Deterministic Cryptographic Seed Generation via Cyclic Modular Inversion over $\mathbb{Z}/3^p\mathbb{Z}$
- URL: http://arxiv.org/abs/2507.03000v1
- Date: Wed, 02 Jul 2025 00:17:55 GMT
- Title: Deterministic Cryptographic Seed Generation via Cyclic Modular Inversion over $\mathbb{Z}/3^p\mathbb{Z}$
- Authors: Michael A. Idowu,
- Abstract summary: We present a framework for cryptographic seed generation based on cyclic modular inversion over $mathbbZ/3pmathbbZ$.<n>The mapping yields entropy-rich, cycle-complete seeds well-suited for cryptographic primitives such as DRBGs, KDFs, and post-quantum schemes.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: We present a deterministic framework for cryptographic seed generation based on cyclic modular inversion over $\mathbb{Z}/3^p\mathbb{Z}$. The method enforces algebraic admissibility on seed inputs via the identity $d_k \equiv -\left(2^{k-1}\right)^{-1} \bmod 3^p$, thereby producing structured and invertible residue sequences. This mapping yields entropy-rich, cycle-complete seeds well-suited for cryptographic primitives such as DRBGs, KDFs, and post-quantum schemes. To assess the quality of randomness, we introduce the Entropy Confidence Score (ECS), a composite metric reflecting coverage, uniformity, and modular bias. Although not a cryptographic PRNG in itself, the framework serves as a deterministic entropy filter that conditions and validates seed inputs prior to their use by conventional generators. Empirical and hardware-based results confirm constant-time execution, minimal side-channel leakage, and lightweight feasibility for embedded applications. The framework complements existing cryptographic stacks by acting as an algebraically verifiable entropy filter, thereby enhancing structural soundness and auditability.
Related papers
- Symbolic Generation and Modular Embedding of High-Quality abc-Triples [0.0]
We present a symbolic identity for generating integer triples $(a, b, c)$ satisfying $a + b = c$.<n>The construction uses powers of $2$ and $3$ in combination with modular inversion in $mathbbZ/3pmathbbZ$, leading to a parametric identity with residue constraints that yield abc-triples exhibiting low radical values.
arXiv Detail & Related papers (2025-06-10T23:54:56Z) - MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations [9.738636411374223]
We investigate two natural relaxations of quantum cryptographic primitives.<n>The first involves quantum input sampling, where inputs are generated by a quantum algorithm rather than sampled uniformly at random.<n>The second relaxation, $bot$-pseudodeterminism, relaxes the determinism requirement by allowing the output to be a special symbol $bot$ on an inverse-polynomial fraction of inputs.
arXiv Detail & Related papers (2025-05-20T14:57:04Z) - Matrix encoding method in variational quantum singular value decomposition [49.494595696663524]
We propose the variational quantum singular value decomposition based on encoding the elements of the considered $Ntimes N$ matrix into the state of a quantum system of appropriate dimension.<n> Controlled measurement is involved to avoid small success in ancilla measurement.
arXiv Detail & Related papers (2025-03-19T07:01:38Z) - Tensor decomposition technique for qubit encoding of maximal-fidelity Lorentzian orbitals in real-space quantum chemistry [0.0]
We propose an efficient scheme for encoding an MO as a many-qubit state from a Gaussian-type solution.<n>We demonstrate via numerical simulations that the proposed scheme is a powerful tool for encoding MOs of various quantum chemical systems.
arXiv Detail & Related papers (2025-01-13T11:08:20Z) - Parseval Convolution Operators and Neural Networks [16.78532039510369]
We first identify the Parseval convolution operators as the class of energy-preserving filterbanks.
We then present a constructive approach for the design/specification of such filterbanks via the chaining of elementary Parseval modules.
We demonstrate the usage of those tools with the design of a CNN-based algorithm for the iterative reconstruction of biomedical images.
arXiv Detail & Related papers (2024-08-19T13:31:16Z) - Learning with Norm Constrained, Over-parameterized, Two-layer Neural Networks [54.177130905659155]
Recent studies show that a reproducing kernel Hilbert space (RKHS) is not a suitable space to model functions by neural networks.
In this paper, we study a suitable function space for over- parameterized two-layer neural networks with bounded norms.
arXiv Detail & Related papers (2024-04-29T15:04:07Z) - Deterministic identification over channels with finite output: a dimensional perspective on superlinear rates [49.126395046088014]
We consider the problem in its generality for memoryless channels with finite output, but arbitrary input alphabets.<n>Our main findings are that the maximum length of messages thus identifiable scales superlinearly as $R,nlog n$ with the block length $n$.<n>We show that it is sufficient to ensure pairwise reliable distinguishability of the output distributions to construct a DI code.
arXiv Detail & Related papers (2024-02-14T11:59:30Z) - Sufficient condition for universal quantum computation using bosonic
circuits [44.99833362998488]
We focus on promoting circuits that are otherwise simulatable to computational universality.
We first introduce a general framework for mapping a continuous-variable state into a qubit state.
We then cast existing maps into this framework, including the modular and stabilizer subsystem decompositions.
arXiv Detail & Related papers (2023-09-14T16:15:14Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Near-optimal quantum circuit construction via Cartan decomposition [4.900041609957432]
We show the applicability of the Cartan decomposition of Lie algebras to quantum circuits.
This approach can be used to synthesize circuits that can efficiently implement any desired unitary operation.
arXiv Detail & Related papers (2022-12-25T17:01:13Z) - $O(N^2)$ Universal Antisymmetry in Fermionic Neural Networks [107.86545461433616]
We propose permutation-equivariant architectures, on which a determinant Slater is applied to induce antisymmetry.
FermiNet is proved to have universal approximation capability with a single determinant, namely, it suffices to represent any antisymmetric function.
We substitute the Slater with a pairwise antisymmetry construction, which is easy to implement and can reduce the computational cost to $O(N2)$.
arXiv Detail & Related papers (2022-05-26T07:44:54Z) - Log-based Sparse Nonnegative Matrix Factorization for Data
Representation [55.72494900138061]
Nonnegative matrix factorization (NMF) has been widely studied in recent years due to its effectiveness in representing nonnegative data with parts-based representations.
We propose a new NMF method with log-norm imposed on the factor matrices to enhance the sparseness.
A novel column-wisely sparse norm, named $ell_2,log$-(pseudo) norm, is proposed to enhance the robustness of the proposed method.
arXiv Detail & Related papers (2022-04-22T11:38:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.