Quadratic Residuosity Problem
   HOME

TheInfoList



OR:

The quadratic residuosity problem (QRP) in
computational number theory In mathematics and computer science, computational number theory, also known as algorithmic number theory, is the study of computational methods for investigating and solving problems in number theory and arithmetic geometry, including algorithm ...
is to decide, given integers a and N, whether a is a quadratic residue modulo N or not. Here N = p_1 p_2 for two unknown primes p_1 and p_2, and a is among the numbers which are not obviously quadratic non-residues (see below). The problem was first described by
Gauss Johann Carl Friedrich Gauss (; german: Gauß ; la, Carolus Fridericus Gauss; 30 April 177723 February 1855) was a German mathematician and physicist who made significant contributions to many fields in mathematics and science. Sometimes refer ...
in his ''
Disquisitiones Arithmeticae The (Latin for "Arithmetical Investigations") is a textbook of number theory written in Latin by Carl Friedrich Gauss in 1798 when Gauss was 21 and first published in 1801 when he was 24. It is notable for having had a revolutionary impact on th ...
'' in 1801. This problem is believed to be computationally difficult. Several cryptographic methods rely on its hardness, see . An efficient algorithm for the quadratic residuosity problem immediately implies efficient algorithms for other number theoretic problems, such as deciding whether a composite N of unknown factorization is the product of 2 or 3 primes.


Precise formulation

Given integers a and T, a is said to be a ''quadratic residue modulo T'' if there exists an integer b such that :a \equiv b^2 \pmod T. Otherwise we say it is a quadratic non-residue. When T = p is a prime, it is customary to use the Legendre symbol: :\left(\frac\right) = \begin 1 & \text a \text p \text a \not\equiv 0\pmod, \\ -1 & \text a \text p, \\ 0 & \text a \equiv 0 \pmod. \end This is a
multiplicative character In mathematics, a multiplicative character (or linear character, or simply character) on a group ''G'' is a group homomorphism from ''G'' to the multiplicative group of a field , usually the field of complex numbers. If ''G'' is any group, then the ...
which means \big(\tfrac\big) = 1 for exactly (p-1)/2 of the values 1,\ldots,p-1, and it is -1 for the remaining. It is easy to compute using the
law of quadratic reciprocity In number theory, the law of quadratic reciprocity is a theorem about modular arithmetic that gives conditions for the solvability of quadratic equations modulo prime numbers. Due to its subtlety, it has many formulations, but the most standard st ...
in a manner akin to the
Euclidean algorithm In mathematics, the Euclidean algorithm,Some widely used textbooks, such as I. N. Herstein's ''Topics in Algebra'' and Serge Lang's ''Algebra'', use the term "Euclidean algorithm" to refer to Euclidean division or Euclid's algorithm, is an effi ...
, see Legendre symbol. Consider now some given N = p_1 p_2 where p_1 and p_2 are two, different unknown primes. A given a is a quadratic residue modulo N if and only if a is a quadratic residue modulo both p_1 and p_2 and gcd(a, N) = 1. Since we don't know p_1 or p_2, we cannot compute \big(\tfrac\big) and \big(\tfrac\big). However, it is easy to compute their product. This is known as the
Jacobi symbol Jacobi symbol for various ''k'' (along top) and ''n'' (along left side). Only are shown, since due to rule (2) below any other ''k'' can be reduced modulo ''n''. Quadratic residues are highlighted in yellow — note that no entry with a ...
: : \left(\frac\right) = \left(\frac\right)\left(\frac\right) This can also be efficiently computed using the
law of quadratic reciprocity In number theory, the law of quadratic reciprocity is a theorem about modular arithmetic that gives conditions for the solvability of quadratic equations modulo prime numbers. Due to its subtlety, it has many formulations, but the most standard st ...
for Jacobi symbols. However, \big(\tfrac\big) can not in all cases tell us whether a is a quadratic residue modulo N or not! More precisely, if \big(\tfrac\big) = -1 then a is necessarily a quadratic non-residue modulo either p_1 or p_2, in which case we are done. But if \big(\tfrac\big) = 1 then it is either the case that a is a quadratic residue modulo both p_1 and p_2, or a quadratic non-residue modulo both p_1 and p_2. We cannot distinguish these cases from knowing just that \big(\tfrac\big) = 1. This leads to the precise formulation of the quadratic residue problem: Problem: Given integers a and N = p_1 p_2, where p_1 and p_2 are unknown, different primes, and where \big(\tfrac\big) = 1, determine whether a is a quadratic residue modulo N or not.


Distribution of residues

If a is drawn uniformly at random from integers 0,\ldots,N-1 such that \big(\tfrac\big) = 1, is a more often a quadratic residue or a quadratic non-residue modulo N? As mentioned earlier, for exactly half of the choices of a \in \, then \big(\tfrac\big) = 1, and for the rest we have \big(\tfrac\big) = -1. By extension, this also holds for half the choices of a \in \ \setminus p_1\mathbb. Similarly for p_2. From basic algebra, it follows that this partitions (\mathbb/N\mathbb)^\times into 4 parts of equal size, depending on the sign of \big(\tfrac\big) and \big(\tfrac\big). The allowed a in the quadratic residue problem given as above constitute exactly those two parts corresponding to the cases \big(\tfrac\big) = \big(\tfrac\big) = 1 and \big(\tfrac\big) = \big(\tfrac\big) = -1. Consequently, exactly half of the possible a are quadratic residues and the remaining are not.


Applications

The intractability of the quadratic residuosity problem is the basis for the security of the
Blum Blum Shub Blum Blum Shub (B.B.S.) is a pseudorandom number generator proposed in 1986 by Lenore Blum, Manuel Blum and Michael Shub that is derived from Michael O. Rabin's one-way function. __TOC__ Blum Blum Shub takes the form :x_ = x_n^2 \bmod M, where ...
pseudorandom number generator A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random numbers. The PRNG-generate ...
. It also yields the
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic al ...
Goldwasser–Micali cryptosystem The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public-key encryption scheme which is provably ...
. as well as the identity based Cocks scheme.


See also

*
Higher residuosity problem In cryptography, most public key cryptosystems are founded on problems that are believed to be intractable. The higher residuosity problem (also called the n th-residuosity problem) is one such problem. This problem is ''easier'' to solve than ...


References

{{Computational hardness assumptions Computational number theory Computational hardness assumptions Theory of cryptography