Abstract

Because there is no multiplication of numbers in tropical algebra and the problem of solving the systems of polynomial equations in tropical algebra is NP-hard, in recent years some public key cryptography based on tropical semiring has been proposed. But most of them have some defects. This paper proposes new public key cryptosystems based on tropical matrices. The security of the cryptosystem relies on the difficulty of the problem of finding multiple exponentiations of tropical matrices given the product of the matrices powers when the subsemiring is hidden. This problem is a generalization of the discrete logarithm problem. But the problem generally cannot be reduced to discrete logarithm problem or hidden subgroup problem in polynomial time. Since the generating matrix of the used commutative subsemirings is hidden and the public key matrices are the product of more than two unknown matrices, the cryptosystems can resist KU attack and other known attacks. The cryptosystems based on multiple exponentiation problem can be considered as a potential postquantum cryptosystem.

1. Introduction

Contemporary public key cryptography relies mainly on two computational problems, integer factorization problem, and discrete logarithm problem. For example, Diffie–Hellman key exchange protocol and ElGamal encryption scheme are based on discrete logarithm problem [1, 2]. Shor proposed a quantum algorithm which can solve integer factorization problem and discrete logarithm problem in polynomial time on a quantum computer [3]. So, it is a research focus of cryptography to develop other new cryptosystems. The traditional cryptosystems are based on various commutative rings, such as finite field, residue class ring, and integer ring [48]. Many cryptologists hope to find other algebraic structures to build new public key cryptosystems.

In 2007, Maze, Monico, and Rosenthal proposed one of the first cryptosystems based on semigroups and semirings [9], using some ideas from [10], as well as from their previous article [11]. However, then it was broken by Steinwandt et al. [12]. Atani published a cryptosystem using semimodules over factor semirings [13]. Durcheva applied some idempotent semirings to construct cryptographic protocols [14]. A survey on semigroup action problem and its cryptographic applications was given by Goel, Gupta, and Dass [15].

Grigoriev and Shpilrain proved that the problem of solving the systems of min-plus polynomial equations in tropical algebra is NP-hard and suggested using a min-plus (tropical) semiring to design public key cryptosystem [16]. An obvious advantage of using tropical algebras as platforms is unparalleled efficiency because in tropical schemes, one does not have to perform any multiplications of numbers since tropical multiplication is the usual addition. But “tropical powers” of an element exhibit some patterns, even if such an element is a matrix over a tropical algebra. This weakness was exploited by Kotov and Ushakov to arrange a fairly successful attack on one of Grigoriev and Shpilrain’s schemes [17]. In 2019, Grigoreiv and Shpilrain improved the original scheme and proposed the public key cryptosystems based on semi-direct product of tropical matrix semiring [18]. However, some attacks on the improved protocols are recently suggested by Rudy and Monico [19], Isaac and Kahrobei [20], and Muanalifah and Sergeev [21]. In order to remedy Grigoreiv–Shpilrain’s protocols, Muanalifah and Sergeev suggested some modifications that use two classes of commuting matrices in tropical algebra [22]. But the authors also pointed out that their modifications cannot resist the generalized KU attack since the user’s secret matrix can still be expressed in the linear form of the power of the basic elementary matrix.

Our contribution: This paper provides a new public key cryptosystem based on tropical matrices. The security of the cryptosystem relies on the difficulty of the problem of finding multiple exponentiation of tropical matrices, which is a class of semigroup action problem proposed by Maze in [11]. The multiple exponentiation problem is also a generalization of the discrete logarithm problem. However, the problem generally cannot be reduced to discrete logarithm problem or hidden subgroup problem in polynomial time. Since the generating matrix of the used commutative subsemirings is hidden and the public key matrices are the product of more than two unknown matrices, the cryptosystems can resist KU attack and other known attacks. It is seemed that our cryptosystems based on multiple exponentiation problem can be considered as a potential postquantum cryptosystem.

The remainder of this paper is organized as follows. In Section 2, some preliminaries on tropical semiring are given. In Section 3, we define the multiple exponentiation problem of tropical matrices. In section 4, a key exchange protocol and a public key encryption scheme based on multiple exponentiation problem are presented. Finally, in Section 5 the possible attacks, parameter selection, and efficiency of the cryptosystems are discussed.

2. Preliminaries

Notation. In this paper, matrices are generally denoted by the capital letters. In order to facilitate future references, frequently used notations are listed below with their meanings.

is set of all non-negative integers; is polynomial semiring over ; is set of all matrices over ; is set of all polynomials of matrix ; is tropical semiring of integers ; is tropical polynomial semiring over ; is set of all tropical matrices over ; is set of all tropical polynomials of tropical matrix ; is the vector , where .

2.1. Tropical Semiring over Integer

A semiring is an algebraic structure similar to a ring, but without the requirement that each element must have an additive inverse.

Definition 1. (see [23]) A nonempty set with two binary operations + and is called a semiring if(1) is a commutative monoid with identity element 0;(2) is a monoid with identity element ;(3)Both distributive laws hold in ;(4) for all .If a semiring’s multiplication is commutative, then it is called a commutative semiring.

Definition 2. (see [16]) The tropical commutative semiring of integer is the set with two operations as follows:The special “” satisfies the equations:It is straightforward to see that is a commutative semiring. In fact, is the identity element of and 0 is the identity element of .
Just as in the classical case, we define the set of all tropical polynomials over in the indeterminate x. LetThe tropical polynomial operation and operation in are similar to the classical polynomial addition and multiplication; however, every “+” calculation has to be substituted by a operation of , and every “” calculation by a operation of . It is easy to verify that is a commutative semiring with respect to the tropical polynomial and operations.

2.2. Tropical Matrix Semiring over Integer

denotes the set of all matrices over . We can also define the tropical matrix and operations. To perform the operation, the elements of the resulting matrix are set to be equal to . The tropical matrix operation is similar to the usual matrix multiplication; however, every “+” calculation has to be substituted by a operation of , and every “” calculation by a operation of . is a noncommutative semiring with respect to the tropical matrix and operations.

Example 1. The role of the identity matrix is played by the matrix that has “0” s on the diagonal and elsewhere. Similarly, a scalar matrix would be a matrix with an element on the diagonal and elsewhere. Such a matrix commutes with any other square matrix (of the same size). Multiplying a matrix by a scalar amounts to multiplying it by the corresponding scalar matrix.

Example 2. Then, tropical diagonal matrices have something on the diagonal and elsewhere. Note that, in contrast to the “classical” situation, it is rather rare that a “tropical” matrix is invertible. More specifically, the only invertible tropical matrices are those that are obtained from a diagonal matrix by permuting rows and/or columns.
For a matrix , denotewhere means (m times). It is clear that is a commutative subsemiring of with respect to the tropical matrix addition and multiplication.

3. Multiple Exponentiation Problem of Tropical Matrices

3.1. Companion Matrix of Polynomial over Integer Ring

Let be non-negative integers and . The companion matrix of a monic polynomial is given by the matrix

Note that the entries of are all non-negative. Denote

It is easy to verify that is a commutative subsemiring of .

3.2. Matrix Semigroup Action on

Let be non-negative integers and . Let be the companion matrix of the polynomial . Let , , and . Consider an action of the multiplicative semigroup on the Cartesian product as below:where means ( times). By the commutativity of , it is easy to prove that “” is a semigroup action of on . In fact, a similar semigroup action was first defined by Maze in [11], where the action of on the group direct product was considered.

Example 3. Let . The companion matrix of is Let as follows.Let as follows.Let Then,

3.3. Multiple Exponentiation Problem of Tropical Matrices

Definition 3. Let be non-negative integers and . Let be the companion matrix of the polynomial . Let and . Suppose that , where . The multiple exponentiation problem of tropical matrices is to find , given , , and . (Note that is unknown.) For simplicity, we abbreviate the problem to “ME problem.”

Example 4. Given , , and as follows, we try to find such that .Finding such that is equivalent to finding such that By , we have . That is,As we know, most results in ordinary algebra do not hold in tropical algebra. Therefore, the certain properties of ordinary matrices like determinant, eigenvalues, and Cayley–Hamilton theorem cannot be used. But if or , we can reduce the problem to discrete logarithm problem.

Proposition 1. Suppose or , then the ME problem in Example 4 can be reduced to discrete logarithm problem in polynomial time.

Proof. Let . Then,Suppose . By solving a discrete logarithm problem in , we can get a positive integer m such that . So, the equations (15) are equivalent to the following equations.In this case, . By solving two discrete logarithm problems in , we can get two positive integers such that and . Therefore,It is clear that we can obtain by solving a system of linear equations.

Proposition 2. If there exists a component of such that , then the ME problem can be reduced to discrete logarithm problem in polynomial time.

If and , the problem of finding from equation (14) cannot be reduced to discrete logarithm problem. In fact, in Example 4, the conditions are indeed satisfied.

In order to resist some other potential method of solving ME problem, we stress the condition that is unknown. Since the matrix is unknown, we cannot express and as the polynomials of . (Even if is known, we have not found any effective method to find and .).

Remark 1. Assume that . Hence, in the example the total number of steps to solve ME problem by brute-force attack is .
Generally, assume that . Then, the total number of steps to solve ME problem by force attack is .

4. Public Key Cryptosystems Based on Tropical Matrix

In this section, we give a key exchange protocol similar to Diffie–Hellman protocol and a public key encryption scheme similar to ElGamal encryption scheme.

4.1. Key Exchange Protocol Based on Tropical Matrix

Let be non-negative integers and . Let be the companion matrix of the polynomial and such that there exists not a component of such that . The public parameters of the protocol are , . Key change protocol based on tropical matrix is the following.

4.1.1. Protocol 4.1.1
(1)Alice selects at random private integers in and computes Bob selects at random private integers in and computes(2)Alice computes and sends to Bob the matrix . And Bob computes and sends to Alice the matrix .(3)Alice computes

and Bob computeswhere “” is the matrix multiplication in .

Since is commutative, we have and . So, Alice and Bob share a common secret key.

Definition 4. Let be non-negative integers and . Let be the companion matrix of the polynomial . Let and . There exists not a component of such that . Suppose that and , where . The computational ME problem is to find the matrix vector such that , given , , , and . For simplicity, we abbreviate the problem to “CME problem.”

Proposition 3. An algorithm that solves ME problem can be used to solve CME problem.

Proposition 4. Finding the common secret key from the public information of Protocol 4.1.1 is equivalent to solving the CME problem.

4.2. Public Key Encryption Scheme Based on Tropical Matrix
4.2.1. Scheme 4.2.1

Key generation.

Let be non-negative integers and . Let be the companion matrix of the polynomial . Let and . There exists not a component of such that . The public parameters are , . The key generation center chooses at random integers and computes

The public key of Alice is . The private key of Alice is (or ).

Encryption.

Bob wants to send a plaintext messages to Alice.(1)Bob chooses at random integers in and computes(2)Bob computes as a part of ciphertext.(3)Bob computes as the rest of the ciphertext, where “+” is the ordinary integer matrix vector addition.(4)Bob sends the ciphertext to Alice.

Decryption.

Alice receives the ciphertext and tries to decrypt it.(1)Using her private key , Alice computes .(2)Alice computes , where “-” is the ordinary integer matrix vector subtraction.

Since

Alice gets the plaintext messages .

Definition 5. Let be non-negative integers and . Let be the companion matrix of the polynomial . Let and . Suppose and , where . Let . The decisional ME problem is to decide whether , given , , , , and . For simplicity, we abbreviate it to “DME problem.”

Proposition 5. An algorithm that solves CME problem can be used to solve DME problem.

Theorem 1. An algorithm that solves DME problem can be used to decide the validity of the ciphertexts of Scheme 4.2.1, and an algorithm that decides the validity of the ciphertexts of Scheme 4.2.1 can be used to solve DME problem.

Proof. Suppose first that the algorithm can decide whether a decryption of Scheme 4.2.1 is correct. In other words, when given the inputs , , , , , the algorithm outputs “yes” if is the decryption of and outputs “no” otherwise. Let us use to solve the DME problem. Suppose you are given , , , , , and , and you want to decide whether or not . Let and , where is the zero matrix of . Input all of these into . Note that in the present setup, is the secret key. The correct decryption of isTherefore, outputs “yes” exactly when is the same as , namely, when . This solves the decision DME problem.
Conversely, suppose an algorithm can solve the DME problem. This means that if you give inputs , , , , and , then outputs “yes” if and outputs “no” if not. Let be the claimed decryption of the ciphertext . Input as . Note that is the correct plaintext for the ciphertext if and only if , which happens if and only if . Therefore, is the correct plaintext if and only if . Therefore, with these inputs, outputs “yes” exactly when is the correct plaintext.

Theorem 2. An algorithm that solves CME problem can be used to decrypt the ciphertexts of Scheme 4.2.1, and an algorithm that decrypts the ciphertexts of Scheme 4.2.1 can be used to solve CME problem.

Proof. If we have an algorithm that can decrypt all ciphertexts of Scheme 4.2.1, then input and . Take any vector for . Then, outputsTherefore, yields the solution to the CME problem.
Conversely, suppose we have an algorithm that can solve CME problem. If we have an ciphertext , then we input and . Then, outputs . Since , we obtain the plaintext □.

5. Possible Attacks, Parameter Selection, and Efficiency

5.1. Possible Attacks
(1)Brute-force attack. Suppose that and . It is clear that attacker has choices to choose . So, the parameters and must satisfy .(2)Tropical matrix decomposition attack.Suppose that . If attacker can find such thatThen he can get the shared key by and the public information. He can perform the following steps to find .(i)Factor , where .(ii)Find such that by solving discrete logarithm problem in .(iii)Verify whether or not . If not, go to (i).However, it is hard to factor , where and . Generally, it is NP-hard by Shitov [24].(3)KU attack. In our cryptosystems, the used commutative subsemiring in our cryptosystems is the subsemiring and is unknown. This is different from that in literature [16]. They used two public tropical matrices and then adopted the commutative subsemiring , . Let , , and . The security of the cryptosystem relies on the difficulty of the problem of finding and such that . Because the secrete matrix can be expressed as a polynomial of . Kotov and Ushakov designed an efficient algorithm to attack the tropical key exchange protocol [17]. In our cryptosystems, since attacker does not know , the KU attack will not work. To find from public information, attacker is faced with the following problem.Given , find such thatwhere and are all unknown. It is clear that this is a problem of solving systems of min-plus polynomial equations which is NP-hard [16].Even if N is obtained by attacker. It seems also hard to find the private key matrix A from the public key . As we know, KU attack can only decompose a tropical matrix into the product of two matrices such as . If , each component matrix of is the product of matrices more than two. In this case, KU attack will also not work.(4)Generalized KU attack. In order to remedy Grigoreiv–Shpilrain’s protocols, Muanalifah and Sergeev suggested some modifications that use two types of matrices that are Jones matrices and Linde–de la Puente matrices [22]. But the authors also pointed out that their modifications cannot resist the generalized KU attack which can also decompose the public matrix into the product of two Jones matrices (Linde–de la Puente matrices) expressed as the linear form of the tropical basic elementary matrix. In our cryptosystems, if , then each component matrix of is the product of matrices more than two. In this case, the generalized KU attack will also not work for our cryptosystems.(5)RM attack. Grigoreiv and Shpilrain [18] improved the original scheme and proposed the public key cryptosystems based on semi-direct product of tropical matrix semiring. But the first component of semi-direct product multiplication contains the addition of tropical matrix. Because the addition operation of tropical matrix is idempotent, the powers of semi-direct product multiplication have partial order preservation. Using this property, Rudy and Monico designed a simple binary search algorithm and cracked the cryptosystem in [18]. In our cryptosystems, has not the addition operation of tropical matrix. So, our cryptosystems can resist this attack.(6)Quantum attack. ME problem is the generalization of the discrete logarithm problem. As we know, the discrete logarithm problem can be reduced in polynomial time to hidden subgroup problem which can be solved in polynomial time by the generalized Shor quantum algorithm [25]. If the semigroup action is derived from a module over ring, there exist the similar reduction algorithms for the corresponding semigroup action problem. When the semigroup action is induced by a semimodule over semiring that cannot be embedded in a module, no effective reduction algorithm has been found for the corresponding semigroup action problem. It is easy to verify that “” is a semigroup action derived from the semimodule over the semiring and ME problem is indeed the corresponding semigroup action problem induced by the semimodule. Since the semimodule cannot be embedded in a module, ME problem cannot be reduced in polynomial time to hidden subgroup problem generally.

Table 1 provides the comparison among relevant tropical cryptographic schemes.

5.2. Parameter Selection and Efficiency

By Proposition 2, if there exists a component of such that , then the ME problem can be reduced to discrete logarithm problem in polynomial time. To avoid this case, needs to satisfy the condition that there exists not a component of such that . Note that N is unknown and . We can choose such thatwhere are integers selected randomly in . Then, the number of possible is . Experiments show that it is easy to generate satisfying the above condition.

Generally, for , the monogenic subsemigroup is infinite. But for many tropical matrices , there are non-negative integers and integer e such that . If are the smallest non-negative integers such that , then l is called the pseudo-index of the matrix N and m is called the pseudo-period of the matrix N. If the pseudo-indexes and the pseudo-periods of N and are all small, then there may be some potential heuristic attacks. The pseudo-index of tropical matrix increases with the increase of k. Our experiments show that it is feasible to generate N and with pseudo-indexes more than (). In and , the entries of A, B are the exponents of . Since , the entries of C and s should not be too large. We recommend and

Then, the entries of A, B are in and the entries of AB are less than . To resist some potential heuristic attacks, we recommend the parameters satisfying .

If we use the “square-multiply” algorithm to compute the power of tropical matrix, then computing requires tropical matrix multiplications. The numbers of bit operations required for multiplying two tropical matrices of order k are . So, the total number of bit operations required for calculating is .

The size of secret key is less than bits. Suppose the entries of the matrices N are in the range and where . Then, the size of public key is less than bits.

Select and . Table 2 provides the upper bounds of the size of secrete key and public key for different values of such that and . And in Table 2, we also compare the running time of the operation under different parameters (experimental platform: Intel(R) Core(TM) i7-4700MQ CPU @ 2.40 GHz).

6. Conclusion and Further Research

This paper proposes a new key exchange protocol and a new public key encryption scheme based on multiple exponentiation problem of tropical matrices which can resist all known attacks. Since the generating matrix N of the used commutative subsemirings is hidden and the public key matrices are the product of more than two unknown matrices, the cryptosystems can resist KU attack and generalized KU attack. There is no addition of tropical matrix in . The attack method proposed by Rudy and Monico does not work for ME problem. As a semigroup action problem derived from semimodules on semirings, ME problem cannot be reduced to hidden subgroup problem in polynomial time. Our cryptosystem can be considered as a potential postquantum cryptosystem.

The algebraic properties of pseudo-index and pseudo-period of tropical matrix have not been clearly studied. We can only use enumeration method to find the pseudo-index and pseudo-period of tropical matrix and generate tropical matrices with pseudo-index less than 900. Therefore, in order to prevent potential heuristic attacks, the dimension n of needs to be large . However, this makes the operation efficiency of low. If we can generate effectively tropical matrices with large pseudo-index or large pseudo-period, we can choose small n to improve the operation efficiency.Future works worth studying include the following.(1)Study the properties of pseudo-index and pseudo-period of tropical matrix. If a fast algorithm of generating tropical matrix with large pseudo-index (or pseudo-period) and small order can be found, then the smaller n and k can be chosen. This will improve the computational efficiency of our cryptosystem.(2)Use other commutative tropical matrix semirings instead of . For example, we can design a public key cryptosystem based on ME problem of Jones matrix or Linde–de la Puente matrix. ME problem of commutative matrices over other semirings can also be considered.(3)ME problem of tropical matrices is a generalization of the discrete logarithm problem. If we regard as , then ME problem corresponds to discrete logarithm problem, CME problem corresponds to CDH problem, and DME problem corresponds to DDH problem. We believe that other cryptographic applications based on ME problem are also feasible. For example, we can consider the digital signature schemes and identity authentication schemes and other cryptographic applications based on CME assumption or DME assumption, such as [2628]. However, as we point out previously, the cryptographic system based on ME problem over tropical matrix has no high computational efficiency, since the number of matrices n and the order k of the matrix are large in order to ensure security. It may limit some possible application scenarios.

Data Availability

The data underlying the results presented in the study are available within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (no. 61462016) and the Science and Technology Foundation of Guizhou Province Awardid: QIANKEHEJICHU-ZK [2021] Ordinary 313.