<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Public key cryptography based on the clique and learning parity with noise problems for post-quantum cryptography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Peter Hudoba peter.hudoba@inf.elte.hu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ELTE Eotvos Lorand University Faculty of Informatics Budapest</institution>
          ,
          <country country="HU">Hungary</country>
        </aff>
      </contrib-group>
      <fpage>102</fpage>
      <lpage>112</lpage>
      <abstract>
        <p>In this paper we propose a new method for public key encryption. The scheme's security is based on the well-known clique and learning parity with noise problems. The relevance of this approach is justi ed by its post-quantum nature: unlike RSA and other cryptosystems based on the hardness of factorization or discrete logarithm which could be broken by a suitable large quantum device, no known quantum attacks are known against our candidate system. We examine the time complexity of our scheme and compare it to RSA.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In this paper we follow this idea and approach for public key encryption to extend the possibilities for
constructions. Our aim is to open a new way, but admittedly this method is still not e cient enough for real
life internet usage.</p>
      <p>We note that post-quantum cryptography is not to be confused with quantum cryptography. In post-quantum
cryptography the schemes use only classic computers but are assumed to be secure against algorithms run on
a quantum machine; whereas in quantum cryptography we use quantum techniques, i.e. physical quantum
phenomena for encryption.</p>
      <p>In our approach we combine a well-studied lattice problem with a problem from graph theory to obtain a new
scheme.
1.1</p>
      <sec id="sec-1-1">
        <title>Overview</title>
        <p>In the remaining part of this section we brie y describe the hard problems used.</p>
        <p>In Section 2 we describe prior work which led to the current state of the art and de ne a building block
(encryption method) from an already existing public key encryption scheme, nally discuss the correctness and
validity.</p>
        <p>Section 3 gives the proposal of the new key generation method for the given encryption method and we discuss
the security of the key.</p>
        <p>Finally in Section 4 we discuss the key security of the new scheme.
1.2</p>
      </sec>
      <sec id="sec-1-2">
        <title>Learning parity with noise (LPN)</title>
        <p>A popular area in post-quantum cryptography is lattice-based cryptography, introduced by Ajtai in 1996 [Ajt96].
Here, lattices are used for building an encryption scheme. A widely studied lattice-based problem is the closest
vector problem (CVP) where we have a vector (not necessary on the lattice) and a lattice, and we have to nd
the closest lattice point and determine that with the given basis. In small dimension it is an easy problem, but
in higher dimensions it gets hard { NP-hardness results exist proving that random instances of the problem are
basically as hard as the worst case instances.</p>
        <p>Outside theoretical computer science, the linear code decoding problem is closely related to the CVP, if the
lattice is the codeword space and the given vector is the transmitted message with some noise. This problem is
also considered hard.</p>
        <p>
          A further closely related problem is the learning with errors (LWE) lattice problem introduced in [Reg09]. In
the last few years it has been shown to have nice post-quantum cryptographic uses
          <xref ref-type="bibr" rid="ref15">(summarized by Regev in
2010 [Reg10])</xref>
          one of which is the following inversion problems which is hard under certain assumptions:
Given M 2 Fqm n and s 2 Fqn, a secret value, we have to determine s from M s + e where e is some small error.
        </p>
        <p>Two of the most promising candidates today for post-quantum cryptography are lattice-based schemes: NTRU
[HPS98] and Ring-LWE [LPR10,DXL12,GLP12,Pei14].</p>
        <p>In the special case where q = 2 we use only binary values in LWE.</p>
        <p>The learning parity with noise problem is a well-studied problem widely considered appropriate for constructing
cryptography schemes. It has the big advantage that the calculation (M s + e) is a lot cheaper than the classic
solutions, but inversion is hard. For some uses and more details, see [Mel13].
1.3</p>
      </sec>
      <sec id="sec-1-3">
        <title>Clique problem</title>
        <p>The clique problem is a basic problem from graph theory where given an input graph and an integer k, we have
to decide whether the graph contains a complete subgraph (clique) of size k. A classical result is the following
(we give quantitative formal hardness results later).</p>
        <p>It is hard to nd a clique (complete subgraph) of size k in a random graph.</p>
        <p>The main advantage of using this problem is that it is an NP-complete problem, so if we can reduce breaking
our encryption scheme to this hard problem, the attacker will also ght against the millennium problem \P
versus NP".</p>
        <p>In the post-quantum world there is a quantum algorithm that solves NP-complete problems: Grover's
algorithm [Gro96]. This algorithm gives a reasonable speedup compared to known classical algorithms but still
doesn't pose a threat to NP-hard problems in general.</p>
        <p>The proposed encryption method is not the rst one using the clique problem for constructing a scheme, see
e.g. [Kuc91,JP00].
1.4</p>
      </sec>
      <sec id="sec-1-4">
        <title>Some notation</title>
        <p>In the following subsection we give some basic notations to avoid confusion with the most widely used notations
in graph and probability theory.</p>
        <p>[n] := f1; :::; ng</p>
        <p>8n 2 N
a is chosen randomly from A.</p>
        <p>Un uniform distribution over binary vectors of length n.</p>
        <sec id="sec-1-4-1">
          <title>Ber"n distribution binary 0</title>
          <p>1 vectors of length n where each entry is 1 independently with probability ".</p>
          <p>G (n; p) distribution of n sized random graphs where every two nodes are adjacent with probability p
(Erd}os{Renyi random graphs).</p>
          <p>G (u) set of the neighbors of node u in G.
2</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Prior work used directly</title>
      <p>In the rst section we could see the origin of our main problems, but now we describe the encryption algorithm
(based on the LPN) which serves as the base of our scheme. The algorithm was introduced in [ABW10] and we
can see it is a one-bit encryption method, but it can be easily extended to longer messages (make sure of the
independent randomness of x and e).
2.1</p>
      <sec id="sec-2-1">
        <title>The encryption method</title>
        <p>The encryption method</p>
      </sec>
      <sec id="sec-2-2">
        <title>Public key</title>
        <p>M 2 F2m n sampled from D. The distribution D is over matrices,
in which the last row is a linear combination of q 1 other rows. (q
must be small compared to m and n)</p>
      </sec>
      <sec id="sec-2-3">
        <title>Private key</title>
        <p>A q sized subset S
row of M .</p>
      </sec>
      <sec id="sec-2-4">
        <title>Encryption</title>
        <p>Choose a random vector x
Ber"m, let b = M x + e.</p>
        <p>[m] with Pi2S Mi where Mi denotes the i-th</p>
        <p>Un and a random noise vector e
To encrypt 0, send the vector b.</p>
        <p>To encrypt 1, send the vector b with its last bit ipped .</p>
      </sec>
      <sec id="sec-2-5">
        <title>Decryption</title>
        <p>To decrypt y 2 f0; 1gn, output the Pi2s yi (mod 2).
2.2</p>
      </sec>
      <sec id="sec-2-6">
        <title>Validity and correctness</title>
        <p>Denote the sent message with M x + e + , where the is zero vector if the message 0, and 6664 0... 7757 if 1.
Theorem 7.3 from [ABW10] proves the existence of a semantically secure public key encryption scheme under
some hardness assumptions using a distribution of d-sparse matrices that is computationally indistinguishable
from the uniform distribution of d-sparse matrices.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Proposed public key encryption scheme</title>
      <p>In this section we propose a public key encryption scheme using the encryption method from [ABW10] described
in the preceding section. The scheme has a key generation algorithm based on the NP-complete clique problem.</p>
      <p>Our approach uses Erd}os{Renyi random graphs for creating a public key { private key pair. Our aim is to
inject a small linearly dependent part into the adjacency matrix of the graph and make sure it is hard to nd
that part.
3.1</p>
      <sec id="sec-3-1">
        <title>Key generation</title>
        <p>The key generation parameters:
n - graph size
p - edge probability (determines the density of the graph)
k - planted clique/independent set size
padd - ratio that determines how to change the outer connection number to even (probability for adding)
Denote the nodes of G graph with V and the edges with E.</p>
        <p>Algorithm 1 The key generation
1. Choose a random G</p>
        <p>G (n; p) graph.
2. Choose a random k sized subset from the nodes of the graph containing the last row. Denote it with S
[n].
3. Remove all edges between nodes contained in S: replace E by (En f(u; v) ju; v 2 Sg) (plant an independent
set to the positions corresponding to S).</p>
        <sec id="sec-3-1-1">
          <title>4. Iterate through fu 2 V nSj j G (u) \ Sj</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>1 (mod 2)g with u in random order</title>
          <p>(a) with padd probability add (u; v) for v
Sn G (u) to E,
(b) else remove (u; v) for v
G (u)jS from E.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Public key: G</title>
      </sec>
      <sec id="sec-3-3">
        <title>Private key: S</title>
        <p>Steps 1 to 3 create a graph with a planted independent set in the position denoted by S. Step 4 adds and
removes random edges to until we make sure that every node has an even number of connections to S. This latter
property guarantees that this generation algorithm gives the (mod 2) linearly dependent part in the adjacency
matrix that we need for the encryption scheme.
3.2</p>
      </sec>
      <sec id="sec-3-4">
        <title>Expected degree</title>
        <p>To achieve a graph that \looks" similar to an original G (n; p) instance, we make sure that the expected degree
in the generated graph equals to the expected degree of a graph instance from G (n; p). To achieve this, we have
to add similar number of random edges as we remove during the key generation. Using this observation we can
give a formula for the padd variable.</p>
        <p>Theorem 2. The graph generated by our key generation algorithm has similar expected degree as G (n; p) if and
only if
padd =
p
2 podd (n
k)
+
Proof. The expected number of removed edges with planting the independent set: p k2 :</p>
        <p>Denote with podd the probability that a node from V nS has an odd number of edges to the nodes corresponding
in S:
In the key generation algorithm after the planting we check all of the nodes outside the clique (V nS) and calculate
the parity. If the connection number to the S is odd, we have to add or remove one edge to make the connection
number even, otherwise we do not do anything, hence the expected number of edges that are added is
To achieve a similar expected degree as a normal random Gn;p graph, we have to add as many edges as we
removed (in expectation). This gives a formula for padd :
padd =
2 podd (n
k)
+</p>
      </sec>
      <sec id="sec-3-5">
        <title>Parameter bound</title>
        <p>We have a restriction for the parameters because clearly 0
padd
1 has to hold.</p>
        <p>Theorem 3. For the parameters of a key generation the following has to hold:
where podd is like above in Theorem 2.
p
+ k</p>
        <p>n
Proof. Plug 0
padd</p>
        <p>1 into the formula from Theorem 2.
0
p
2 podd (n
k)
+
k)
1 )
(n
k)</p>
        <p>n k
p
podd
which directly leads to the given bound.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Cryptanalysis</title>
      <p>In this section we discuss the hardness of computing the private key from public key without message sending.
In cryptography it is ordinary to prove the security with some deduction to a well-known problem, so rst of all
we deduct our key attacking problem to the well-known clique problem via Karp reductions. Next we focus on
the distribution G (n; p), and nally discuss some attacking algorithms.
4.1</p>
      <sec id="sec-4-1">
        <title>NP-hardness of nding the secret</title>
        <p>In this subsection we discuss the hardness of nding an independent set S in a graph to which every node has an
even number of connections. If one could nd such sets S e ciently, this would enable breaking the encryption
scheme above.</p>
        <p>De nition 4. The independent set problem consists of deciding the following property
Input: graph G, positive integer k.</p>
        <p>Property: G has k nodes which do not have edges between each other.</p>
        <p>Lemma 5. The independent set problem is NP-complete.</p>
        <p>De nition 6. Even neighbor independent set problem
Input: graph G, positive integer k.</p>
        <p>Property:
1) G has a set of k nodes (denoted by S) which don't have edges between them.
2) Each node outside S has an even number of neighbors from S.</p>
        <p>Theorem 7. The even neighbor independent set problem is NP-hard.</p>
        <p>Proof. Using Karp reduction to the independent set problem:
Let (V; E) := G
V 0 = G f0; 1g
E0 = f((u; 0) ; (v; 0)) j (u; v) 2 Eg [ f((u; 1) ; (v; 1)) j (u; v) 2 Eg [ f((u; 0) ; (v; 1)) j (u; v) 2 Eg
G0 := (V 0; E0)
k0 = 2k</p>
        <p>If one had an e cient algorithm for the search problem version of the even neighbor independent set problem,
one could also solve the search problem version of the clique problem.</p>
        <p>1) We have a k-sized independent set problem with G graph and k; n = jGj.
2) Use the transformation in Theorem 7 to get G0.</p>
        <p>3) Use the oracle on G0 which solves even neighbor independent set problem in polynomial time and gets
solution S.</p>
        <p>4) The original independent set position is fs0js0 s mod n; s 2 Sg
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Hardness of nding clique in G (n; p)</title>
        <p>In the previous subsection we only argued that we cannot expect to be able to e ciently solve the even neighbor
independent set problem in the worst-case. In order to formally prove the security of the proposed scheme, one
would have to prove that nding cliques in graphs obtained as the public key of this scheme is at least as hard
as nding cliques in general random graphs. We were not (yet) able to prove this, but below we give heuristic
arguments about why this might be the case. The analysis below helps us nd the optimal parameters for our
encryption, therefore we discuss the potential attacking algorithms and related studies.</p>
        <p>The simple brute force approach needs to check all the combinations of k nodes and check whether every node
adjacent with each other. In worst case after we found an independent set we have to check the even connections
from outside property.</p>
        <p>The second intuitive approach is the greedy one, which has a lot of good improvement and all of them are
based on the following two base steps:
1. Choose a random node.
2. Choose a new node which is adjacent with all of the nodes selected before.</p>
        <p>We revise some relevant results from the literature on the clique problem.</p>
        <p>The following modi ed version of the clique problem was investigated by Karp [Kar72], [Kar76]: Is there
any polynomial time algorithm that nds a k = (1 + ") lg (n) sized clique for any constant " &gt; 0?
In [Mat72], it is proved that the expected size of the maximal clique is 2 log1=p (n) 2 log1=p log1=p (n) +
2 log1=p 21 e + 1 in the Erd}os{Renyi model with parameter p. Many papers consider the p = 1=2 case and
the approximation 2 lg (n).</p>
        <p>In [GM75,Kar76], it is proved that in a uniformly generated graph, the greedy algorithm outputs a clique of
size lg (n) with high probability. By running the greedy algorithm for nk=4+o(1) times, we nd a 12 + " k
sized clique also with high probability.</p>
        <p>The original question hardened by Jerrum [Jer92]: Is there a polynomial time algorithm that nds a clique
with k 1:01 log (n) in a random graph which contains a clique of size at least n0:49 ? In this paper they
showed that some search techniques fail to e ciently nd a clique of size (1 + ") log (n) in a graph G n; 12
1
even if it is known to contain a clique of size n 2 .</p>
        <p>The G (n; p) Erd}os-Renyi random graphs are well-studied (e.g. [Bol98,Wes01]) especially the uniform case
G n; 12 .
[AKS98] gave an algorithm which solves the planted clique problem in polynomial time with high probability
for k &gt; cn0:5 cases which have some improvements [DGP14,FR10], but only the probability is improved,
the lower bound not.</p>
        <p>In [NP85] the runtime is n(!=3)k+o(1), where n!+o(1) is the runtime of the matrix multiplication. The lowest
possible value (we have not reached that yet) of ! is 2, so if we have the theoretically best matrix
multiplication algorithm, this algorithm gives a n(2=3)k+o(1) runtime. In practice this algorithm is inapplicable for
our cases, because asymptotically fast matrix multiplication algorithms are not practical for the problem
sizes we consider.
[Vas09] gave an algorithm with O nk= " log (n)k 1
runtime and O (n") space requirement.</p>
        <p>Several slight improvements appear in the following papers: [Rob01,BSK10,Ros14].</p>
        <p>Rossman [Ros14] analyzed Boolean circuits bounds for average case clique complexity and prooved that
the boolean circuits of size O nk=4 and depth at most k 2 log (n) =log (log (n)) cannot solve the k-clique
problem with high probability on G (n; p).</p>
        <p>Cryptosystems:</p>
        <p>Kucera [Kuc91] started to use the clique problem for cryptographic purposes in 1991, they used k = n
clique size, where 0 &lt; &lt; 21 .
[JP00] used the planted clique problem to construct an encryption scheme, but none of them proposed a
public key encryption scheme. They proved it is hard to claim a planted clique from an uniform Erd}os-Renyi
graph (G n; 12 )
[Ros10] raised a question in 1.3: Is there an O n(1 )k=4 time algorithm which solves the k-clique problem
with high probability on G (n; p)? If we have a negative answer for it, that would imply P 6= N P . This question
is still not answered.</p>
        <p>We can nd a lot of algorithms solving the k-clique or maximal clique problems but still there are not any
e cient algorithms even for Karp's question on a clique of size slightly above lg n.</p>
        <p>Remark 8. The most frequently considered case is the uniform G n; 21 distribution, and the interval considered
hard for the clique size log (n) &lt; k &lt; pn. If we use this interval as a boundary for the key generation parameters,
the attackers do not have any publicly known e cient algorithms.
We saw in the previous section that the hardness of the decryption strongly depends on the size of the independent
set. It is clear, we have to use at least a log (n) sized independent set as a secret key, but that is an open question
which upper bound would be better for us.</p>
        <p>It was shown that the expected maximum clique size is k 2 log (n), so in the remaining part of this paper
we investigate only graphs with k = 1:95 log (n) sized injected independent sets.
We could not formally prove that the distribution of graphs obtained as a public key of our scheme is
computationally indistinguishable from the set of all Erd}os{Renyi graphs. To compare the distribution of our key
generation to the uniform G (n; p) we used the Wilcoxon rank-sum to measure the di erence between the two
distribution and it shown a really good p-value for the typical properties like diameter, degree, average maximum
clique size etc.
As part of the research we implemented our cryptosystem in sage and compared to the classical RSA security
level with some experimental tests. Our aim was to break the cryptosystems with a publicly available algorithm.
We tried many implementations of the best algorithms against both of problems (RSA: Pollard Rho, Pollard p-1,
eld sieve , Clique/independent set: [Akk73,BK73,TIAS77,CN85,MU04,TTT06]) and the nal choice against the
RSA was the Pari/GP computer algebra system (It was faster than the publicly available sieve based on gmp
in c++, polard, etc.), and the Tomita algorithm [TTT06] against our cryptosystem (which was also faster than
the famous Bron{Kerbosch algorithm in our cases).</p>
        <p>In our measurements we used the k = 1:95 log (n) clique size, because naturally the expected maximum clique
size is 2 log (n), so our graph will be more similar to the uniform distribution.</p>
        <p>Our experimental results show that we can use nearly similar n parameter (needed little bit bigger) as used
for the RSA, so we can claim an acceptable encryption if we use the following parameter set.
n 1024
k = 1:95 log (n)
p = 0:5
padd = 0:545</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Result and conclusion</title>
      <p>We proposed a public key encryption scheme whose security is based on the di culty of the clique problem and
we expect it to be secure against quantum algorithms as well. Yet there are several improvements to be made.</p>
      <p>Currently, our key size is n22 , and the encrypted size / message size ratio is n, so during further development
we plan to improve the algorithm to get a better ratio, because now it equals to the graph size, which is a really
huge overhead to the encrypted message. The big key size can be negligible in practice, because it has to be
transfered only once and can be cached in middle points on the internet.</p>
      <p>By research of Jerrum [Jer92] we will investigate the 2 log (n) &lt; k &lt; pn interval for secret sizes, because as
we can see in previous sections, the hardness of nding an independent set exponentially grows together with
the size of the independent set. We expect to supplement present work with additional formal proofs of security
and perform more extensive experiments in the future.
[Ajt96]</p>
      <p>M. Ajtai. Generating hard instances of lattice problems, In Proceedings of the twenty-eighth annual
ACM symposium on Theory of computing 99{108, 1996.
[Akk73] E. Akkoyunlu. The enumeration of maximal cliques of large graphs, In SIAM Journal on Computing
2(1):1{6, SIAM, 1973.
[AKS98] N. Alon, M. Krivelevich, B. Sudakov. Finding a large hidden clique in a random graph, In Random</p>
      <p>Structures and Algorithms 13(3-4):457{466, 1998.</p>
      <p>C. Bron, J. Kerbosch. Algorithm 457: nding all cliques of an undirected graph, In Communications
of the ACM 16(9):575{577, ACM, 1973.</p>
      <p>B. Bollobas. Random graphs, Chapter in Modern Graph Theory 215{252, Springer, 1998.
[BSK10] S. Balaji, V. Swaminathan, K. Kannan. A simple algorithm to optimize maximum independent set,</p>
      <p>In Advanced Modeling and Optimization 12(1):107{118, 2010.</p>
      <p>N. Chiba, T. Nishizeki. Arboricity and subgraph listing algorithms, In SIAM Journal on Computing
14(1):210{223, SIAM, 1985.
[DGP14] Y. Dekel, O. Gurel-Gurevich, Y. Peres. Finding hidden cliques in linear time with high probability,</p>
      <p>
        In Combinatorics, Probability and Computing 23(01):29{49,
        <xref ref-type="bibr" rid="ref13">Cambridge Univ Press, 2014</xref>
        .
[DXL12] J. Ding, X. Xie, X. Lin. A Simple Provably Secure Key Exchange Scheme Based on the Learning with
      </p>
      <p>Errors Problem., In IACR Cryptology ePrint Archive 2012:688, 2012.</p>
      <p>U. Feige, D. Ron. Finding hidden cliques in linear time, In 21st International Meeting on Probabilistic,
Combinatorial, and Asymptotic Methods in the Analysis of Algorithms (AofA'10) 189{204, 2010.
[GLP12] T. Guneysu, V. Lyubashevsky, T. Poppelmann. Practical lattice-based cryptography: A signature
scheme for embedded systems, In International Workshop on Cryptographic Hardware and Embedded
Systems 530{547, 2012.</p>
      <p>G. R. Grimmett, C. J. McDiarmid. On colouring random graphs, In Mathematical Proceedings of the
Cambridge Philosophical Society 77(02):313{324, 1975.</p>
      <p>L. K. Grover. A fast quantum mechanical algorithm for database search, In Proceedings of the
twenty-eighth annual ACM symposium on Theory of computing 212{219, 1996.
[Jer92]
[JP00]
[Kar72]
[Kar76]
[Kuc91]
[Mat72]
[Mel13]
[MU04]
[NP85]
[Pei14]
[Reg09]
[Reg10]
[Rob01]
[Ros10]
[Ros14]
[Sho94]
[TIAS77] S. Tsukiyama, M. Ide, H. Ariyoshi, I. Shirakawa. A new algorithm for generating all the maximal
independent sets, In SIAM Journal on Computing 6(3):505{517, SIAM, 1977.
[TTT06] E. Tomita, A. Tanaka, H. Takahashi. The worst-case time complexity for generating all maximal cliques
and computational experiments, In Theoretical Computer Science 363(1):28{42, Elsevier, 2006.
[Wes01]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [ABW10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Applebaum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Barak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wigderson</surname>
          </string-name>
          .
          <article-title>Public-key cryptography from di erent assumptions</article-title>
          ,
          <source>In Proceedings of the forty-second ACM symposium on Theory of computing 171{180</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [HPS98]
          <string-name>
            <surname>J. Ho stein</surname>
          </string-name>
          , J. Pipher,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Silverman</surname>
          </string-name>
          . NTRU:
          <article-title>A ring-based public key cryptosystem</article-title>
          ,
          <source>In International Algorithmic Number Theory Symposium</source>
          <volume>267</volume>
          {
          <fpage>288</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Jerrum</surname>
          </string-name>
          .
          <article-title>Large cliques elude the Metropolis process</article-title>
          ,
          <source>In Random Structures &amp; Algorithms</source>
          <volume>3</volume>
          (
          <issue>4</issue>
          ):
          <volume>347</volume>
          {
          <fpage>359</fpage>
          , Wiley Online Library,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Peinado</surname>
          </string-name>
          .
          <article-title>Hiding cliques for cryptographic security</article-title>
          ,
          <source>In Designs, Codes and Cryptography</source>
          <volume>20</volume>
          (
          <issue>3</issue>
          ):
          <volume>269</volume>
          {
          <fpage>280</fpage>
          , Springer,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Karp</surname>
          </string-name>
          .
          <article-title>Reducibility among combinatorial problems</article-title>
          ,
          <source>Chapter in Complexity of computer computations 85{103</source>
          , Springer,
          <year>1972</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Karp</surname>
          </string-name>
          .
          <article-title>The probabilistic analysis of some combinatorial search algorithms</article-title>
          ,
          <source>In Algorithms and complexity: New directions and recent results</source>
          <volume>1</volume>
          :
          <fpage>19</fpage>
          , Academic Press, New York,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Kucera</surname>
          </string-name>
          .
          <article-title>A generalized encryption scheme based on random graphs</article-title>
          ,
          <source>In International Workshop on Graph-Theoretic Concepts in Computer Science</source>
          <volume>180</volume>
          {
          <fpage>186</fpage>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [LPR10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lyubashevsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Peikert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Regev</surname>
          </string-name>
          .
          <article-title>On ideal lattices and learning with errors over rings</article-title>
          ,
          <source>In Annual International Conference on the Theory and Applications of Cryptographic Techniques</source>
          <volume>1</volume>
          {
          <fpage>23</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Matula</surname>
          </string-name>
          .
          <article-title>Employee party problem</article-title>
          ,
          <source>In Notices of the American Mathematical Society</source>
          <volume>19</volume>
          (
          <issue>2</issue>
          ):A382{
          <fpage>A382</fpage>
          ,
          <year>1972</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Melis</surname>
          </string-name>
          .
          <article-title>On the Learning Parity with Noise Problem</article-title>
          , In ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Makino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Uno</surname>
          </string-name>
          .
          <article-title>New algorithms for enumerating all maximal cliques</article-title>
          ,
          <source>In Scandinavian Workshop on Algorithm Theory</source>
          <volume>260</volume>
          {
          <fpage>272</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Nesetril</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Poljak</surname>
          </string-name>
          .
          <article-title>On the complexity of the subgraph problem</article-title>
          ,
          <source>In Commentationes Mathematicae Universitatis Carolinae</source>
          <volume>26</volume>
          (
          <issue>2</issue>
          ):
          <volume>415</volume>
          {
          <fpage>419</fpage>
          , Charles University in Prague,
          <source>Faculty of Mathematics and Physics</source>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Peikert</surname>
          </string-name>
          .
          <article-title>Lattice cryptography for the internet</article-title>
          ,
          <source>In International Workshop on Post-Quantum Cryptography</source>
          <volume>197</volume>
          {
          <fpage>219</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Regev</surname>
          </string-name>
          .
          <article-title>On lattices, learning with errors, random linear codes, and cryptography</article-title>
          ,
          <source>In Journal of the ACM (JACM) 56</source>
          (
          <issue>6</issue>
          ):
          <fpage>34</fpage>
          ,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Regev</surname>
          </string-name>
          .
          <article-title>The learning with errors problem</article-title>
          , In Invited survey in CCC,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Robson</surname>
          </string-name>
          .
          <article-title>Finding a maximum independent set in time O (2n/4</article-title>
          ), ,
          <source>Technical report, Technical Report 1251-01</source>
          , LaBRI,
          <string-name>
            <surname>Universite Bordeaux</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Rossman</surname>
          </string-name>
          .
          <source>Average-Case Complexity of Detecting Cliques</source>
          ,
          <string-name>
            <surname>ProQuest</surname>
            <given-names>LLC</given-names>
          </string-name>
          , In Ann Arbor, MI,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Rossman</surname>
          </string-name>
          .
          <article-title>The monotone complexity of k-clique on random graphs</article-title>
          ,
          <source>In SIAM Journal on Computing</source>
          <volume>43</volume>
          (
          <issue>1</issue>
          ):
          <volume>256</volume>
          {
          <fpage>279</fpage>
          ,
          <string-name>
            <surname>SIAM</surname>
          </string-name>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>P. W.</given-names>
            <surname>Shor</surname>
          </string-name>
          .
          <article-title>Algorithms for quantum computation: Discrete logarithms and factoring</article-title>
          ,
          <source>In Foundations of Computer Science</source>
          ,
          <source>1994 Proceedings., 35th Annual Symposium on 124{134</source>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Vassilevska</surname>
          </string-name>
          .
          <article-title>E cient algorithms for clique problems</article-title>
          ,
          <source>In Information Processing Letters</source>
          <volume>109</volume>
          (
          <issue>4</issue>
          ):
          <volume>254</volume>
          {
          <fpage>257</fpage>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>D. B. West</surname>
          </string-name>
          .
          <article-title>Introduction to graph theory, 2</article-title>
          , Prentice hall Upper Saddle River,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>