Asymmetric Cryptography Based on the Tropical Jones Matrix

: In recent years, the tropical polynomial factorization problem, the tropical matrix decomposition problem, and the tropical multivariate quadratic equation solving problem have been proved to be NP-hard. Some asymmetric cryptographic systems based on tropical semirings have been proposed, but most of them are insecure and have been successfully attacked. In this paper, a new key exchange protocol and a new encryption protocol are proposed based on the difficulty of finding the multiple exponentiation problem of the tropical Jones matrices. The analysis results indicate that our protocol can resist various existing attacks. The complexity of attacking an MEP by adversaries is raised due to the larger number of combinations in the tropical Jones matrices compared to regular matrix polynomials. Furthermore, the index semiring is the non-negative integer cyclic matrix semiring, leading to a higher efficiency in key generation.


Introduction
Asymmetric cryptography plays a crucial role in the modern fields of communication and information security, offering reliable solutions for safeguarding the confidentiality, integrity, and authentication of data.Widely applied in areas such as internet transmission, digital signatures, and virtual private networks (VPNs), it provides users with a secure and dependable means of communication.
Asymmetric cryptography was first presented by Diffie and Hellman in 1976.Cryptographers have designed several representative public key cryptosystems.The security of these cryptographic systems relies on the difficulty associated with solving certain conventional mathematical challenges, including the integer factorization problem (IFP) [1], the knapsack problem (KP) [2], the discrete logarithm problem (DLP) [3,4], and the shortest vector problem in lattice [5].The IFP and DLP are also two computational problems that public key cryptography mainly relies on.However, it is possible to solve the two problems in polynomial time using the quantum algorithm [6] that Shor proposed.Therefore, future cryptographic systems need to resist quantum attack, and developing new cryptographic systems is currently a hot topic in cryptography research.
Tropical algebra is derived from the tropical set theory proposed by the scientist Imre Simon [7,8].In tropical algebra, tropical addition involves taking the minimum or maximum value of two numbers, and tropical multiplication is the common addition.Later, some cryptography researchers combined tropical algebra with the concept of semirings and defined the algebraic structure of tropical semirings.In 2005, Kim and Roush [9] proved that if the coefficients are finite, or all the coefficients are 0 or infinity (the Boolean case), then the univariate polynomial factorization problem of tropical semirings is usually NP-complete.In 2014, Shitov [10] studied the tropical matrix factorization (MF) problem and proved that the k-MF problem is NP-hard when k ≥ 7. (The k-MF problem is as follows: given a m × n matrix A on R min , find a m × k matrix B and a k × n matrix C, such that BC = A).
Since tropical addition involves taking the minimum or maximum value of two numbers, tropical multiplication is the common addition and the calculations in the tropical semiring are more efficient than the classical ring.Recently, many people have attempted to propose some key exchange protocols based on tropical matrix algebra that are not only efficient but also secure, but they have been successfully attacked.By imitating some famous "classical" schemes previously proposed, Grigoriev and Shpilrain initially proposed a key exchange protocol based on tropical semirings [11] in 2014.In this article, Grigoreiv and Shpilrain reduced the 3-SAT problem to a system of multivariate quadratic polynomial equations (MQPs) of tropical semirings and proved that the MQP of tropical semirings is NP-hard.However, when the range of tropical matrix elements contains negative numbers, it is found that each term of the tropical matrix will soon become negative and will become smaller as the number of powers increases.According to this rule, Kotov and Ushakov [12] developed corresponding effective attack schemes.In response to this heuristic attack proposed by Kotov and Ushakov, Grigoriev and Shpilrain proposed a new improvement to the key exchange protocol.In 2019, they proposed a key exchange protocol [13] based on the semidirect product of tropical matrices.However, this scheme was successfully broken by Rudy and Monico [14] using a simple binary search.In addition, Isaac and Kahrobaei [15] and Muanalifah and Sergeev [16] have also successfully attacked the schemes.To remedy the Grigorev-Shpilrain's protocol, Muanalifah and Sergeev proposed the use of two classes of exchange matrices (the Jones matrix and the LP matrix) from tropical algebra [17] and utilized the bilateral action of the matrices to propose three key exchange protocols [18].However, in this article, the user's secret matrix may still be represented in the linear form of the powers of the fundamental elementary matrix.Hence, its modifications are not resistant to the generalized KU attack.In 2022, Huang and Li proposed a new key exchange protocol [19] based on the multiple exponentiation problem of matrices, using tropical algebra as a platform and the adjoint matrix of the first polynomial.The analysis results showed that the protocol can resist all known attacks.Durcheva [20] proposed a public key encryption scheme based on the circulant matrix product problem and the two-sided action problem of matrix polynomials in 2022.Jiang et al. [21] cracked the scheme through tropical linear equations.Ahmed et al. [22] summarizes and analyzes the previous tropical cryptography schemes.Other cryptographic schemes based on tropical algebra can be found in the references [23][24][25].
Our contribution: In this paper, we design a new class of key exchange protocol and asymmetric encryption protocol based on the tropical Jones matrix.The security of the designed key exchange protocol can be reduced to a specific type of semigroup action problem introduced by Maze in [17], which involves the difficulty of finding the multiple exponentiation of tropical matrices.The multiple exponentiation problem can be transformed into a constructive membership problem of a semigroup in polynomial time, and this problem is a provable hard problem in the quantum computing model [26].In addition, this problem cannot be reduced to the DLP or the HSP (hidden subgroup problem) efficiently in most cases.So, our protocol has the property of anti-quantum computing.The greater amount of combinations of the tropical Jones matrices as opposed to standard matrix polynomials increases the difficulty of adversaries attacking the MEP.Through an analysis of the key exchange protocol, it is found that our protocol can also resist KU attack and other known attacks.Additionally, the index semiring is the non-negative integer cyclic matrix semiring, which increases key generation efficiency.
The remaining portions of this article are organized as follows.Section 2 contains some preliminary information on tropical semirings.Section 3 presents our protocols based on the tropical Jones matrix.In Section 4, we provide a straightforward example to illustrate this key exchange protocol.The efficiency of the proposed cryptographic protocol, possible attacks, and parameter selection are finally covered in Section 5. Finally, Section 6 summarizes this article.
We first provide some essential information about tropical algebra.For more details, please refer to the monograph [27].Definition 1 ([28] (Semiring)).Let R be a nonempty set in which two binary operations are defined, where one is an addition operation and the other is a multiplication operation, if the operation meets the following criteria: (1) The set R forms a commutative monoid for " +" and has an identity element denoted as 0; (2) The set R forms a monoid for " •" and has an identity element denoted as 1; (3
−∞ and 0 satisfied the following equations: The commutative semiring properties of with addition identity −∞ and multiplication identity 0 are easily demonstrated.This is an example: The set of all tropical polynomials over T Z can be defined where the unknown term is x, just like in the classical case.Let The ⊕ and ⊗ operations of tropical polynomials in T Z [x] are like the classical addition and multiplication, with each + being replaced by ⊕ and each • being replaced by ⊗.Proving that T Z [x] is a commutative semiring under ⊕ and ⊗ is straightforward.
So is a semiring and are the identity elements of M k (T Z ) under ⊕ and ⊗ respectively.
It is rare for tropical matrices to be reversible, unlike the classical situation.Only tropical matrices obtained by elementary row or column transformations of diagonal matrices can be reversed.
Similarly, we can define a tropical matrix polynomial as follows: with respect to tropical matrix addition and multiplication.

Definition 4 ([23] (Circulant Matrix))
. If matrix C is in the following form: , it is called a circulant matrix, where the terms are c 1 , c 2 , • • • , c n .The set of all non-negative integer circulant matrices is denoted as C n (Z + ).

Jones Matrix
In this section, we describe a specific type of matrices that were considered by Jones [30], and, by extending the polynomial concept, we can derive the concept of quasipolynomials for Jones matrices, which will be applied to the protocol in Section 3.

Definition 5 ([18] (Jones Matrix))
. Let A = a ij be an n × n tropical matrix that satisfies the following property: we call A a Jones matrix.

Definition 6 ([18] (Deformation))
. Let A = a ij be a Jones matrix and α ∈ R. The ma- is called a deformation of A.
Next, we will describe two theorems for a Jones matrix.

Theorem 1 ([18]
).If A is a Jones matrix, then A (α) is also a Jones matrix for any α ≤ 1.
According to the above theorems, we define a quasi-polynomial and replace a monomial with a deformation.
for some finite subset R of rational numbers in [0, 1] anda α ∈ T Z for α ∈ R. The set composed of all quasi-polynomials of N is denoted as T Z N (α) .

A New Semigroup Action
Let A be a non-negative integer circulant matrix, N ∈ M k (T Z ) be a Jones matrix, and . Now consider the action of the multiplicative semigroup C n (Z + ) on the Cartesian product T Z N (α) n , as shown below: , where H

Multiple Exponentiation Problem of Tropical Matrices
According to Reference [19], we can give the definition of the ME problem of the tropical Jones matrix.
, and assuming (Remember that N is unknown.)We refer to the issue as the "ME problem" for simplicity's sake.
Many results in traditional algebra are known to be invalid in tropical algebra.Consequently, certain properties of ordinary matrices, such as Cayley-Hamilton theorem, eigenvalues, and determinant, do not apply.But if H i (i ∈ [n]) satisfies certain conditions, we can simplify the problem to the DLP.
then the ME problem can be simplified to the DLP in polynomial time.

Key Exchange Protocol and Encryption Protocol Based on the Jones Matrix
This section presents a key exchange protocol that is similar to the Diffie-Hellman protocol.It is based on the multiple exponentiation problem of tropical matrices and a public key encryption protocol such as the ELGamal encryption protocol.

A New Key Exchange Protocol
. The protocol's public parameters are Note that "•" is the matrix multiplication in C n (Z + ).Given that C n (Z + ) is commutative, we obtain A • B = B • A and K Alice = K Bob .Thus, Bob and Alice have a shared secret key.

A Common Key Encryption Protocol Based on the Jones Matrix
. The protocol's public parameters are as the final component of the ciphertext.Note that the "+ " here is an ordinary matrix addition operation.Verification:

A Toy Example
To help readers comprehend the above key exchange protocol, we have included a basic example in this section.where K Alice = K Bob .Therefore, Alice and Bob share the key.

Security Analysis and Parameter Selection
In this section, we analyze the security of the proposed key exchange protocol.The analysis shows that our protocol can resist all known attacks and has the property of anti-quantum computing.First, we prove that Protocol B is semantically secure.

Definition 9 ([19]). Suppose
Input all of these parameters into A 1 .Note that A is now the secret key.The decryption of Consequently, A 1 outputs "yes" precisely when . This resolution effectively addresses the decision DME problem.
On the contrary, let us assume an algorithm A 2 can effectively tackle the DME problem.
This implies that if provided with inputs . Therefore, given these inputs, A 2 yields "yes" precisely when → M is the accurate plaintext.The Theorem is proved.□

Possible Attacks
(1) Brute-force attack.Assuming A ∈ C n (Z + ) is a circulant matrix with terms a 0 , a 1 , The attacker clearly has s n options from which to select A, so the parameters s and n must satisfy s n ≥ 2 80 .(2) Tropical matrix decomposition attack.Tropical matrix decomposition attack involves a search for a circulant matrix A ′ such that then the attacker can find the shared key.However, the attacker needs to factor NP-hard, so the tropical matrix decomposition attack is not effective.
(3) KU attack.Since the Jones matrix is unknown, if we want to find N, the system of equations needs to be solved as follows: Solving the above system of equations is NP-hard.Therefore, the KU attack is ineffective.
Assuming the attacker knows the matrix N, finding the private key A from the public key U is what they must accomplish.KU attacks are limited to breaking down tropical matrices into their product, like U = X ⊗ Y.In this protocol, the KU attack will not function if the → H component value is more than two.Therefore, we require that the components of → H be greater than or equal to three.
(4) Generalized KU attack.Additionally, a common matrix can be broken down by the generalized KU attack into the linear equivalent of the tropical basic elementary matrix: the product of two Jones matrices.However, in our cryptosystems, if n > 2, then each component matrix of → U is the result of multiplying by more than two matrices.In this instance, our cryptosystems are likewise unaffected by the generalized KU attack.
(5) RM attack.Grigoriev and Shpilrain designed another key exchange protocol based on the action of the semidirect product.However, in this key exchange protocol, the addition operation of the tropical matrix is used, and the addition of the tropical matrix has the property of idempotent, so the power of this part of the semidirect product is partially order-preserving.Rudy and Monico used this feature to create a straightforward binary search algorithm that allowed them to break the cryptosystem in [14].There is no tropical matrix addition operation in → H A in our cryptosystems.Thus, our cryptosystems can also resist this attack.(6) Quantum attack.Andrew et al. [26] proved that the constructive membership problem of the semigroup is a provable hard quantum computation model, and the lower bound of its quantum computation complexity is exponential.Since the ME problem can be transformed into a semigroup constructive member problem, our cryptosystems have the property of anti-quantum computing.
Table 1 provides the comparison of our protocols with other relevant schemes in terms of resisting various known attacks.

Parameter Selection and Efficiency
Nachtigall et al. defined a sequence of matrices to be almost linear periodic in [31].In the following definition, if the matrix H = h ij , then h p ij denotes the ij th element of H p .

Definition 10 ([31] (Almost linear periodic)).
If there is a period ρ, linear factor ξ, and some defect d such that the following equation applies for all indices i, j and all p > d, then a sequence of matrices {H p , p ∈ N} is almost linearly periodic: In [32], Beccelli et al. demonstrated that the higher powers sequence of tropical matrices is almost linear periodic.In our protocol, if the exponent p and period ρ of the Jones matrix N are small, there is a possibility of potential heuristic attacks.The exponent p of the tropical matrix increases with the increase of the order k of the matrix.We have shown through experiments that it is feasible to generate a Jones matrix N and H i with an exponent exceeding k 2 and using this feature to attack does not work.
From Proposition 1, we know that if there exists a component ), then the ME problem can be simplified to the DLP in polyno- mial time.To avoid this situation, → H must satisfy that there is no component In Protocol A and B, we recommend using the following parameters: (1) The order of the Jones matrix N is k = 10 and the element selection in [0, 1000]; (2) Because the deformation of the Jones matrix means that the terms of the matrix may contain fractions, we recommend a α = 0, where exponent α is selected rational numbers in [0 H is randomly generated, and the private key matrix A is randomly selected from cyclic matrices, compared to matrix exponentiation operations, so their time consumption can be neglected.In the encryption and decryption processes, the computation time for the ordinary matrix addition and subtraction is also typically very fast and can be neglected compared to matrix exponentiation.)Similar to the scheme in reference [19], our protocol is also built upon employing the tropical matrix multiple exponentiation problem.However, we employ the tropical Jones matrix MEP instead of the matrix polynomial MEP.Specifically, the base semiring we use is T Z N (α) , not T Z [N].Under the same parameters, the quasi-polynomial set of Jones matrices is much larger than the general matrix polynomial set, greatly increasing the adversary's search space.Additionally, since our index semiring is C n (Z + ) rather than Z + (D) in the key generation process, we only need to randomly generate a cyclic matrix without calculating the matrix polynomials, which makes the key generation efficiency higher in our protocol.Table 4 compares our protocol with the protocol in reference [19].

Conclusions
In this paper, we propose a new key exchange protocol and a new public key encryption protocol by using the multiplication of the quasi-polynomial of the Jones matrix, which has the property of commutativity when α ∈ [0, 1].The security of the protocol is analyzed.
Because the component of public key → H in our protocols is more than two, our protocols can resist a KU attack and a generalized KU attack.Furthermore, in our cryptosystem, the addition operation of the matrix is not involved, so our protocols can resist an RM attack.Since the ME problem can be transformed into a semigroup constructive member problem, our cryptosystems have the property of anti-quantum computing.
∈ C n (Z + ).The multiple exponentiation problem of tropical matrices is to find a matrix A ∈ C n (Z + ) satisfying the above equation for given C,

→ H . 1 ⃝
The key generation center randomly chooses a circulant matrix A in C n (Z + ), and computes → public key is shown as → U. Alice's secret key is A.(2) Encryption Bob needs to do the following calculation to send the plaintext message→ M ∈ (M k [T Z ]) nto Alice.Bob randomly selects a circulant matrix B ∈ C n (Z + ), then computes → it as the first part of the ciphertext.

3 ⃝Q 1 ⃝W
Bob sent by Bob, Alice decrypts it with her private key.Alice to get the original plaintext message.Note that "−" here is an ordinary matrix subtraction operation.
Alice and Bob both choose a Jones matrix N =

Theorem 3 .
A, B ∈ C n (Z + ).Let R ∈ T Z N (α) n.The decisional ME problem is to decide whether → simplify, we denote it as the "DME".An algorithm capable of resolving the DME problem can effectively ascertain the legitimacy of ciphertexts within Protocol B. Conversely, an algorithm designed to determine the validity of ciphertexts within Protocol B can be harnessed to address the DME problem.Proof.Let us initially assume that algorithm A 1 possesses the capability to determine the correctness of a decryption within Protocol B. When given the inputs → algorithm A 1 outputs "yes" if → M is the decryption of ( and "no" otherwise.Now, we use A 1 to solve the DME problem.Suppose we are given → our aim is to determine whether " otherwise.Let it be the claimed decryption of the ciphertext.Consider → M as the asserted decryption of the ciphertext

, 1]; ( 3 )
Because the terms of the private key matrices A and B are exponents of H i (i ∈ [n]), the terms of the circulant matrices A and B cannot be too large.Here, we recommend selecting their terms in [0,10].Now, we analyze the computational efficiency of encryption Protocol B. The most time-consuming operations in the protocol are the matrix exponentiations → the key generation process, →

Table 1 .
Comparison among relevant tropical schemes.

Table 2
compares the execution time of the operation → U = → H

A
with various parameters, and Table3compares the execution time of the key generation, encryption, and decryption processes under different parameters (research platform: AMD Ryzen 7 6800H with Radeon Graphics3.20GHz).

Table 2 .
Performance comparison under some parameters.

Table 3 .
Performance comparison of encryption under some parameters.

Table 4 .
Comparison with the protocol in [19].