Papers
Topics
Authors
Recent
Search
2000 character limit reached

Deconstructing the Welch Equation Using $p$-adic Methods

Published 21 Aug 2016 in math.NT and cs.CR | (1608.05880v1)

Abstract: The Welch map $x \rightarrow g{x-1+c}$ is similar to the discrete exponential map $x \rightarrow gx$, which is used in many cryptographic applications including the ElGamal signature scheme. This paper analyzes the number of solutions to the Welch equation: $g{x-1+c} \equiv x \pmod{pe}$ where $p$ is a prime and $g$ is a unit modulo $p$, and looks at other patterns of the equation that could possibly be exploited in a similar cryptographic system. Since the equation is modulo $pe$, where $p$ is a prime number, $p$-adic methods of analysis are used in counting the number of solutions modulo $pe$. These methods include: $p$-adic interpolation, Hensel's lemma and Chinese Remainder Theorem.

Citations (2)

Summary

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (2)

Collections

Sign up for free to add this paper to one or more collections.