Abstract
Lattice basis reduction algorithms, such as LLL, play a very important role in cryptography, which usually aim to find a lattice basis with good “orthogonality”. However, not every lattice has an orthogonal basis, which means that we can only find some nearly orthogonal bases for these lattices. In this paper, we show that every integral lattice must have two types of special bases related to the orthogonality. First, any integral lattice with rank more than 1 has a class of bases such that the angle between any two basis vectors lies in \([\frac{\pi }{3},\frac{2\pi }{3}]\). Second, any integral lattice with rank more than 2 has a class of bases such that any basis can be divided into two sets and the vectors in every set are pairwise orthogonal. To obtain such results, we introduce the technique called unimodular congruence transformation for the Gram matrix.
This research is supported by the NNSF of China (No. 11201458, No. 11471314, No. 61121062, and No. 61572490), in part by 973 Project (No. 2011CB302401) and in part by the National Center for Mathematics and Interdisciplinary Sciences, CAS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key \(d\) less than \(N^{0.292}\). In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1–11. Springer, Heidelberg (1999)
Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal gaussians. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 40–56. Springer, Heidelberg (2013)
Eichler, M.: Note zur Theorie der Kristallgitter. Math. Ann. 125, 51–55 (1952)
Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1–17. Springer, Heidelberg (2013)
Gauss, C.F.: Disquisitiones Arithmeticae. Springer, New York (1801)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing, pp. 169–178. ACM, Maryland (2009)
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: 40st ACM Symposium on Theory of Computing, pp. 197–206. ACM, Canada (2008)
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998)
Lagrange, J.L.: Recherches d’arithmétique. Nouveaux Mémoires de l’Académie de Berlin (1773)
Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring polynomials with rational coeffcients. Math. Ann. 261, 515–534 (1982)
Odlyzko, A.M.: The rise and fall of knapsack cryptosystems. In: Symposia in Applied Mathematics, vol. 42, pp. 75–88. A.M.S. (1990)
Shoup, V.: NTL: A library for ng number theory. http://www.shoup.net/ntl/
Acknowledgement
We very thank the anonymous referees for their valuable suggestions on how to improve the presentation of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, R., Pan, Y. (2016). Two Types of Special Bases for Integral Lattices. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)