Strong Keys for Tensor Isomorphism Cryptography
Abstract
Sampling a non degenerate (that is, invertible) square matrix over a finite field is easy, draw a random square matrix and discard if the determinant is zero. We address the problem in higher dimensions, and sample non degenerate boundary format tensors, which generalise square matrices. Testing degeneracy is conjectured to be hard in more than two dimensions [11, Conj. 13.1(i)], precluding the “draw a random tensor and discard if degenerate” recipe. The difficulty is in computing hyperdeterminants, higher dimensional analogues of determinants. Instead, we start with a structured random non degenerate tensor and scramble it by infusing more randomness while still preserving non degeneracy. We propose two kinds of scrambling. The first is multiplication in each dimension by random invertible matrices, which preserves dimension and format. Assuming pseudo randomness of this action, which also underlies tensor isomorphism based cryptography, our samples are computationally indistinguishable from uniform non degenerate tensors. The second scrambling employs tensor convolution (that generalises multiplication by matrices) and can increase dimension. Inspired by hyperdeterminant multiplicativity, we devise a recursive sampler that uses tensor convolution to reduce the problem from arbitrary to three dimensions.
Our sampling is a candidate solution for drawing public keys in tensor isomorphism based cryptography, since non degenerate tensors elude recent weak key attacks targeting public key tensors either containing geometric structures such as “triangles” [20] or being deficient in tensor rank [8]. To accommodate our sampling, tensor isomorphism based schemes need to be instantiated in boundary formats such as , away from the more familiar cubic formats. Our sampling (along with the recent tensor trapdoor one-way functions [16]) makes an enticing case to transition tensor isomorphism cryptography to boundary formats tensors, which are true analogues of square matrices.
Keywords and phrases:
tensors, finite fields, post-quantum cryptography2012 ACM Subject Classification:
Theory of computation Computational complexity and cryptographyEditors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał SkrzypczakSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
1.1 Cryptographic context and consequences
Tensor isomorphism based cryptography
A three dimensional tensor can be transformed into another by a triple of invertible square matrices, by multiplying in each dimension. The action is symmetric: if a triple of matrices takes a tensor to , then the triple of inverses of those matrices takes to . Two tensors that can be transformed into each other are called isomorphic. The decision version of the tensor isomorphism problem (TI) is given two tensors over a finite field to tell if they are isomorphic. The promise search version asks for an isomorphism (a triple of invertible matrices) between two given isomorphic tensors over a finite field. The tensor isomorphism problem is complete for the complexity class TI which contains other cryptographically important problems such as cubic polynomial equivalence, matrix code equivalence, alternating trilinear form equivalence (ATFE) etc. and longstanding group theoretic problems such as p-group isomorphism [10]. Many of these problems are connected by tight nearly linear or quadratic time complexity reductions. Matrix code equivalence is in fact the same as TI, merely phrased differently. ATFE is TI restricted to alternating tensors with the same invertible matrix acting in all three dimensions, and remains TI-complete. Cubic polynomial equivalence is TI restricted to symmetric tensors. These problems may be phrased in arbitrary dimensions, but they remain hard even when restricted to three dimensions. With a difficult to find isomorphism problem at hand, it is not hard to design a zero knowledge identification scheme using the Goldreich-Micali-Wigderson construction, which yields signature schemes through the Fiat-Shamir transform. Following this motif, Patarin in his pioneering work on multivariate cryptography proposed a signature scheme based on the hardness of cubic polynomial equivalences [19]. Recently, NIST first round on-ramp signature schemes MEDS [3] and ALTEQ [1] are built on TI and ATFE respectively, with competitive efficiency and signature sizes. Beyond efficiency, part of the appeal of tensor isomorphism problems is that there is strong evidence of average case hardness. Further, attempts to solve it using extensions of Shor’s algorithm on a quantum computer must confront the hidden subgroup problem over (products of) general linear groups, believed to be among the hardest [9]. But recently the following weak key vulnerability was identified, warranting caution in the key generation algorithms of tensor isomorphism based cryptosystems.
Weak key attacks on tensor isomorphism based cryptosystems
The public verification key in MEDS was a random tensor. But very recently, in reaction to a cryptanalytic attack by Narayanan, Qiao and Tang [17], MEDS adopted a format where are not all equal, but still fairly balanced. We will informally call it a nearly cubic format. For levels I,III and V, the respective choices are , and [20, Table 7]. The private signing key is a triple of matrices. In ALTEQ, the public key is a random alternating tensor and the private key is an invertible matrix. Recently, Ran and Samardjiska identified tensors that have certain geometric structures called “triangles” for MEDS and 3-dimensional 2-singularity for ALTEQ as weak public keys [20]. Heuristically, a public key has a triangle (or a 3-dimensional 2-singularity) with probability roughly , where is the field size. They further devised Gröbner basis algorithms (augmented with equations encoding the triangle/ 3-dimensional 2-singular structure) to compute such a triangle (or a 3-dimensional 2-singularity), which upon finding reveals a secret key. Conditioned on a weakness being present, their algorithm can detect and find the weakness faster than previously known (but still in exponential time, so there is no contradiction to the belief that testing singularity is hard). For MEDS, since the underlying prime 4093 is small, taking the conservative assumption that weak keys are likely, the triangle finding algorithm takes away 6 bits of security [20, Table 6]. For ALTEQ, the algorithm to find 3-dimensional 2-singular structures is much faster, exploiting the anti-symmetry of the alternating tensors and the fact that the same matrix acts in all three dimensions. In fact, for ALTEQ level I parameters, the weakness (if it exists) can be found fast in practice. Luckily for ALTEQ, the field size is a large prime close to . Therefore, the probability of drawing a weak key is heuristically at most . In the future, ALTEQ has the choice of doubling the bit length of the current prime, and safely ignoring the weak key issue as a rare occurrence that only happens with probability within the NIST accepted bound of . Beyond signature schemes, certain commitment schemes were also under attack, exploiting the chance that the public key is tensor rank deficient [8]. We will focus on evading the attacks on MEDS as the testing ground. Since non degeneracy is a stronger guarantee than tensor rank, the attacks on the commitment scheme in [8] is also evaded by our sampling algorithm for MEDS. Sampling for ALTEQ is complicated by the antisymmetry. Symmetric tensors (polynomials) and antisymmetric tensors have hyperdeterminants that split into irreducible factors indexed by the symmetries [18]. A modified version of our construction taking this splitting into account might work for ALTEQ, but we defer that to future work.
Security boost by non degenerate sampling in boundary formats
Increasing the field size to dodge the weak key attacks on MEDS seems natural. Yet to be certain it works, the heuristic weak key probability estimate of needs to be proven. In validating the need for their weak key attack, [20] proved a lower bound on the weakness probability. But to be certain that increasing the field sizes is a provable remedy to the weak key attacks, we need an upper bound. Such a rigorous upper bound using hyperdeterminants and counting points on projective varieties over finite fields was proven in [12]. Consequently, increasing the field size to be exponentially large is a provably sound strategy against the weak key attacks. But increasing the field size comes at the cost of efficiency and signature sizes, both of which grow roughly as . For instance, if ALTEQ were to double the bit length of their field size, then the signature sizes would double too. We present a sampling algorithm for boundary formats that applied in the MEDS context samples exclusively from strong public keys, evading the weak key attacks. The sampling algorithm works for boundary formats in arbitrary dimensions, accommodating any future applications in cryptography and beyond. In the MEDS context, the existence of “triangles” coincides precisely with degeneracy and we merely need to specialize our algorithm to the three dimensional and move the nearly cubic MEDS format to a boundary format of the form . The public keys sampled are indistinguishable from uniformly drawn strong public keys assuming hardness of the tensor isomorphism problem. Therefore, the sampling sidesteps the weak key issue without the need of any new assumptions, reopening up the possibility of instantiating MEDS and similar schemes over small field sizes. Curiously, there is a recent trapdoor construction from tensors that works exclusively in boundary formats [16]. We anticipate future cryptographic constructions set in boundary formats, for which our sampling algorithms apply in full generality in arbitrary dimensions. After posting an earlier version of this paper online, we became aware of a very recent TI algorithm (Hull attack) of Couvreir and Levrat [4] applicable to boundary formats (The aforementioned [17] only applies to cubical formats). For boundary formats, their run time is roughly . More generally, their complexity estimate is roughly , with being the length of the shortest dimension. Therefore, it is imperative to make sure the lengths of the dimensions are reasonably balanced and none of the lengths are too short. In particular, and formats seem comparable in security, except our algorithm can provably sample safe keys in the boundary format. The downside of this boundary format is that tensors (and hence the signatures) are twice as long to write down as the cubical format. A careful comparison of both the complexity of TI and the possibility of evading weak key attacks is thus warranted, before deciding on the format for cryptography. A high level description of the non degenerate tensor sampling problem and our sampling algorithms follows, aided by illustrative small examples in three dimensions.
1.2 The non degenerate tensor sampling problem
Sampling a non degenerate matrix over a finite field is easy: draw a random square matrix and test if the determinant is non zero. We next take time to informally state its higher dimensional generalisation, sampling non degenerate tensors of three or more dimensions, as solving it is our primary goal.
Degeneracy
An dimensional tensor to us is an element in the tensor product of (dual) vector spaces of dimensions over a finite field . We also think of such a tensor as a multilinear form given by a format -dimensional matrix. We will call as the length in the -th dimension. The lengths have a plus one for convenience, as working in dimensional projective space will make appear often in formulae. Square matrices correspond to the , with the same length in both dimensions. A square matrix being degenerate corresponds to its determinant vanishing. Since the determinant is polynomial time computable, it is easy to test for degeneracy. Further, the determinant is a monic irreducible polynomial in the entries of the square matrix. Therefore, the set of degenerate matrices forms a closed sub variety, in fact a hypersurface. A generic matrix lies outside this hypersurface. Therefore, drawing a generic matrix and rejecting if the determinant is zero samples from non degenerate square matrices. Consider the following algebraic definition of degeneracy of square matrices: A matrix is degenerate if there is a pair of non zero vectors such that and are both zero vectors. The definition may seem atypical, but is clarified by thinking of as a pair of left and right kernel vectors. It is this motif that easily generalises in the following definition for three dimensional tensors. A three dimensional tensor (trilinear form) is degenerate, if there exists a triple of non zero kernel vectors such that evaluating the trilinear form at all but one (so, two) of the vectors results in the all zero dual vector. That is,
are zero (dual) vectors in the first, second and third dimension respectively. Likewise, an dimensional tensor is degenerate if there is an -tuple of non zero vectors such that evaluating the -linear form at all but one of the vectors gives the zero (dual) vector. See [6, Chap. 4](also § 2) for a formal algebraic definition and also an equivalent analytic definition in terms of singularity. Singular and degenerate are equivalent in our contexts.
Hyperdeterminants and tensor formats
Cayley discovered an analogue of the determinant for the format, depicted below with the vertices of the cube indexing the tensor entries [2].
Nearly two centuries later, Gelfand, Kapranov and Zelevinsky generalised Cauchy’s construction to arbitrary dimensional formats satisfying the convexity condition under the name of hyperdeterminants. Analogous to the determinant, the hyperdeterminant is an integer polynomial in the entries of the tensor that vanishes precisely when the tensor is singular. However, the hyperdeterminant is conjectured to be hard (VNP hard to compute, NP hard to zero test) in three or more dimensions [11]. Therefore, it is unlikely for the strategy of generating a random tensor and testing for its hyperdeterminant to be non zero to work efficiently. Formats satisfying the convexity condition as a strict inequality for every dimension are called interior formats. Formats satisfying the convexity condition with equality for at least one dimensions are called boundary formats. We will call formats not satisfying the convexity condition as exterior formats. Interior and boundary formats have an associated hyperdeterminant, to help reason about degeneracy. Degenerate tensors of an exterior format form a variety of co-dimension more than one, meaning there is no single polynomial such as a hyperdeterminant to characterise degeneracy. Across all formats, non degenerate tensors form a Zariski closed set of co-dimension at least one. Therefore, most tensors are non degenerate.
The Problem: Given an -dimensional format and a finite field , sample a non degenerate tensor of that format over .
The problem is interesting over other fields too. We can construct non degenerate tensors over real/complex numbers by merely populating the tensor with algebraically independent entries. This works for all interior or boundary formats, since the hyperdeterminant exists and being a primitive polynomial with integer entries, cannot vanish specialised to algebraically independent entries. But these constructions seem contrived, involving either transcendental numbers or algebraic numbers of large degree/height. We will instead focus on finite fields, the cryptographically most relevant setting. Our constructions involve a more refined look at the hyperdeterminant and can be lifted to the rationals or reals or complex numbers in a straightforward manner.
1.3 Our contribution: Sampling algorithms for boundary formats
We present two families of sampling algorithms for boundary and exterior formats. The first step in the first family of algorithms is to construct a structured random non degenerate tensor of the desired format, leveraging the theory of hyperdeterminants. The structures we exploit vary across interior, boundary and exterior formats and all the necessary mathematical ingredients were developed by Gelfand-Kapranov-Zelevinsky [7, 6], Weyman-Zelevinsky [23], Kaji [13], Dionisi-Ottaviani [5], and others. We are merely identifying their relevance to cryptography and putting the ingredients together. Once such a non degenerate diagonal tensor is at hand, we scramble it by acting on each dimension with multiplication by a non-singular matrix, as the second step. This scrambling is precisely the same action intrinsic to the definition of the tensor isomorphism problem. Crucially, scrambling preserves the non-singularity of the tensors we so carefully constructed. Beyond non degeneracy (and other similar hard to compute tensor isomorphism invariants), the scrambling hides structure of the tensor we started with. The resulting tensor is non degenerate and indistinguishable from random tensors under the tensor isomorphism hardness assumption. Even finding one non degenerate tensor of the given format is interesting! But, we want to sample from a distribution with support close to the number of tensors of that format. We set as a coarse estimate of the sampler’s “degrees of freedom” and try to maximise it, hoping to approach . This is a crude metric, since a true measure of pseudo randomness would judge the distribution of our samples across the orbits of the scrambling action. But this is difficult to gauge, given the difficulty of the tensor isomorphism problem and we leave it for future work.
Diagonal interior and boundary format tensors
We next sketch the main ideas of the first step, with the aid of illustrative small examples of diagonal and Vandermonde-Weyman-Zelevinsky tensors. For every interior or boundary format, Weyman and Zelevinsky defined a notion of diagonal tensors. The diagonal entries are easiest to describe for three dimensional boundary formats , say with . In this case, the diagonal entries are those whose first coordinate index is the sum of the rest of the coordinate indices. A boundary format diagonal tensor is pictured below, with only the diagonal entries labeled and visible.
The description of diagonal entries for interior formats needs a little more notation and we defer it to later sections. Either way, for all interior and boundary formats, there is a simple rule to identify which tensor coordinates are diagonal. Weyman and Zelevinsky proved that hyperdeterminants of interior or boundary format have a monomial lying as a vertex of the Newton polytope, consisting purely of positive powers of all the diagonal entries [23][Theorem 7.1]! Further, a boundary format tensor whose diagonal entries are precisely the non-zero entries is non degenerate. This leads to a simple sampling algorithm. Pick a diagonal boundary format tensor with random non zero diagonal entries. The remedy for the weak key attacks on MEDS is thus simple, to merely sample the public key tensors this way and scramble. For the MEDS relevant boundary formats, the degrees of freedom is . For interior format diagonal tensors, we can write down a monomial in the hyperdeterminant involving all the diagonal entries. But there could be other monomials making it difficult to find an assignment of diagonal entries such that the hyperdeterminant provably does not vanish. The obvious question we leave open is if there is a polynomial time algorithm to sample non degenerate interior format tensors, even when restricted to cubic three dimensional formats. We work out some small examples and hint at the possibility of using diagonal tensors towards this goal.
Vandermonde-Weyman-Zelevinsky boundary format tensors
Boundary formats accomodate a curious alternative to diagonal tensors, albeit with much fewer degrees of freedom. Weyman and Zelevinsky constructed boundary format analogues of Vandermonde matrices, which we propose to use to generate non-singular tensors [23]. Classical Vandermonde matrices are structured square matrices completely described by a vector of entries, whose singularity is characterised by the distinctness of the entries of the vector. Weyman and Zelevinsky constructed structured boundary format tensors completely characterised by vectors, packaged as the columns of a defining matrix. Its degeneracy is characterised by the distinctness of the column entries of the description matrix. We will call such tensors Vandermonde-Weyman-Zelevinsky (VWZ) tensors. By simply drawing a description matrix whose columns each have distinct elements, we construct a non-singular boundary format tensor. This construction works in arbitrary dimension. As an example, a matrix defines a boundary format VWZ tensor, as in figure 1.
Binet-Cauchy and high dimensional boundary format tensors
As the second family of samplers, we propose a recursive algorithm for constructing high dimensional non degenerate boundary format tensors from fewer dimensional ones by exploiting the multiplicativity of hyperdeterminants. Dionisi and Ottaviani’s [5] high dimensional analogue of the the Binet-Cauchy theorem is key to preserving non degeneracy during the recursion. This may be seen as a reduction of the non-singular tensor sampling problem (for boundary formats) from arbitrary to three dimensions. The smaller dimensional problems may be solved by sampling diagonal tensors, Vandermonde-Weyman-Zelevnisky tensors or by other methods devised in the future. Further, if the smaller dimensional instance is of small enough format, it can be solved exhaustively or using the algorithms in [12]. Curiously, the scrambling we do in the recursive framework at the interior vertices of the recursion tree can scramble the tensors across the orbits of the tensor isomorphism action. Therefore, this is a robust framework promising pseudorandom boundary format non degenerate tensors. Tensor isomorphism based cryptography is based on the action of random tuples of invertible matrices multiplying in each dimension. In our recursive sampling, we identify a more general scrambling action by convolution of non degenerate tensors. It is a fascinating open problem to construct cryptographic primitives using convolution of non degenerate tensors. A challenge or an opportunity in using convolution of non degenerate tensors is that the tensor dimension increases.
Exterior format tensors as boundary format slices
For exterior formats, we start with a non degenerate boundary format tensor in one higher dimension. This boundary format is chosen to envelope the target exterior format, such that the slices of the boundary format in the longest dimension are of the target exterior format. Non degeneracy of the enveloping boundary format ensures non degeneracy of every slice in the longest dimension.
Nuances in positive characteristic
Evidently, the theory of hyperdeterminants developed by Gelfand, Kapranov and Zelevinsky [7][6, Chap. 14] play a central role in our constructions, alongside further developments by Weyman and Zelevinsky [23]. But these foundational works built the theory over the complex numbers. We need the theory to hold in positive characteristic. We could look to generic model theoretic tools such as Lefschetz principle to lift the theory from complex numbers to positive characteristic, say to an algebraic closure of our finite field. But such a generic method would exclude a finite set of primes from being the characteristic, without explicit knowledge of which primes are exclude. This is unsatisfactory for cryptography, where we need to know if the theorems work for our chosen characteristic. Further, the very definition of hyperdeterminants uses geometric tools (such as tangency and projective duality) that need great care while translating to positive characteristic [14, 15]. Thankfully, Kaji proved that the hyperdeterminant theory does indeed translate to every prime characteristic [13]. We take this for granted and invoke theorems from hyperdeterminant theory originally stated in characteristic zero without further clarification. One exception is the degeneracy characterisation of Vandermonde-Weyman-Zelevinsky tensors [23, Prop. 7.3]. We observe that only one direction of this characterisation is needed by us. For this direction, we present a self contained elementary exposition of Weyman and Zelevinsky’s proof in theorem 2, making it apparent that is works in all characteristics.
2 Sampling non degenerate tensors
Let denote the finite field with elements. For positive numbers an -dimensional tensor over of format is an element
in the tensor product of dual vector spaces. We will use exclusively to index dimensions . Fix a coordinate system for the -vector space , or equivalently an ordered basis for the dual . Then, identify with the -dimensional matrix
Associated with is the multilinear form
There is a trichotomy of tensor formats depending on the convexity constraint
| (2.1) |
Formats that satisfy equation 2.1, with the further assurance that there is at least one satisfying the equation with equality are called as boundary formats. Formats that satisfy equation 2.1 that are not boundary are called as interior. We call all other formats exterior.
Degeneracy and hyperdeterminants
Call the tensor degenerate if and only if there is an -tuple of non zero vectors such that in every dimension ,
| (2.2) |
The inner summation is over all dimensions except . That is,
| (2.3) |
where again the summation is over all dimensions except . This notion of degeneracy is identical to that in [6], except that there it is stated in terms of an -tuple of projective vectors instead of non zero vectors. It is also identical to the existence of “triangles” in [20]. Consider a format that is either interior or boundary. The hyperdeterminant
is an element in the coordinate ring of the tensor that vanishes precisely when is degenerate. In particular, it is a monic irreducible polynomial in the entries of the tensor whose degree can be exponential in the lengths of the dimensions, even for three dimensions. Each boundary or interior format has an associated hyperdeterminant polynomial, but we suppress this from the notation for hyperdeterminants, as it will be clear from the context. We refer the reader to [6] for a comprehensive treatment on hyperdeterminants. The most critical fact we use is that a boundary or interior format is degenerate precisely when .
Tensor isomorphism
An -tuple of invertible matrices acts on format tensors by multiplication in the respective dimensions. We denote the result of the action by . To clarify, the multilinear form associated with is
We call two tensors isomorphic if there exists such that If , then . Therefore, tensor isomorphism is symmetric and an equivalence relation. The tensor isomorphism problem is to decide if two given tensors are isomorphic, which is believed to be hard. Grochow and Qiao built an intricate web of hard problems that reduce to tensor isomorphism, including some longstanding hard problems that lay at the foundation of multivariate cryptography. Complexity theoretically, the tensor isomorphism problem is -, and believed to be hard on average in theory and practice [10]. The best known run time of is through Sun’s p-group isomorphism algorithm [21] (in conjunction with a reduction in [10]). The promise search version, asks for an isomorphism (an -tuple of invertible matrices) between two given two isomorphic tensors. Spurred on by this hardness, several post-quantum digital signature schemes including MEDS [3] and ALTEQ [1, 22] have recently been proposed and part of NIST’s first round of on-ramp post-quantum signatures, all reliant on tensor isomorphism hardness assumptions, or hardness assumptions that reduce to tensor isomorphism.
2.1 Diagonal non degenerate tensors
We next describe the sampling algorithm based on the diagonal tensor theory of Weyman and Zelevinsky [23]. For a dimension , define the semigroup
of all non negative index -tuples satisfying the convexity constraint. Consider -dimensional formats that are either interior or boundary. That is, . The set of all diagonal indices for the format is defined as
For boundary formats with , this simplifies to
A tensor is called diagonal when all the entries corresponding to off diagonal indices are zero. As an example, the diagonal interior format tensor looks as in figure 2, with only the diagonal entries visible and labeled.
The hyperdeterminant of the format was determined in [23, 7.11] using the computer algebra package MACAULAY as
| (2.4) | ||||
Apparent from the example, the hyperdeterminant of the interior format diagonal tensors is not a monomial. Therefore, merely picking a diagonal tensor with non zero diagonal entries does not imply non degeneracy for interior formats. For formats, it is easy to sample non degenerate diagonal tensors: set all but one of the diagonal entries to be random non zero elements, and set the remaining diagonal entry such that equation 2.4 is non zero. For this strategy to generalise, one needs to compute the hyperdeterminant of interior format diagonal tensors, which remains a curious open problem. By [23, Theorem 7.1], the hyperdeterminant (for both interior and boundary formats) has a monomial
lying as a vertex of the Newton polytope, consisting purely of positive powers of all the diagonal entries with coefficient . Further, the exponents can be determined [23, Remark 7.2(b)]. For the example, this corresponds to the monomial . Knowing there is such a monomial lying as a vertex of the Newton polytope may be a first step in sampling non degenerate interior format tensors. But we leave this as an open problem (even in three dimensions). However, hyperdeterminants of boundary format diagonal tensors only consist of this monomial, as observed by Weyman and Zelevinsky [23, Remark 7.3(c)], which we exploit in the following sampling algorithm.
2.1.1 Sampling non degenerate diagonal boundary format tensors
Input: A finite field and a boundary tensor format with .
-
1.
Construct a tensor by setting all the off diagonal entries
to zero and drawing the diagonal elements
uniformly and independently at random from .
-
2.
Draw a uniformly random -tuple and output
Lemma 1.
The output is non degenerate.
Proof.
Weyman and Zeleinsky [23, Remark 7.3(c)] remark that the hyperdeterminant of the boundary format diagonal tensors is the monomial consisting purely of positive powers of all the diagonal entries, defined in [23, Theorem 7.1]. To see why, they refer to the remarkable fact proven by Gelfand-Kapranov-Zelevinsky ([7, Theorem 4.3] or [6, Theorem 3.3]) that boundary format tensors have a hyperdeterminant that is the identical to the determinant of a certain (exponentially sized in ) square matrix (see also [5], for an alternate proof). When the relation is specialised to diagonal boundary format tensors, the associated exponentially large square matrix has as its diagonal entries, precisely the diagonal entries of the tensor (with possible repetition). Therefore, it is clear that hyperdeterminant of diagonal boundary format tensors is a monomial. Therefore, it must be the monomial whose existence is proven in theorem [23, Theorem 7.1]. Therefore, by construction meaning is non degenerate. The hyperdeterminant is not an invariant under the action. It is only an invariant under the action. But the hyperdeterminant is a relative invariant under the [6, Chap 14, Prop. 1.4], which implies that Therefore, the output is non degenerate. For the boundary format, we get degrees of freedom, which is fewer in comparison to the number of tensor entries. More generally, for balanced -dimensional boundary formats , we get a commendable degrees of freedom compared to the entries. Here, we assume , for otherwise there is only one non zero element to place as the diagonal entries.
2.2 Vandermonde-Weyman-Zelevinsky non degenerate tensors
While constructing a Vandermonde matrix, one starts with a vector and ends up with a square matrix whose determinant vanishes precisely when the vector entries are distinct. Weyman and Zelevinsky constructed higher dimensional analogues of Vandermonde matrices for boundary format tensors. Consider a boundary format with . Start with a matrix and define the Vandermonde-Weyman-Zelevinsky tensor with entries
Theorem 2 (Weyman-Zelevinsky [23, Prop. 7.3]).
If , are distinct (that is, if each column of the starting matrix consists of distinct elements), then is non degenerate.
Proof.
Let , be distinct. Assume that is degenerate. For to be degenerate, there is an -tuple of non zero vectors such that
| (2.5) |
indexed by the first dimension vanish. To see why, the constraints in equation 2.5 form a subset of the constraints in the defining equation 2.2 of degeneracy. Substituting , we get
which decouples into products as
For , consider the following polynomials in commuting indeterminates with the coordinates of as the coefficients. Every is a non zero polynomial, since each one has coefficients encoding coordinates of non zero vectors. The constraints in equation 2.5 are equivalent to the system of polynomial equations
| (2.6) |
For , let be the set of sub indices of the roots of . To satisfy equation 2.6, it is necessary that Therefore, implying there is at least one dimension such that . But then, the non-zero polynomial has more roots than its degree , a contradiction in any field, irrespective of the characteristic. Therefore our assumption is wrong and is indeed non-singular.
Sampling non degenerate Vandermonde-Weyman-Zelevinsky tensors
Input: A finite field and a boundary tensor format with and .
-
1.
Draw a matrix uniformly with the restriction that each column has distinct entries. Let be the Vandermonde-Weyman-Zelevinsky tensor associated with . That is,
-
2.
Draw a uniformly random -tuple and output
By theorem 2, is non degenerate. As before, since the hyperdeterminant is a relative invariant of the action, the output is non degenerate. The degrees of freedom of the Vandermonde-Weyman-Zelevinsky sampler for boundary formats whose largest dimension has length is . This is small compared to the number of tensor entries, which can be .
2.3 Sampling exterior format non degenerate tensors
The difficulty with sampling non degenerate exterior format tensors is that they do not have an associated hyperdeterminant polynomial characterising degeneracy. Our insight is to first look up to appropriate boundary formats in one higher dimension and project back down to a slice in an appropriate dimension.
Sampling non degenerate exterior format tensors
Input: A finite field and an exterior tensor format .
-
1.
Without loss of generality, assume that the first dimension is the longest, that is, . Set to ensure that is a boundary format in one higher dimension.
-
2.
Sample a non degenerate tensor of boundary format , either by the diagonal sampler, or the Vandermonde-Weyman-Zelevinsky sampler, or by any other means.
-
3.
Draw a uniform and set as the -th slice of in the last dimension. That is,
-
4.
Draw a uniformly random -tuple and output
Non degeneracy of follows from [6, Cor. 3.11]. As before, since the hyperdeterminant is a relative invariant of the action, the output is non degenerate.
3 Recursive sampling using tensor convolution
Gelfand, Kapranov and Zelevinsky considered a high dimensional analogue of matrix multiplication, called convolution [6]. It is a binary operation that takes an dimensional tensor and an dimensional tensor to an dimensional tensor. As the number of columns of the left matrix and number of rows of the right matrix has to agree in usual multiplication, the two dimensions involved in tensor convolution have to be of the same length.
Convolution of tensors
Let and be tensors of formats and respectively, with two distinguished dimensions such that . Their convolution in the -th dimension is defined as the -dimensional tensor with entries
We can think of it as an inner product coupling the -th dimension of with the -th dimension of , which are of the same length. To simplify the tedious notation, here on, we will (i) restrict to boundary formats with the implicit assumption that the longest dimension is the first, and (ii) fix . Therefore, we are only considering convolutions involving the longest dimension on the right side tensor. Let be a boundary format tensor with . Let be boundary format tensor with . The convolution with respect to a dimension (implicitly, on the left) such that is the format -dimensional tensor with entries
Note that the resulting convolution is again of boundary format with the first dimension being the longest, consistent with our implicit notation.
Multiplicativity of hyperdeterminants of boundary format
The determinant of a product of square matrices is the product of the determinants. Binet-Cauchy generalises this multiplicativity of determinants when the matrices multiplied are not necessarily square. Dionisi and Ottaviani proved a high dimensional analogue of Binet-Cauchy for hyperdeterminants, which when specialised to boundary format tensors gives the following multiplicative property of hyperdeterminants.
Theorem 3.
[Dionisi-Ottaviani [5]] Let and be non degenerate boundary format tensors of formats and respectively. For every dimension such that ,
where the exponents on the right are multinomial coefficients. In particular, if and are non zero, then so is .
This suggests a recipe to build non degenerate boundary format tensors of high dimension from non degenerate boundary format tensors of fewer dimensions.
Sampling across isomorphism orbits
Let us begin to explore this idea with sampling in 4-dimensions. Let and be non degenerate boundary format tensors of formats and respectively. Then is a non degenerate boundary format tensor. We can then scramble to try to hide the convolution structure, if it were visible at all. We can do better! Draw uniformly at random and scramble before convolving. The resulting convolutions are likely where denotes that they are not isomorphic (unless by extraordinary chance, such as picking a triple of identity matrices to scramble.). This is because couples the third and fourth dimensions of 111The coupling is in the third and fourth dimensions because by convention, during convolution, we append the dimensions coming from tensor on the right to the end.. Therefore, there is no reason for and to be in the same -orbit. Yet, by theorem 3, and are both non degenerate. Therefore convolution goes beyond scrambling (which is merely a sequence of convolutions with 2-dimensional non degenerate boundary format tensors, that is, invertible square matrices). Scrambling woven into the fabric of a recursive convolution algorithm therefore promises pseudorandom non degenerate tensors with equidistribution across isomorphism orbits. We next outline the framework for a recursive algorithm, leaving precise instantiations to the future. The reason is that there is great flexibility in how the problem is divided, which can and should be tailored to the needs of the application.
Recursive sampling for boundary formats
Input: A finite field and a boundary format such that .
-
1.
If , output a non degenerate tensor of the input format using a sampling technique such as using diagonal or Vandermonde-Weyman-Zelevnisky tensors.
-
2.
Else, partition the dimensions through into two non empty subsets such that has at least one element and has at least two elements. Such a partition always exists since since .
-
3.
Order the sets and arbitrarily222The ordering is not important here, but is there merely to conform to notation since formats are ordered. After the convolution, by the notational convention, all the dimensions indexing and will be appended to the end of the format.. Set . Recursively solve the problem (over the same field) for boundary formats and receiving non degenerate boundary format tensors and as the respective outputs of the recursive calls.
-
4.
Compute the convolution
-
5.
Draw a uniformly random -tuple and output
A high level depiction of the recursive sampler framework is in figure 3. As before, non degeneracy is preserved by the matrix multiplications in the last step (of each recursive call) due to the relative invariance of the hyperdeterminant. Non degeneracy is preserved by convolutions by theorem 3. Therefore, non degeneracy is preserved by compositions of matrix multiplications and convolutions, ensuring the output is non degenerate. Implicit in the construction is proof that we can hit every desired boundary format in every desired dimension using this recursive technique. One can balance the split in step 2 by demanding that and are roughly the same size. This ensures that there are at most recursive calls, which we have not tried to optimise.
One shortcoming of this convolution based sampling algorithm is that at each convolution, the degrees of freedom add up (as opposed to multiplying up). Therefore, in terms of degrees of freedom, convolution is comparable to sampling using Vandermonde-Weyman-Zelevinsky tensors and is inferior to diagonal samplers. But scrambling in the interior nodes of the recursion tree help increase the degrees of freedom. Further, merely comparing degrees of freedom may not be fair measure to the recursive sampler, since it scrambles across isomorphism orbits.
The recursive sampling technique using convolutions is of no use for interior formats, since the multiplicativity of hyperdeterminants can fail for interior formats [5]. But for exterior formats, we can invoke the lifting strategy from § 2.3. In particular, given a target exterior format, lift the problem to a boundary format in one higher dimension as detailed in § 2.3, solve it using the recursive sampler and take a random slice to descend back to the target exterior format.
References
- [1] M. Bläser, D. H. Duong, A. K. Narayanan, T. Plantard, Y. Qiao, A. Sipasseuth, and G. Tang. The alteq signature scheme: Algorithm specifications and supporting documentation, 2023. URL: https://pqcalteq.github.io/ALTEQ_spec_2023.09.18.pdf.
- [2] Arthur Cayley. On the theory of elimination. Dublin Math. J., pages 116–120, 1848.
- [3] Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, and Monika Trimoska. Take your meds: Digital signatures from matrix code equivalence. In Nadia El Mrabet, Luca De Feo, and Sylvain Duquesne, editors, Progress in Cryptology - AFRICACRYPT 2023, pages 28–52, Cham, 2023. Springer Nature Switzerland. doi:10.1007/978-3-031-37679-5_2.
- [4] Alain Couvreur and Christophe Levrat. Highway to hull: An algorithm for solving the general matrix code equivalence problem. Cryptology ePrint Archive, Paper 2025/596, 2025. URL: https://eprint.iacr.org/2025/596.
- [5] Carla Dionisi and Giorgio Ottaviani. The binet–cauchy theorem for the hyperdeterminant of boundary format multi-dimensional matrices. Journal of Algebra, 259(1):591–644, 2003. doi:10.1016/S0021-8693(02)00537-9.
- [6] I.M. Gelfand, M. Kapranov, and A. Zelevinsky. Discriminants, Resultants, and Multidimensional Determinants. Modern Birkhäuser Classics. Birkhäuser Boston, 2009. URL: https://books.google.es/books?id=ZxeQBAAAQBAJ.
- [7] I.M Gelfand, M.M Kapranov, and A.V Zelevinsky. Hyperdeterminants. Advances in Mathematics, 96(2):226–263, 1992. doi:10.1016/0001-8708(92)90056-Q.
- [8] Valerie Gilchrist, Laurane Marco, Christophe Petit, and Gang Tang. Solving the tensor isomorphism problem for special orbits with low rank points: Cryptanalysis and repair of an asiacrypt 2023 commitment scheme. In Leonid Reyzin and Douglas Stebila, editors, Advances in Cryptology – CRYPTO 2024, pages 141–173, Cham, 2024. Springer Nature Switzerland. doi:10.1007/978-3-031-68376-3_5.
- [9] Michelangelo Grigni, Leonard Schulman, Monica Vazirani, and Umesh Vazirani. Quantum mechanical algorithms for the nonabelian hidden subgroup problem. In Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, STOC ’01, pages 68–74, New York, NY, USA, 2001. Association for Computing Machinery. doi:10.1145/380752.380769.
- [10] Joshua Grochow and Youming Qiao. On the complexity of isomorphism problems for tensors, groups, and polynomials i: Tensor isomorphism-completeness. SIAM Journal on Computing, 52(2):568–617, 2023. doi:10.1137/21M1441110.
- [11] Christopher J. Hillar and Lek-Heng Lim. Most tensor problems are np-hard. J. ACM, 60(6), November 2013. doi:10.1145/2512329.
- [12] Antoine Joux and Anand Kumar Narayanan. A High Dimensional Cramer’s Rule Connecting Homogeneous Multilinear Equations to Hyperdeterminants. In Raghu Meka, editor, 16th Innovations in Theoretical Computer Science Conference (ITCS 2025), volume 325 of Leibniz International Proceedings in Informatics (LIPIcs), pages 62:1–62:16, Dagstuhl, Germany, 2025. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2025.62.
- [13] Hajime Kaji. On the duals of segre varieties. Geometriae Dedicata, 99(1):221–229, June 2003. doi:10.1023/A:1024968503486.
- [14] S.L. Kleiman. Tangency and Duality. Københavns Universitet. Matematisk Institut, 1985. URL: https://books.google.es/books?id=M9MlrgEACAAJ.
- [15] Steven Kleiman and Ragni Piene. On the inseparability of the gauss map. American Journal of Mathematics., 123:107–129, 1991.
- [16] Anand Kumar Narayanan. Trapdoor one-way functions from tensors. Cryptology ePrint Archive, Paper 2025/624, 2025. URL: https://eprint.iacr.org/2025/624.
- [17] Anand Kumar Narayanan, Youming Qiao, and Gang Tang. Algorithms for matrix code and alternating trilinear form equivalences via new isomorphism invariants. In Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III, pages 160–187, Berlin, Heidelberg, 2024. Springer-Verlag. doi:10.1007/978-3-031-58734-4_6.
- [18] Luke Oeding. Hyperdeterminants of polynomials. Advances in Mathematics, 231(3):1308–1326, 2012. doi:10.1016/j.aim.2012.06.023.
- [19] Jacques Patarin. Hidden fields equations (hfe) and isomorphisms of polynomials (ip): Two new families of asymmetric algorithms. In Ueli Maurer, editor, Advances in Cryptology — EUROCRYPT ’96, pages 33–48, Berlin, Heidelberg, 1996. Springer Berlin Heidelberg. doi:10.1007/3-540-68339-9_4.
- [20] Lars Ran and Simona Samardjiska. Rare structures in tensor graphs - bermuda triangles for cryptosystems based on the tensor isomorphism problem. Cryptology ePrint Archive, Paper 2024/1396, 2024. URL: https://eprint.iacr.org/2024/1396.
- [21] Xiaorui Sun. Faster isomorphism for p-groups of class 2 and exponent p. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, pages 433–440, New York, NY, USA, 2023. Association for Computing Machinery. doi:10.1145/3564246.3585250.
- [22] Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, and Willy Susilo. Practical post-quantum signature schemes from isomorphism problems of trilinear forms. Eurocrypt 2022, 2022. URL: https://eprint.iacr.org/2022/267.
- [23] Jerzy Weyman and Andrei Zelevinsky. Singularities of hyperdeterminants. Annales de l’Institut Fourier, 46(3):591–644, 1996. doi:10.5802/aif.1526.
