Accueil     Publications     Presentations     Themes
List of publications |
Computing modular correspondances for abelian varieties. Jean-Charles Faugère, David Lubicz, Damien Robert Journal of Algebra, 2011
The aim of this paper is to give a higher dimensional equivalent of the classical modular polynomials $\Phi_\ell(X,Y)$. If $j$ is the $j$-invariant associated to an elliptic curve $E_k$ over a field $k$ then the roots of $\Phi_\ell(j,X)$ correspond to the $j$-invariants of the curves which are $\ell$-isogeneous to $E_k$. Denote by X_0(N) the modular curve which parametrizes the set of elliptic curves together with a $N$-torsion subgroup. It is possible to interpret \Phi_\ell(X,Y) as an equation cutting out the image of a certain modular correspondence X_0(\ell) \rightarrow X_0(1) \times X_0(1) in the product X_0(1) \times X_0(1). Let g be a positive integer and \overline{n} \in \N^g. We are interested in the moduli space that we denote by \mathcal{M}_{\overline{n}} of abelian varieties of dimension g over a field k together with an ample symmetric line bundle \pol and a theta structure of type \overline{n}. If \ell is a prime and let \overline{\ell}=(\ell, \ldots , \ell), there exists a modular correspondence \mathcal{M}_{\overline{\ell n}} \rightarrow \mathcal{M}_{\overline{n}} \times \mathcal{M}_{\overline{n}}. We give a system of algebraic equations defining the image of this modular correspondence. We describe an algorithm to solve this system of algebraic equations which is much more efficient than a general purpose Groebner basis algorithms. As an application, we explain how this algorithm can be used to speed up the initialisation phase of a point counting algorithm. |
|
Efficient Pairing Computation With Theta Functions. ANTS IX, 2010
In this paper, we present a new approach based on theta functions to compute Weil and Tate pairings. A benefit of our method, which does not rely on the classical Miller's algorithm, is its generality since it extends to all abelian varieties the classical Weil and Tate pairing formulas. In the case of dimension $1$ and $2$ abelian varieties our algorithms lead to implementations which are efficient and naturally deterministic. We also introduce symmetric Weil and Tate pairings on Kummer varieties and explain how to compute them efficiently. We exhibit a nice algorithmic compatibility between some algebraic groups quotiented by the action of the automorphism $-1$, where the $\Z$-action can be computed efficiently with a Montgomery ladder type algorithm. |
|
On the security of oscillator-based random number generators. Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux Journal of Cryptology, 2010
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a formal assessment of security, in comparison to what is achieved for conventional cryptography. In this work, we present a comprehensive statistical study of TRNGs based on the sampling of an oscillator subject to phase noise (a.k.a. phase jitters). This classical layout, typically instantiated with a ring oscillator, provides a simple and attractive way to implement a TRNG on a chip. Our mathematical study allows one to evaluate and control the main security parameters of such a random source, including its entropy rate and the biases of certain bit patterns, provided that a small number of physical parameters of the oscillator are known. In order to evaluate these parameters in a secure way, we also provide an experimental method for filtering out the global perturbations affecting a chip and possibly visible to an attacker. Finally, from our mathematical model, we deduce specific statistical tests applicable to the bit stream of a TRNG. In particular, in the case of an insecure configuration, we show how to recover the parameters of the underlying oscillator. |
|
A point counting algorithm using cohomology with compact support. Gweltaz Chatel, David Lubicz LMS Journal of Computation and Mathematics , 2009.
We describe an algorithm to count the number of rational points of an hyperelliptic curve defined over a finite field of odd characteristic which is based upon the computation of the action of the Frobenius morphism on a basis of the Monsky-Washnitzer cohomology with compact support. This algorithm follows the vein of a systematic exploration of potential application of cohomology theories to point counting. Our algorithm decomposes in two steps. A first step which consists in the computation of a basis of the cohomology and then a second step to obtain a representation of the Frobenius morphism. Neglecting logarithmic terms, we achieve a O(g^4 n^3) time complexity and O(g^3 n^3) memory complexity where g is the genus of the curve and n is the absolute degree of its base field. We give a detailed complexity analysis of the algorithm as well as a proof of correctness. |
|
The arithmetic of characteristic 2 Kummer surface. Pierrick Gaudry, David Lubicz Finite Fields and Applications, 2009.
The purpose of this paper is a description of a model of Kummer surfaces in characteristic 2, together with the associated formulas for the pseudo-group law. Since the classical model has bad reduction, a renormalization of the parameters is required, that can be justified using the theory of algebraic theta functions. The formulas that are obtained are very efficient and may be usefull in cryptographic applications. We also show that applying the same strategy to elliptic curves gives Montgomery-like formulas in odd characteristic that are of some interest, and we recover already known formulas by Stam in characteristic 2. |
|
A p-adic quasi-quadratic point counting algorithm. Robert Carls, David Lubicz Int. Math. Res. Not., 2008.
In this article we give an algorithm for the computation of the number of rational points on the Jacobian variety of a generic ordinary hyperelliptic curve defined over a finite field $\F_q$, which has $q$ elements, with time complexity $O(n^{2+o(1)})$, where $n=\log(q)$. In the latter complexity estimate the genus and the characteristic are assumed as fixed. We provide a detailed complexity analysis of the algorithm. A proof of the correctness will be published elsewhere because it is beyond the scope of this article. Our algorithm forms a generalization of both, the AGM algorithm of J.-F. Mestre and the canonical lifting method of T. Satoh. We canonically lift a certain arithmetic invariant in terms of theta constants. The theta null values are computed with respect to a semi-canonical product theta structure of level $2p$ where $p=\mathrm{char}(\F_q)>2$. The results of this paper suggest a global positive answer to the question whether there exists a quasi-quadratic time algorithm for the computation of the number of rational points of an ordinary abelian variety defined over a finite field.
|
|
Attribute-Based Broadcast Encryption Scheme Made Efficient. David Lubicz, Thomas Sirvent Proc. of Advances in Cryptology- Africacrypt'08, 2008, Casablanca
In this paper, we describe a new broadcast encryption scheme for stateless receivers. The main difference between our scheme and the classical ones derived from the complete subtree paradigm is that the group of privileged users is described by attributes. Actually, some real applications have been described where the use of a more adaptable access structure brings more efficiency and ease of deployment. On the other side, the decryption algorithm in so far existing attribute-based encryption schemes adapted for broadcast applications is time-consuming for the receiver, since it entails the computation of a large number of pairings. This is a real drawback for broadcast applications where most of the technological constraints are on the receiver side. Our scheme can be viewed as a way to benefit at the same time from the performance of decryption of the classical broadcast schemes and the management easiness provided by the use of a more adaptable data structure based on attributes. More precisely, our scheme allows one to select or revoke users by sending ciphertexts of linear size with respect to the number of attributes, which is in general far less than the number of users. We prove that our scheme is fully collusion secure in the generic model of groups with pairing.
|
|
Pseudo-random groups and related problems. David Lubicz, Thomas Sirvent Identity-Based Cryptography, M. Joye et G. Neven,Cryptology and Information Security Series, IOS Press, 2008
Family of groups with pairing are now considered as standard building blocks for cryptographic primitives. The security of schemes based on such groups relies on some hypotheses related to the discrete logarithm problem. As these hypotheses are not proved, one would like to have some positive security argument for these problems. It is usual to assess their security in the so called generic group model introduced by Nechaev and Shoup. The relevance of this model is nevertheless subject to criticisms: in particular, the fact that the answer to any fresh query is a random bit string is not what one expects from a usual group law. In order to improve this model, we introduce the notion of pseudo-random family of groups. We show how to reduce the security of a problem in a pseudo-random family of groups to the security of the same problem in the generic group model and the security of an underlying strong pseudo-random family of permutations. |
|
Higher dimensional 3-adic CM construction. Robert Carls, David Kohel, David Lubicz J. of Algebra, 319(4)971-2006, 2008.
We outline a method for the construction of genus $2$ hyperelliptic curves over small degree number fields whose Jacobian has complex multiplication and good ordinary reduction at the prime $3$. We prove the existence of a quasi-quadratic time algorithm for computing a canonical lift in characteristic $3$ based on equations defining a higher dimensional analogue of the classical modular curve $X_0(3)$. We give a detailed description of our method in the special case of genus $2$. |
|
On a classification of finite statistical tests. David Lubicz Adv. Math. of Com., 1(4):509-524, 2007.
Statistical tests of random sequences are often used in cryptography in order to perform some routine checks for random and pseudo-random number generators. Most of the test suites available are based on the theory of hypothesis testing which allows one to decide whether a sample has been drawn following a certain distribution. In this article, we develop a theoretical foundation of statistical tests of random sequences and hypothesis testing with a focus on cryptographic applications and we draw some interesting practical consequences. |
|
A quasi-quadratic time algorithm for hyperelliptic curve point counting. Reynald Lercier, David Lubicz. Ramanujan J., 12(3):399-423, 2006.
We describe an algorithm to compute the cardinality of Jacobians of ordinary hyperelliptic curves of small genus over finite fields F_2^n with cost O(n^{2+o(1)}). This algorithm is derived from ideas due to Mestre. More precisely, we state the mathematical background behind Mestre's algorithm and develop from it a variant with quasi-quadratic time complexity. Among others, we present an algorithm to find roots of a system of generalized Artin-Schreier equations and give results that we obtain with an efficient implementation. Especially, we were able to obtain the cardinality of curves of genus one, two or three in finite fields of huge size. |
|
Counting points in elliptic curves over finite fields of small characteristic in quasi quadratic time. Reynald Lercier, David Lubicz Advances in cryptology-EUROCRYPT 2003, 360-373, Lecture Notes in Comput. Sci., 2656, Springer, Berlin, 2003.
Let $p$ be a small prime and $q=p^n$. Let $E$ be an elliptic curve over $\F_q$. We propose an algorithm which computes without any preprocessing the $j$-invariant of the canonical lift of $E$ with the cost of $O(\log n)$ times the cost needed to compute a power of the lift of the Frobenius. Let $\mu$ be a constant so that the product of two $n$-bit length integers can be carried out in $O(n^\mu)$ bit operations, this yields an algorithm to compute the number of points on elliptic curves which reaches, at the expense of a $O(n^{\frac{5}{2}})$ space complexity, a theoretical time complexity bound equal to $O(n^{\max(1.19, \mu)+\mu+\frac{1}{2}}\log n)$. When the field has got a Gaussian Normal Basis of small type, we obtain furthermore an algorithm with $O(\log(n)n^{2\mu})$ time and $O(n^2)$ space complexities. From a practical viewpoint, the corresponding algorithm is particularly well suited for implementations. We outline this by a 100002-bit computation. |
|
Pencils of curves defined by a regular function. David Lubicz Bull. Sci. Math. 125,no. 2, 139-160, 2001.
In this article, we generalize many results on the topology of a polynomial function, $f:C^2-> C$ in the case of a regular function $f:U-> C$. |
|
Description of the cohomology of the complement of a nonreducible divisor. David Lubicz Bull. Sci. Math. 124,no. 6, 447-458, 2000.
In this paper, we study the topology of the complement of an algebraic curve in $\proj_{\comp}^2$ by giving an explicit basis for the cohomology with complex coefficients. In particular, we obtain a upper bound for the pole order of such a basis which is better than the one describe in the works of P. Griffiths. We provide some examples in order to illustrate some results of comparison between the pole filtration and the Hodge filtration of the cohomology with complex coefficients. |
|
Linear Algebra over $\Z_p[[u]]$ and related rings} . Xavier Caruso, David Lubicz preprint
Let R be a complete discrete valuation ring, S=R[[u]] and $n$ a positive integer. The aim of this paper is to explain how to compute efficiently usual operations such as sum and intersection of sub-$\mS$-modules of $\mS^n$. As $\mS$ is not principal, it is not possible to have a uniform bound on the number of generators of the modules resulting of the preceding operations. We explain how to mitigate this problem, following an idea of Iwasawa, by computing an approximation of the result of this operation up to a quasi-isomorphism. In the course of the analysis of the $p$-adic and $u$-adic precision of the computations, we have to introduce more general coefficient rings that may be interesting for their own sake. Being able to perform linear algebra operations modulo quasi-isomorphism with $\mS$-modules has applications in Iwasawa theory and $p$-adic Hodge theory. |
|
Un algorithme de calcul de réseaux dans les représentations semi-stables. Xavier Caruso, David Lubicz preprint
The aim of this paper is to obtain an algorithm the complexity of which is polynomial in order to compute the semi-simplified modulo p of a semi-stable Q_p-representation of the absolute Galois group of a p-adic field. In order to do so, we make an essential use of the p-adic Hodge theory and in particulier of the theory of Breuil-Kisin modules. |
|
A generalisation of Miller's algorithm and applications to pairing computations. David Lubicz, Damien Robert preprint
In this paper we use the theory of theta functions to generalise to all abelian varieties the usual Miller's algorithm to compute a function associated to a principal divisor. We also explain how to use the Frobenius morphism on abelian varieties defined over a finite field in order to shorten the loop of the Weil and Tate pairings algorithms. This extend preceding results about Ate pairings to all abelian varieties. Then we use the two preceding ingredients to obtain a variant of optimal pairings on abelian varieties. We compare in term of performance the resulting algorithms to the algorithms already known in the genus one and two case. |
|
Towards an oscillator based TRNG with a certified entropy rate. David Lubicz, Nathalie Bochard preprint
We describe a practical and efficient method to measure the entropy rate of a TRNG based on free running oscillators that does not require to output and analyse the clock signals with an external device. It rather relies on very simple computations, that can be embedded into any FPGA or ASIC with minor adaptation of classical designs. It can be used for the calibration of an oscillator based TRNG or to certify the entropy rate of a TRNG while in operation. Our approach, which is inspired by the coherent sampling method, works under the general hypothesis that the phase jitter is small compared to the period of the oscillators. In this case, we show that it is possible to measure the relative phase between two oscillators with a precision far higher than the time resolution given by the period of any internal clock signal. We use this observation to recover, under some reasonable heuristics, the distribution of the random walk component of the phase jitter from which it is possible to compute a lower bound of the entropy rate of the TRNG. Our method has been thoroughly tested with simulations and hardware implementations. We draw some conclusions and recommendations for a reliable implementation of TRNGs to be used for cryptographic applications. |
|
A Secure Key Management Interface with Asymmetric Cryptography. Marion Daubignard, David Lubicz, Graham Steel preprint
Cryptographic devices such as Hardware Security Modules are only as secure as their application programming interfaces (APIs) that offer cryptographic functionality to the outside world. Design flaws and implementation errors in security APIs have been shown to cause vulnerabilities that may leak secrets such as keys and PINs. Ideally, we would like to design such interfaces in such a way that we can formally prove security properties, even in the presence of some corrupted keys. In this work, we propose the first such provably secure interface to support asymmetric key operations for key management: Cachin and Chandran's secure token interface supports asymmetric key operations only for encrypting and signing data, but not for managing keys, while Cortier and Steel handle only symmetric keys. Due to the fact that anyone can encrypt under a public key, in order to secure integrity of the keys under management, we must consider confidentiality and integrity properties separately and provide support for classical operations of public key infrastructure (e.g. certification of public keys). |
|
Random numbers generation and testing. Tanja Lange, David Lubicz, Andrew Weigl. Handbook of elliptic and hyperelliptic curve cryptography, 715--735, Discrete Math. Appl. (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006.
|
|
Point counting on elliptic and hyperelliptic curves. Reynald Lercier, David Lubicz, Frederik Vercauteren. Handbook of elliptic and hyperelliptic curve cryptography, 407--453, Discrete Math. Appl. (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006.
|
|
Cohomological background on point counting. David Lubicz, Frederik Vercauteren. Handbook of elliptic and hyperelliptic curve cryptography, 133--141, Discrete Math. Appl. (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006.
|
|
Background on $p$-adic numbers. David Lubicz. Handbook of elliptic and hyperelliptic curve cryptography, 39--44, Discrete Math. Appl. (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006.
|
|
Algebraic background. Christophe Doche, David Lubicz. Handbook of elliptic and hyperelliptic curve cryptography, 19--37, Discrete Math. Appl. (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006.
|
|
Quelques aspects algorithmiques de la cryptographie. David Lubicz. [French] Mémoire d'Habilitation à Diriger des Recherches.
Asymmetric cryptography, invented in the seventies by W. Diffie and M. Hellman, brings a large number of features to the more classical symmetric cryptography which are particularly interesting for practical applications. Most of the time, its operation relies on the computational hardness of some problems coming from number theory. From this, it is possible to deduce one-way functions, trap-door functions and then design and prove by reduction protocols to achieve a variety of security objectives among which the most common are encryption or digital signature. A problem classically used in asymmetric cryptography is the discrete logarithm problem which is for instance a corner stone for all the elliptic curve cryptography. The discrete logarithm problem allows one to design supposed to be one-way functions from a family of groups enjoying certain good properties. In the dissertation, we present some techniques to define, represent and compute family of groups to be used in discrete logarithm based cryptosystems. Security and performance issues leads us to revisit from a computational point of view some concepts developed during the sixties for the purpose of number theory and arithmetic geometry : complex multiplication, algebraic theta functions, rigid cohomology and Serre-Tate theory are worth mentioning. |
|
Les tests statistiques en cryptographie. David Lubicz. [French] preprint.
The object of this document is to give a definition of what is a random sequence and to justify tests in order to ensure that a random number generator or a pseudo-random number generator is working properly. |
|
Mémoire de thèse.. David Lubicz. [French] Thèse de l'Université Bordeaux I.
In this thesis, we are interested by the topology of the complement $U=\proj^2 \backslash C$, which is a smooth affine surface. In the first chapter, we decuce explicit bases for cohomology groups with complex coefficients, $H^i(U)$ with $i=1,2$, knowing bases for thes groups $H^i(U_j)$ where $U_j=\proj^2 \backslash C_j$. In the second chapter, we generalize a lot of results about the topology of a polynomial fonction, $f: \comp^2 \rightarrow \comp$ in the case of a regular fonction $f:U \rightarrow \comp$. |
|