Abstract
This paper is a continuation of our previous publication of enhanced matrix power function (MPF) as a conjectured one-way function. We are considering a problem introduced in our previous paper and prove that tis problem is NP-Complete. The proof is based on the dual interpretation of well known multivariate quadratic (MQ) problem defined over the binary field as a system of MQ equations, and as a general satisfiability (GSAT) problem. Due to this interpretation the necessary constraints to MPF function for cryptographic protocols construction can be added to initial GSAT problem. Then it is proved that obtained GSAT problem is NP-Complete using Schaefer dichotomy theorem. Referencing to this result, GSAT problem by polynomial-time reduction is reduced to the sub-problem of enhanced MPF, hence the latter is NP-Complete as well.
1. Introduction
It is very natural to look for a new conjectured one-way functions (OWFs) for cryptographic applications in connection with new challenges caused by quantum cryptanalysis. This paper is a continuation of research in this field and is dealing with so called matrix power function (MPF). Some cryptographic primitives were built on the basis that MPF is a conjectured OWF in [1,2,3,4,5]. Furthermore, some results were published considering the security of presented primitives in [6,7,8]. The security of these primitives is based on the complexity of MPF inversion named as MPF problem.
So far, it is thought that OWF security based on the NP-Complete problem is not vulnerable to the quantum cryptanalysis, while the cryptosystems based on conjectured OWFs such as factoring and discrete logarithm problems are vulnerable due to [9]. Therefore, it is very desirable to try to prove NP-Completeness of MPF problem. In [6] the NP-Completeness of a more general problem named as multivariate quadratic power problem is presented. However, the question of NP-Completeness of MPF problem remained open so far.
In [10] our efforts were directed toward the increasing expectable complexity of MPF problem by choosing more complicated algebraic structures for MPF definition but at the same time preserving the necessary properties for the cryptographic primitives construction. In that paper, we presented a key agreement protocol in Section 2, Construction 1 as well as an example of its realization with artificially small parameters in Section 6.
In this paper we present a proof of NP-Completeness of sub-problem of enhanced MPF problem previously considered in [10]. The notion of sub-problem is defined as follows:
Definition 1.
The decision problem is a sub-problem of problem if every assignment to input values, which provides the answer YES to problem , also implies the answer YES to the problem .
The proof is based on the duality of multivariate quadratic MQ problem interpretation as a system of MQ equations over [11,12] and according to Schaefer dichotomy theorem [13] as a general satisfiability (GSAT) problem.
The main benefit of such approach is the opportunity to include some constraints to MPF necessary to construct cryptographic primitives as an additional GSAT equations.
The proof is based on proving that this GSAT is NP-Complete and on polynomial-time reduction from GSAT to the sub-problem of enhanced MPF problem.
2. Matrix Power Function
MPF was first introduced in [4]. To be self-contained, we present here MPF in the following way:
Definition 2.
Symbolically MPF corresponds to matrix powered by matrix on the left and by matrix on the right with MPF value equal to matrix and is expressed in the following way
The matrix W that is powered is named the base matrix and the matrices X and Y that are powering the base matrix are named power matrices. In general, we define the base matrix over the multiplicative (semi)group and power matrices over some numerical (semi)ring . We call semigroup a platform (semi)group, which according to the MPF definition, is multiplicative, and –an exponent (semi)ring. The appropriate matrix semigroups and matrix semiring contain base matrices and power matrices respectively.
The exact MPF definition depends on the type of sets over which matrices are defined.
In [3] authors proved, that if platform semigroup and power semiring are commutative, then the following associative properties of MPF takes place:
Definition 3.
MPF is one-side associative, (left-side and right-side associative, respectively) if the following identities hold:
Definition 4.
MPF is two-side associative if the following identities hold:
In [3] authors proved, that if platform semigroup and power semiring are commutative, then MPF is one and two-side associative.
It follows from Equation (1), that in general, MPF is a function
Definition 5.
The direct MPF value computation is to find matrix E, when matrices are given.
Definition 6.
The inverse MPF value computation is to find matrices X and Y, when matrices W and E are given.
Definition 7.
MPF problem is its inverse value computation.
Definition 8.
MPF presented in 1 is a candidate one-way function (OWF) if the following necessary (but not sufficient) conditions are satisfied:
- 1.
- The direct MPF value computation is easy;
- 2.
- The MPF problem is polynomially equivalent to a certain hard problem with not known polynomial time algorithm.
Assume, that the base matrix W in Expression 1 is defined over a platform semigroup denoted by and the power matrices X and Y are defined over a power semiring denoted by . We denote the MPF problem defined by these structures by MPF. Assume, that power matrices X and Y have to satisfy some constrains denoted by . In this case we denote the MPF problem by MPF.
To build cryptographic primitives, e.g., key agreement protocol, based on MPF the following additional property must be satisfied: square matrices of m-th order X and Y defined over the power semiring must be elements of two subsets and of commuting matrices in respectively, i.e., for any and the following identities take place
This defines a constrained MPF that we previously denoted by MPF. Further we will use the single subset of commuting matrices in , namely the subset of circulant matrices i.e., matrices of the following general form [14]:
Any circulant matrix X can be represented by its column vector , which transposed form is expressed by the following row vector . If MPF satisfies the conditions of Definition 8, then the following secret-key agreement protocol can be executed as proposed in [10]:
Both parties agree on a public information: the modified medial semigroup and a public base matrix W with its entries randomly chosen from . Alice and Bob can agree on a common key as follows:
- Alice chooses two secret circulant matrices X and Y at random of size m. Using these matrices she computes the MPF value and sends it to Bob;
- Bob chooses two secret circulant matrices U and V at random of size m. Using these matrices he computes the MPF value and sends it to Alice;
- Alice and Bob compute the same secret key in the following way:
The Identity (6) is true due to the fact, that circulant matrices are commuting and associativity Conditions (2) and (3).
Remark 1.
In general two-sided association Condition (3) will be not necessary, if we agree upon on the order of operations, e.g., from the left to the right.
In our previous research the base matrix W was defined over the multiplicative platform group and power matrices X and Y over the numerical power ring . This kind of MPF is denoted by MPF and constrained version by MPF. It represents the MPF defined over commutative algebraic structures considered in [1,2,5,7,15].
However, recently a linear algebra attack to the protocol presented in [3] based on MPF was found by [16]. This attack to MPF problem runs in polynomial time and hence can be used to break the algorithms presented in [1,3]. The authors of [16] also suggested some improvements of our protocols to resist the proposed attack. In [7] we fixed this flaw for the asymmetric encryption protocol, presented in [1].
The intriguing idea was to extend MPF construction to non-commutative algebraic structures, namely and , hence expecting higher complexity of MPF problem and achieving a higher potential security for the construction of cryptographic primitives. The main problem of this approach was the loss of associativity of MPF, which made its application in cryptography impossible.
This approach was successful and is presented in [10], when platform semigroup is a modified medial semigroup and power semiring is a special kind of so called near semiring . In this study as a power semiring we use a semiring of non-negative integers denoted by . So we deal with the MPF denoted by MPF. If power matrices satisfies commutation Constraints in (4), then we denote corresponding MPF by MPF.
In this paper we consider a class of MPF problems when power matrices are circulant matrices over the and hence they are commuting and satisfying Conditions (4). Interestingly enough, matrices X and Y are almost never invertible due to the fact, that both fractions and negative numbers are not contained in . This is essential to our proof of NP-Completeness of the MPF problem.
In earlier work, the proof that random generated multivariate quadratic power problem over is NP-Complete is presented. This proof is insufficient to prove the NP-Completeness of MPF problem due to fact that we are considering a partial case of this problem. Our multivariate quadratic power system of equations is predetermined by the matrix power equations. Hence this special case is not random generated. Therefore, the aim of this paper is to fill this gap.
In general, it is hard to prove that a problem with arbitrary constraints is NP-Complete (NP-Hard). We present here an approach to prove it based on Schaefer dichotomy theorem [13]. This theorem is formulated for the GSAT problem, represented by arbitrary finite set of Boolean relations (formulas) with respect to the finite set of Boolean variables. The theorem defines six criteria when either GSAT is in P or in NP-Complete complexity class.
In this paper, we construct a certain sub-problem of GSAT problem which is a one-to-one mapping of certain sub-problem of MPF problem. We show, that this GSAT problem satisfies the Schaefer criteria to be NP-Complete. Hence, using polynomial-time reduction, we will prove that decision version of MPF problem is also NP-Complete.
We revise the definition and basic properties of modified medial semigroup in the next section and present the main result in Section 4.
3. Modified Medial Semigroup as Platform Semigroup of MPF
Let us consider medial semigroup , which was previously introduced by [17]. Assume, that the presentation of this semigroup consists of two generators a and b and a relation written in the following way:
where and are arbitrary non-empty words in , written in terms of generators a and b.
Let us now present an important identity, which is useful to us for application of medial semigroup to MPF:
This identity is based on the Relation (8) and is valid for all words and any exponent .
To prevent the growth of powers of generators when exponentiation takes place we introduce a modified medial semigroup with two extra relations and in the following general form:
Thus, modified medial semigroup has the following presentation:
with relations , and defined above.
Note, that we define as a multiplicative, non-commuting, non-cancellative and infinite semigroup which is a non-symmetric algebraic structure.
Remark 2.
The modified medial semigroup is well defined if relations and are symmetric, i.e., they link both generators in such a way, that the order of generators is symmetric and exponents of each generator add up to the same number. In our case the sum of exponents of generators a and b on the left side of and in Realtions (10) equals and on the right side it equals 2.
Remark 3.
In our previous paper we considered a special case of .
Semigroups and are made monoids by introducing an empty word as a multiplicatively neutral element, denoted by 1. Then conveniently, the following identities hold for all :
The normal form for the words in was also defined in the following way:
Definition 9.
The normal form of any word in semigroup is expressed as follows:
where and .
To obtain the normal form for the word we consider its first and last literals. Using Relation (9) we can determine the values of and . For example the normal form for the word is . The word has the same normal form and hence we consider all these words equivalent. The normal form for the word is . Hence in the last case we have and . Evidently for the normal form of the word we have and whereas in case of the word we have and . In fact, the normal forms for the presented words are and respectively. We generally omit zeroth powers when writing normal forms.
On the base of the normal form in is defined as follows:
Definition 10.
The normal form of any word in semigroup is expressed by the following expression:
Let T be an additive non-commuting semigroup consisting of the tuples where and , with the following addition operation:
then there is an isomorphism , which can be expressed by the following relation for any word
Hence, using our notation, we defined MPF, where is modified medial semigroup. It is important to note, that MPF satisfies associativity conditions in Definitions (2) and (3) due to the properties of medial semigroup.
Adding the commutation Constraints (4) to the power matrices X and Y defined over , constrained MPF problem we denoted by MPF.
In the next section we prove, that MPF problem is NP-Complete.
4. Proof of NP-Completeness
Let us consider the following binary matrix equation:
where all matrices and Y are defined over the field with multiplication operation denoted by ∧ (logical AND) and addition operation by ⊕ (logical XOR). This equation corresponds to binary matrix multivariate quadratic (BMMQ) equation and associated problem to BMMQ problem.
Definition 11.
The binary matrix MQ (BMMQ) problem is to find matrices X and Y in Equation (16), when matrices Q and A are given.
Remark 4.
Throughout this paper we assume, that matrix Q is well-balanced, i.e., the quantity of 1’s is close to . Furthermore all the 1’s are distributed uniformly in the rows and columns of matrix Q.
If at least one of square matrices X or Y is invertible, then BMMQ Problem (16) is solvable in polynomial time due to one the following transformations:
since XOR operation is inverse to itself.
It is clear, that both transformations represent the system of homogeneous linear equations with 2 m unknown variables.
However, if both binary matrices X and Y are singular, then Transformations (17) are not possible and hence the initial Problem (16) bears a resemblance to the well known multivariate quadratic (MQ) problem. It is known, that random generated MQ problem is NP-Complete over any field [11,12].
Hence, we define the following problem:
Definition 12.
The singular binary matrix MQ problem (SBMMQ) is to solve BMMQ problem, when matrices X and Y in Equation (16) are singular.
It is important to note, that we are interested in this particular problem, since in case of MPF power matrices are defined over the semiring and hence any randomly chosen power matrix is not invertible with overwhelming probability. Here and onwards we say that a random event happens with overwhelming probability if its probability of failure is negligible.
We begin from the complexity consideration of CSBMMQ problem.
Our proof is based on Schaefer dichotomy theorem [13]. Let us define a set of Boolean relations with variables defined by two vectors and . Then the following generalized satisfiability problem GSAT can be formulated:
where 1 is a true value assignment to the relations.
Definition 13.
The decision GSAT problem is to answer YES/NO to the question: are there any assignment to the variables and that all Boolean relations in Problem (18) are true?
Theorem 1.
(Schaefer dichotomy theorem [13]). If at least one of the following criteria is satisfied, then the satisfiability problem GSAT is in P, otherwise it is NP-Complete:
- (a)
- Every relation in S is satisfied when all the variables are 0 (0-valid clause);
- (b)
- Every relation in S is satisfied when all the variables are 1 (1-valid clause);
- (c)
- Every relation in S is definable by a CNF formula in which each conjunct has at most one negated variable (dual Horn clause);
- (d)
- Every relation in S is definable by a CNF formula in which each conjunct has at most one unnegated variable (Horn clause);
- (e)
- Every relation in S is definable by a CNF formula having at most two literals in each conjunct (bijunctive clause);
- (f)
- Every relation in S is the set of solutions of a system of linear equation over the two element field (affine clause).
As it was mentioned above, to satisfy the commutation Conditions (4), matrices X and Y are chosen to be circulant. Then matrix Equation (16) can be transformed to the following system of equations:
where vectors and are row vectors of the first row and first column of matrix Q respectively, and matrices are obtained by cyclic permutations of matrix Q. For example, and , where the vector denotes the j-th column of matrix Q. All matrices are obtained from the initial matrix by performing shifts of rows and/or columns.
The latter system consist of m quadratic equations with 2 m variables being a components of vectors and . System (19) is a special type of random generated MQ problem over defined by special type of matrices , generated by deterministic permutations of random generated matrix Q in Equation (16). Every equation in System (19) represents a Boolean relation written in terms of logical operations AND and XOR.
To choose a suitable GSAT problem to prove NP-Completeness of the initial MPF problem the set of logical Relations (18) must be supplemented by logical relations defining the singularity constraints of matrices X and Y. Since System (19) is defined over , these constraints can be expressed by the following Boolean relations:
where 0 is a false value assignment to the relations. The actual expressions of (20) are determined by the format of matrices X and Y. Hence, here and onwards we consider square matrices of m-th order X and Y with even values of determinants.
Definition 14.
Theorem 2.
Decision CSBMMQ problem is NP-Complete.
Proof.
To prove the theorem, we use the Schaefer dichotomy theorem. System of binary Equation (19) and Relations (20) represent the system of generalized satisfiability relations in Problem (18) and corresponds to GSAT problem with . Then to prove NP-Completeness of CSBMMQ we need to verify inconsistency of Schaefer criteria (a)–(f).
The first two criteria (a) and (b) are not satisfied due to the fact, that we are choosing matrix Q at random and hence the satisfiability of these criteria has a negligible probability.
To verify Schaefer criteria (c)–(e) we denote three pairs of vectors satisfying Equations (19) and (20) by , and . Note, that we generate circulant matrices from selected vectors to check the validity of Equation (20). Schaefer criteria (c)–(e) can be reformulated as follows [18]:
- (c’)
- (d’)
- (e’)
Remark 5.
All logical operations in criteria ()-() are performed component-wise.
Then applying criterion () to the single equation in System (19) in vector form and assigning arbitrary values to the vectors , we obtain the corresponding values satisfying the following equation in every case
Evidently, in most cases . Note, however, that for this criterion to be valid the identity has to hold for all . Hence, dual Horn clause in System (19) is not satisfied and criterion () is inconsistent.
Analogously, verifying Horn clause we obtain
where . Hence, Horn clause in System (19) is not satisfied for all and criterion () is inconsistent.
Inconsistency of criterion () follows directly from the latter three expressions. Note, that the key point which allows us to claim the desired result is Remark 5 since no distributive law can be applied to the latter two expressions.
Criterion (f) is not satisfied since, in general, relations in System (19) are non-linear.
So, CSBMMQ problem is NP-Complete. □
Remark 6.
Two additional Relations (20) are needed to ensure that matrices X and Y are singular and hence to ensure the inconsistency of Schaefer criteria.
Now we turn to constrained singular matrix multivariate quadratic (CSMMQ) problem defined over the semiring of integers which we denote by CSMMQ. This means that Equation (16) and corresponding Conditions (19) and (20) are defined over .
Theorem 3.
CSBMMQ problem is a sub-problem of CSMMQ.
Proof.
Let us consider all matrices in Equation (16) defined over . Then they can be rewritten in the following way:
Let us consider the following decision problem: does there exist assignments to matrices X and Y defined over the semiring satisfying Equation (16), which adding commutation constraints corresponds to Relations (19), (20) and is a CSMMQ problem? Assume, that we have an answer YES to decision CSMMQ problem. Due to penultimate equation, it implies the answer YES to CSBMMQ problem.
In computational CSMMQ version its transformation to CSBMMQ requires the reduction of the solution modulo 2. This is done in polynomial time.
We proved, that CSBMMQ problem is a sub-problem of CSMMQ problem, when semiring is homomorphically mapped to the field . □
Since Theorem 3 is valid, every solution of CSMMQ problem has to satisfy CSBMMQ problem as well. Clearly, this problem is non-trivial and was proven to be NP-Complete.
Let us consider the following system of equations
where p is an odd prime, matrices and C are defined over the semiring of positive integers , and matrices and B over the ring . Furthermore, the parity of matrices and is the same, i.e., , where .
Theorem 4.
The decision CSMMQ problem, defined by System (21), is NP-Complete.
Proof.
It is easy to assume also with overwhelming probability, that matrices X and Y defined over the are not invertible. We define the following sub-problem of Problem (21) by reducing its first equation modulo :
Clearly, if the answer to the initial Problem (21) is YES, then the same answer applies also to Problem (22), since to obtain the solution of the Problem (21) extra matrices T and S in the relations
have to be found. Here matrices and satisfy the Problem (22).
It is important to note, that, due to Chinese Remainder Theorem, Systems (23) and (24) must be considered separately. These systems of equations provide two different and mutually independent components of solution of Problem (22). Matrices and satisfying System (22) are calculated as follows:
where matrices and satisfy System (23) and and satisfy System (24).
We can assume, that solution of (23) can be found in polynomial time if at least one of matrices X or Y are invertible modulo p. However, nevertheless we cannot recover the solution of (22) from the one component (), i.e., the component () is required. It is directly implied by the Chinese Remainder Theorem isomorphism.
Furthermore, since matrices and have the same parity the following congruence is valid:
Remark 7.
Theorem 3 is the key factor, which allows us to claim the correctness of Theorem 4. However, based on our logic presented here, we cannot claim, that the singular MMQ problem is NP-Complete over , where p is prime, due to the fact that CSBMMQ problem is not a sub-problem of the latter problem.
To demonstrate the relation of CSMMQ Problem (21) to modified medial semigroup let us define the following mappings:
Remark 8.
Remark 9.
In general we have and . Furthermore, if , then w is an empty word, i.e., .
It is clear that if we preset two exponents , then the pair defines a unique element w if these elements have the same parity and satisfy inequality . Clearly, this reduction is polynomial since for a fixed pair we have:
Then the following theorem can be formulated:
Theorem 5.
The mapping is an invariant of the reduction, i.e., , and the mapping is an invariant modulo of the reduction, i.e., , where is the any word in reduced to its normal form.
The proof of this theorem follows from the definition of the reduction and thus we omit it.
The defined mappings have the following important property:
Let us assume that the entries of matrices and satisfy the conditions presented in Problem (21). Then the following one-to-one-mapping mapping can be defined:
where the values of and are fixed.
Example 1.
Assume, that and . Then we have:
Furthermore, if and , then:
However, and are undefined for any values of and .
If we apply mapping to the pair of matrices elementwise then we obtain a matrix , where the entries are defined as follows:
Now we introduce the following expression:
and apply the mapping to it. Due to Properties (28) and (29) we have:
where the entries of matrix W are defined by Expression (31). Furthermore, we apply the mapping to the pair of matrices in Problem (21) to obtain the following matrix:
where the entries of matrix D are defined by Expression (31). The two latter equations can be combined to yield MPF problem, symbolically presented in Definition 1.
Theorem 6.
MPF is NP-Complete.
Proof.
Remark 10.
In fact, circulant MPF problem is NP-Complete in more general case, since for matrices X and Y with no zero entries only the upper left corner and bottom right corner entries of the base matrix W play an important role. More precisely the first and the last literal of the specified entries produce fixed values and . Normal forms of other entries of the base matrix W are irrelevant.
5. Conclusions
- The proof of NP-Completeness of author’s constructed MPF in previous Symmetry journal publication is presented. It is a new evidence, that this type of MPF can be considered for construction of a non-commuting cryptography primitive as a conjectured OWF.
- The proof is based on two main approaches: we prove that certain GSAT is NP-Complete using modified Schaefer criteria, and, using this result, we prove that this GSAT is a sub-problem of the considered MPF problem. Hence this type of MPF problem is NP-Complete.
- It is a new step to prove that KAP presented in our previous publication mentioned above has a provable security property.
Author Contributions
This article was supervised by E.S. who proposed the methology later improved by both authors. A.M. performed the investigation and analyzed the obtained results together with his supervisor. Both authors collected resources for the paper. A.M. wrote the paper.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| MPF | Matrix power function |
| OWF | one-way function |
| MQ problem | Multivariate quadratic problem |
| MMQ problem | Matrix MQ problem |
| BMMQ problem | Binary matrix MQ problem |
| SBMMQ problem | Singular binary matrix MQ problem |
| CSBMMQ problem | Constrained singular binary matrix MQ problem |
| GSAT problem | General satisfiability problem |
| NP-Commplete problem | Non-deterministic polynomial complete problem |
| CNF | Conjuntive normal form |
References
- Mihalkovich, A.; Sakalauskas, E. Asymmetric cipher based on MPF and its security parameters evaluation. In Proceedings of the Lithuanian Mathematical Society, Klaipeda, Lithuania, 11–12 June 2012; VU Matematikos ir Informatikos Institutas: Vilnius, Lithuania, 2012. Ser. A. Volume 53, pp. 72–77. [Google Scholar]
- Mihalkovich, A.; Sakalauskas, E.; Venckauskas, A. New asymmetric cipher based on matrix power function and its implementation in microprocessors efficiency investigation. Elektron. Elektrotech. 2013, 19, 119–122. [Google Scholar] [CrossRef]
- Sakalauskas, E.; Listopadskis, N.; Tvarijonas, P. Key Agreement Protocol (KAP) Based on Matrix Power Function. In Advanced Studies in Software and Knowledge Engineering; International Book Series “Information Science and Computing”; World Scientific: Singapore, 2008; pp. 92–96. [Google Scholar]
- Sakalauskas, E.; Luksys, K. Matrix Power S-Box Construction. IACR Cryptology ePrint Archive 2007. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.78.2327&rep=rep1&type=pdf (accessed on 26 October 2018).
- Sakalauskas, E.; Mihalkovich, A. New asymmetric cipher of non-commuting cryptography class based on matrix power function. Informatica 2014, 25, 283–298. [Google Scholar] [CrossRef]
- Sakalauskas, E. The multivariate quadratic power problem over Zn is NP-Complete. Inf. Technol. Control 2012, 41, 33–39. [Google Scholar] [CrossRef]
- Sakalauskas, E.; Mihalkovich, A. Improved Asymmetric Cipher Based on Matrix Power Function Resistant to Linear Algebra Attack. Informatica 2017, 28, 517–524. [Google Scholar] [CrossRef]
- Sakalauskas, E.; Mihalkovich, A.; Venčkauskas, A. Improved asymmetric cipher based on matrix power function with provable security. Symmetry 2017, 9, 9. [Google Scholar] [CrossRef]
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
- Sakalauskas, E. Enhanced Matrix Power Function for Cryptographic Primitive Construction. Symmetry 2018, 10, 43. [Google Scholar] [CrossRef]
- Garey, M.R.; Johnson, D.S. Computers and Intractability; WH Freeman: New York, NY, USA, 2002. [Google Scholar]
- Patarin, J.; Goubin, L. Trapdoor one-way permutations and multivariate polynomials. In Proceedings of the International Conference on Information and Communications Security, Beijing, China, 11–14 November 1997; Springer: Berlin, Germany, 1997; pp. 356–368. [Google Scholar]
- Schaefer, T.J. The complexity of satisfiability problems. In Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, 1–3 May 1978; ACM: New York, NY, USA, 1978; pp. 216–226. [Google Scholar]
- Davis, P.J. Circulant Matrices; Wiley: New York, NY, USA, 1970. [Google Scholar]
- Sakalauskas, E.; Mihalkovich, A. Candidate One-Way Function Based on Matrix Power Function with Conjugation Constraints. In Proceedings of the Conference proceedings Bulgarian Cryptography Days 2012, Sofia, Bulgaria, 20–21 September 2012; pp. 29–37. [Google Scholar]
- Liu, J.; Zhang, H.; Jia, J. A linear algebra attack on the non-commuting cryptography class based on matrix power function. In Proceedings of the International Conference on Information Security and Cryptology, Beijing, China, 4–6 November 2016; Springer: Berlin, Germany, 2016; pp. 343–354. [Google Scholar]
- Chrislock, J.L. On medial semigroups. J. Algebra 1969, 12, 1–9. [Google Scholar] [CrossRef]
- Dechter, R.; Pearl, J. Structure identification in relational data. Artif. Intell. 1992, 58, 237–270. [Google Scholar] [CrossRef]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).