Book contents
- Frontmatter
- Contents
- Preface
- Acknowledgements
- 1 Introduction
- PART I BACKGROUND
- PART II ALGEBRAIC GROUPS
- PART III EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
- PART IV LATTICES
- 16 Lattices
- 17 Lattice basis reduction
- 18 Algorithms for the closest and shortest vector problems
- 19 Coppersmith's method and related applications
- PART V CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
- PART VI CRYPTOGRAPHY RELATED TO INTEGER FACTORISATION
- PART VII ADVANCED TOPICS IN ELLIPTIC AND HYPERELLIPTIC CURVES
- Appendix A Background mathematics
- References
- Author index
- Subject index
16 - Lattices
from PART IV - LATTICES
Published online by Cambridge University Press: 05 June 2012
- Frontmatter
- Contents
- Preface
- Acknowledgements
- 1 Introduction
- PART I BACKGROUND
- PART II ALGEBRAIC GROUPS
- PART III EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
- PART IV LATTICES
- 16 Lattices
- 17 Lattice basis reduction
- 18 Algorithms for the closest and shortest vector problems
- 19 Coppersmith's method and related applications
- PART V CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
- PART VI CRYPTOGRAPHY RELATED TO INTEGER FACTORISATION
- PART VII ADVANCED TOPICS IN ELLIPTIC AND HYPERELLIPTIC CURVES
- Appendix A Background mathematics
- References
- Author index
- Subject index
Summary
The word “lattice” has two different meanings in mathematics. One meaning is related to the theory of partial orderings on sets (for example, the lattice of subsets of a set). The other meaning, which is the one relevant to us, is discrete subgroups of ℝn.
There are several reasons for presenting lattices in this book. First, there are hard computational problems on lattices that have been used as a building block for public key cryptosystems (e.g., the Goldreich–Goldwasser–Halevi (GGH) cryptosystem, the NTRU cryptosystem, the Ajtai–Dwork cryptosystem and the LWE cryptosystem); however, we do not present these applications in this book. Second, lattices are used as a fundamental tool for cryptanalysis of public key cryptosystems (e.g., lattice attacks on knapsack cryptosystems, Coppersmith's method for finding small solutions to polynomial equations, attacks on signatures and attacks on variants of RSA). Third, there are applications of lattices to efficient implementation of discrete logarithm systems (such as the GLV method; see Section 11.3.3). Finally, lattices are used as a theoretical tool for security analysis of cryptosystems, for example the bit security of Diffie–Hellman key exchange using the hidden number problem (see Section 21.7) and the security proofs for RSA-OAEP.
Some good references for lattices, applications of lattices and/or lattice reduction algorithms are: Cassels [114], Siegel [504], Cohen [127], von zur Gathen and Gerhard [220], Grötschel, Lovász and Schrijver [245], Nguyen and Stern [414, 415], Micciancio and Goldwasser [378], Hoffstein, Pipher and Silverman [261], Lenstra's chapter in [106], Micciancio and Regev's chapter in [48] and the proceedings of the conference LLL+25.
- Type
- Chapter
- Information
- Mathematics of Public Key Cryptography , pp. 337 - 346Publisher: Cambridge University PressPrint publication year: 2012
- 1
- Cited by