.L.M.; Bettaieb, S.; Bidoux, L.; Blazy, O.; Deneuville, J.C.; Gaborit, P.; Ghosh, S.; Gueron, S.; Güneysu, T.; et al. BIKE—Bit Flipping Key Encapsulation. Available online: https://bikesuite.org (accessed on 5 February 2023).
  8. Bernstein, D.J.; Chou, T.; Cid, C.; Gilcher, J.; Lange, T.; Maram, V.; von Maurich, I.; Misoczki, R.; Niederhagen, R.; Persichetti, E.; et al. Classic McEliece. Available online: https://classic.mceliece.org (accessed on 5 February 2023).
  9. Melchor, C.A.; Aragon, N.; Bettaieb, S.; Bidoux, L.; Blazy, O.; Bos, J.; Deneuville, J.C.; Dion, A.; Gaborit, P.; Lacan, J.; et al. Hamming Quasi-Cyclic (HQC). Available online: http://pqc-hqc.org (accessed on 5 February 2023).
  10. Castryck, W.; Decru, T. An Efficient Key Recovery Attack on SIDH (Preliminary Version); Paper 2022/975; Cryptology ePrint Archive. 2022. Available online: https://eprint.iacr.org/2022/975 (accessed on 5 February 2023).
  11. The SIKE Team, SIKE and SIDH Are Insecure and Should Not Be Used. Available online: https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/sike-team-note-insecure.pdf (accessed on 5 February 2023).
  12. Matsumoto, T.; Imai, H. Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. In Proceedings of the Advances in Cryptology—EUROCRYPT ’88, Davos, Switzerland, 25–27 May 1988; Barstow, D., Brauer, W., Brinch Hansen, P., Gries, D., Luckham, D., Moler, C., Pnueli, A., Seegmüller, G., Stoer, J., Wirth, N., et al., Eds.; Springer: Berlin/Heidelberg, Germany, 1988; pp. 419–453. [Google Scholar]
  13. Patarin, J. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88. In Proceedings of the Advances in Cryptology—CRYPT0’ 95, Santa Barbara, CA, USA, 27–31 August 1995; Coppersmith, D., Ed.; Springer: Berlin/Heidelberg, Germany, 1995; pp. 248–261. [Google Scholar]
  14. Patarin, J. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In Proceedings of the Advances in Cryptology—EUROCRYPT ’96, Saragossa, Spain, 12–16 May 1996; Maurer, U., Ed.; Springer: Berlin/Heidelberg, Germany, 1996; pp. 33–48. [Google Scholar]
  15. Patarin, J. The Oil and Vinegar Signature Scheme. Presented at the Dagstuhl Workshop on Cryptography, Dagstuhl, Germany, 22–26 September 1997. Transparencies. [Google Scholar]
  16. Kipnis, A.; Patarin, J.; Goubin, L. Unbalanced Oil and Vinegar Signature Schemes. In Proceedings of the Advances in Cryptology—EUROCRYPT ’99, Prague, Czech Republic, 2–6 May 1999; Stern, J., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 206–222. [Google Scholar]
  17. National Institute of Standards and Technology. Post-Quantum Cryptography. Available online: https://csrc.nist.gov/projects/post-quantum-cryptography (accessed on 1 December 2022).
  18. Casanova, A.; Faugère, J.; Macario-Rat, G.; Patarin, J.; Perret, L.; Ryckeghem, J. GeMSS: A Great Multivariate Short Signature. Available online: https://www-polsys.lip6.fr/Links/NIST/GeMSS_specification.pdf (accessed on 5 February 2023).
  19. Beullens, W.; Preneel, B. Field Lifting for Smaller UOV Public Keys. In Proceedings of the Progress in Cryptology-INDOCRYPT 2017—18th International Conference on Cryptology in India, Chennai, India, 10–13 December 2017; pp. 227–246. [Google Scholar] [CrossRef] [Green Version]
  20. Chen, M.S.; Hülsing, A.; Rijneveld, J.; Samardjiska, S.; Schwabe, P. From 5-Pass MQ-Based Identification to MQ-Based Signatures. In Proceedings of the Advances in Cryptology—ASIACRYPT 2016, Hanoi, Vietnam, 4–8 December 2016; Cheon, J.H., Takagi, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2016; pp. 135–165. [Google Scholar]
  21. Ding, J.; Schmidt, D. Rainbow, a New Multivariable Polynomial Signature Scheme. In Proceedings of the Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, 7–10 June 2005; pp. 164–175. [Google Scholar] [CrossRef]
  22. Ding, J.; Deaton, J.; Schmidt, K.; Zhang, Z. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. In Proceedings of the Advances in Cryptology—CRYPTO 2020, Santa Barbara, CA, USA, 17–21 August 2020; Micciancio, D., Ristenpart, T., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 279–298. [Google Scholar]
  23. Kales, D.; Zaverucha, G. Forgery Attacks on MQDSSv2.0. 2019. Available online: https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-2/official-comments/MQDSS-round2-official-comment.pdf (accessed on 5 February 2023).
  24. Moody, D.; Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Kelsey, J.; Liu, Y.; Miller, C.; Peralta, R.; Perlner, R.; et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process; NIST Interagency/Internal Report (NISTIR); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar] [CrossRef]
  25. Kipnis, A.; Shamir, A. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In Proceedings of the Advances in Cryptology—CRYPTO’ 99, Santa Barbara, CA, USA, 15–19 August 1999; Wiener, M., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 19–30. [Google Scholar]
  26. Faugère, J.C.; El Din, M.S.; Spaenlehauer, P.J. Computing Loci of Rank Defects of Linear Matrices Using GröBner Bases and Applications to Cryptology. In Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, Munich, Germany, 25–28 July 2010; Association for Computing Machinery: New York, NY, USA, 2010; Volume ISSAC ’10, pp. 257–264. [Google Scholar] [CrossRef]
  27. Bardet, M.; Bros, M.; Cabarcas, D.; Gaborit, P.; Perlner, R.; Smith-Tone, D.; Tillich, J.P.; Verbel, J. Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. In Proceedings of the Advances in Cryptology—ASIACRYPT 2020, Daejeon, Republic of Korea, 7–11 December 2020; Moriai, S., Wang, H., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 507–536. [Google Scholar]
  28. Tao, C.; Petzoldt, A.; Ding, J. Efficient Key Recovery for All HFE Signature Variants. In Proceedings of the Advances in Cryptology—CRYPTO 2021, Virtual Event, 16–20 August 2021; Malkin, T., Peikert, C., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 70–93. [Google Scholar]
  29. Beullens, W. Improved Cryptanalysis of UOV and Rainbow. In Proceedings of the Advances in Cryptology—EUROCRYPT 2021, Zagreb, Croatia, 17–21 October 2021; Canteaut, A., Standaert, F.X., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 348–373. [Google Scholar]
  30. Beullens, W. Breaking Rainbow Takes a Weekend on a Laptop. In Proceedings of the Advances in Cryptology—CRYPTO 2022, Santa Barbara, CA, USA, 15–18 August 2022; Dodis, Y., Shrimpton, T., Eds.; Springer Nature: Cham, Switzerland, 2022; pp. 464–479. [Google Scholar]
  31. Alagic, G.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Liu, Y.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; NIST Interagency/Internal Report (NISTIR); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022. [Google Scholar] [CrossRef]
  32. Beullens, W.; Chen, M.S.; Hung, S.H.; Kannwischer, M.J.; Peng, B.Y.; Shih, C.J.; Yang, B.Y. Oil and Vinegar: Modern Parameters and Implementations; Paper 2023/059; Cryptology ePrint Archive. 2023. Available online: https://eprint.iacr.org/2023/059 (accessed on 5 February 2023).
  33. Courtois, N.; Klimov, A.; Patarin, J.; Shamir, A. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In Proceedings of the Advances in Cryptology—EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; pp. 392–407. [Google Scholar] [CrossRef] [Green Version]
  34. Faugère, J.C. A New Efficient Algorithm for Computing Gröbner Bases (F4). J. Pure Appl. Algebra 1999, 139, 61–88. [Google Scholar] [CrossRef]
  35. Faugère, J.C. A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5). In Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, ISSAC ’02, Lille, France, 7–10 July 2002; Association for Computing Machinery: New York, NY, USA, 2002; pp. 75–83. [Google Scholar] [CrossRef]
  36. The RSA Challenge Numbers. Available online: https://web.archive.org/web/20010805210445/http://www.rsa.com/rsalabs/challenges/factoring/numbers.html (accessed on 18 November 2022).
  37. The Certicom ECC Challenge. Available online: https://www.certicom.com/content/dam/certicom/images/pdfs/challenge-2009.pdf (accessed on 18 November 2022).
  38. TU Darmstadt Lattice Challenge. Available online: https://www.latticechallenge.org (accessed on 18 November 2022).
  39. Yasuda, T.; Dahan, X.; Huang, Y.; Takagi, T.; Sakurai, K. A multivariate quadratic challenge toward post-quantum generation cryptography. ACM Commun. Comput. Algebra 2015, 49, 105–107. [Google Scholar] [CrossRef]
  40. Yasuda, T.; Dahan, X.; Huang, Y.; Takagi, T.; Sakurai, K. MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems; Paper 2015/275; Cryptology ePrint Archive. 2015. Available online: https://eprint.iacr.org/2015/275 (accessed on 1 December 2022).
  41. Buchberger, B. A Theoretical Basis for the Reduction of Polynomials to Canonical Forms. SIGSAM Bull. 1976, 10, 19–29. [Google Scholar] [CrossRef]
  42. Becker, T.; Weispfenning, V. Gröebner Bases, a Computationnal Approach to Commutative Algebra; Graduate Texts in Mathematics; Springer: New York, NY, USA, 1993. [Google Scholar]
  43. Joux, A.; Vitse, V. A Variant of the F4 Algorithm. In Proceedings of the Topics in Cryptology—CT-RSA 2011, San Francisco, CA, USA, 14–18 February 2011; Kiayias, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 356–375. [Google Scholar]
  44. Makarim, R.H.; Stevens, M. M4GB: An Efficient Gröbner-Basis Algorithm. In Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC 2017, Kaiserslautern, Germany, 25–28 July 2017; pp. 293–300. [Google Scholar] [CrossRef] [Green Version]
  45. Ito, T.; Shinohara, N.; Uchiyama, S. Solving the MQ Problem Using Gröbner Basis Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2021, E104.A, 135–142. [Google Scholar] [CrossRef]
  46. Bettale, L.; Faugère, J.C.; Perret, L. Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 2009, 3, 177–197. [Google Scholar] [CrossRef]
  47. Joux, A.; Vitse, V.; Coladon, T. OpenF4: F4 Algorithm C++ Library (Gröbner Basis Computations over Finite Fields). Available online: https://github.com/nauotit/openf4 (accessed on 17 May 2021).
  48. Yeh, J.Y.C.; Cheng, C.M.; Yang, B.Y. Operating Degrees for XL vs. F4/F5 for Generic MQ with Number of Equations Linear in That of Variables. In Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday; Fischlin, M., Katzenbeisser, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 19–33. [Google Scholar] [CrossRef]
  49. Buchberger, B. A criterion for detecting unnecessary reductions in the construction of Gröbner bases. In Proceedings of the Symbolic and Algebraic Computation, EUROSAM ’79, An International Symposium on Symbolic and Algebraic Manipulation, Marseille, France, 25–27 June 1979; Lecture Notes in Computer Science. Ng, E.W., Ed.; Springer: Berlin/Heidelberg, Germany, 1979; Volume 72, pp. 3–21. [Google Scholar] [CrossRef]
  50. Faugère, J.; Gianni, P.M.; Lazard, D.; Mora, T. Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering. J. Symb. Comput. 1993, 16, 329–344. [Google Scholar] [CrossRef] [Green Version]
  51. Gebauer, R.; Möller, H.M. On an installation of Buchberger’s algorithm. J. Symb. Comput. 1988, 6, 275–286. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Software architecture of our system.
Figure 1. Software architecture of our system.
Cryptography 07 00010 g001
Figure 2. Benchmark results over F 256 for m = n + 1 .
Figure 2. Benchmark results over F 256 for m = n + 1 .
Cryptography 07 00010 g002
Figure 3. Benchmark results over F 31 for m = n + 1 .
Figure 3. Benchmark results over F 31 for m = n + 1 .
Cryptography 07 00010 g003
Figure 4. Benchmark results for m = n + 1 over F 256 . (a) Experimental results of the ratio of critical pairs for a reduction to zero in the first half over F 256 and F 31 for m = n + 1 . (b) log 10 - log 10 graph of the ratio of critical pairs for a reduction to zero in the first half over F 256 and F 31 for m = n + 1 .
Figure 4. Benchmark results for m = n + 1 over F 256 . (a) Experimental results of the ratio of critical pairs for a reduction to zero in the first half over F 256 and F 31 for m = n + 1 . (b) log 10 - log 10 graph of the ratio of critical pairs for a reduction to zero in the first half over F 256 and F 31 for m = n + 1 .
Cryptography 07 00010 g004
Figure 5. Benchmark results for m = n + 1 .
Figure 5. Benchmark results for m = n + 1 .
Cryptography 07 00010 g005
Table 1. NIST Selected Algorithms 2022.
Table 1. NIST Selected Algorithms 2022.
FunctionalityAlgorithmUnderlying Security Problems
Public-key Encryption and Key-establishment AlgorithmsCRYSTALS-KYBER [4]Lattice-based
Digital signaturesCRYSTALS-Dilithium [4]Lattice-based
FALCON [5]Lattice-based
SPHINCS +  [6]Hash-based
Table 2. NIST Round-Four Submissions.
Table 2. NIST Round-Four Submissions.
FunctionalityAlgorithmUnderlying Security Problems
Digital signaturesBIKE [7]Lattice-based
Classic McEliece [8]Code-based
HQC [9]Code-based
SIKE *Isogeny-based
* Castryck and Decru found that SIKE is insecure [10,11].
Table 3. Benchmarking system architecture.
Table 3. Benchmarking system architecture.
CPUIntel(R) Xeon(R) Platinum 8180
Clock2.50 GHz
RAM1 TB (Non-Uniform Memory Access, NUMA)
Operating SystemCentOS 7.9
OpenF4 version1.0.1, F4::NB_THREAD=1
gcc4.8.5
compile option-std=c++11 -O3 -msse4.2 -funroll-loops -ftree-vectorize
Table 4. System architecture for computing a reduction to zero.
Table 4. System architecture for computing a reduction to zero.
CPUIntel(R) Xeon(R) Gold 6254
Clock3.10 GHz
RAM3 TB (NUMA)
Operating SystemUbuntu 18.04.01
OpenF4 version1.0.1, F4::NB_THREAD=1
gcc7.5.0
compile option-std=c++11 -O3 -msse4.2 -funroll-loops -ftree-vectorize
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kurokawa, T.; Ito, T.; Shinohara, N.; Yamamura, A.; Uchiyama, S. Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC. Cryptography 2023, 7, 10. https://doi.org/10.3390/cryptography7010010

AMA Style

Kurokawa T, Ito T, Shinohara N, Yamamura A, Uchiyama S. Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC. Cryptography. 2023; 7(1):10. https://doi.org/10.3390/cryptography7010010

Chicago/Turabian Style

Kurokawa, Takashi, Takuma Ito, Naoyuki Shinohara, Akihiro Yamamura, and Shigenori Uchiyama. 2023. "Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC" Cryptography 7, no. 1: 10. https://doi.org/10.3390/cryptography7010010

APA Style

Kurokawa, T., Ito, T., Shinohara, N., Yamamura, A., & Uchiyama, S. (2023). Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC. Cryptography, 7(1), 10. https://doi.org/10.3390/cryptography7010010

Article Metrics

Back to TopTop