Abstract
We study the computational problem Trafo of finding an integral equivalence transform between two given quadratic forms. This is motivated by a recent identification scheme based on this problem [10]. We prove that for indefinite forms over ℤ, its hardness is concentrated in dimensions 3 and 4. Moreover, over the field of rational numbers the complexity of Trafo is closely related to that of factoring. However, for definite forms over ℤ, as well as for forms over finite fields, the transformation problem is solvable in polynomial time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adleman, L.M., Estes, D.R., McCurley, K.S.: Solving bivariate quadratic congruences in random polynomial time. Mathematics of Computation 48(177), 17–28 (1987)
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst- case/average-case equivalence. In: Proceedings of the 29th annual ACM symposium on theory of computing, El Paso, TX, USA, May 4-6, 1997, pp. 284–293. Association for Computing Machinery (1997)
Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.: Strengths and weaknesses of quantum computing. SIAM Journal of Computing 26(5), 1510–1523 (1997)
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo- random number generator. SIAM Journal of Computing 15, 364–383 (1986)
Cassels, J.W.S.: Rational quadratic forms. Mathematical Society Monographs, vol. 13. Academic Press, London (1978)
Cohen, H., Lenstra jun, H.W.: Heuristics on class groups of number elds, Number Theory. In: Proc. Journ. arith., Noordwijkerhout 1983. LNCS, vol. 1068, pp. 33–62. Springer, Heidelberg (1984)
Cohen, H., Martinet, J.: Class groups of number elds: Numerical heuristics. Mathematics of Computation 48(177), 123–137 (1987)
Crandall, R., Pomerance, C.: Prime numbers: A computational perspective. Springer, Heidelberg (2001)
Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryp- tosystems from lattice reduction problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112–131. Springer, Heidelberg (1997)
Hartung, R.J., Schnorr, C.-P.: Public key identification based on the equivalence of quadratic forms. In: Kučera, L., Kučera, A. (eds.) MFCS 2007. LNCS, vol. 4708, pp. 333–345. Springer, Heidelberg (2007)
Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J.H., Whyte, W.: NTRUSign: Digital signatures using the NTRU lattice. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 122–140. Springer, Heidelberg (2003)
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998)
Hoffstein, J., Pipher, J., Silverman, J.H.: NSS: an NTRU lattice-based signature scheme. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 211–228. Springer, Heidelberg (2001)
Ivanyos, G., Szánto, Á.: Lattice basis reduction for indefinite forms and an application. Journal on Discrete Mathematics 153(1-3), 177–188 (1996)
Kannan, R.: Minkowski’s convex body theorem and integer programming. Mathematics of Operations Research 12(3), 415–440 (1987)
Khot, S.: Hardness of approximating the shortest vector problem in lattices. Journal of the ACM 52(5), 789–808 (2005)
Micciancio, D., Goldwasser, S.: Complexity of lattice problems: a cryptographic perspective. The Kluwer International Series in Engineering and Computer Science, vol. 671. Kluwer Academic Publishers, Dordrecht (March 2002)
O’Meara, O.T.: Introduction to quadratic forms, Grundlehren der mathematischen Wissenschaften in Einzeldarstellungen, vol. 117. Springer, Heidelberg (reprinted, 2000)
Plesken, W., Pohst, M.E.: Constructing integral lattices with pre- scribed minimum. I, Mathematics of Computation 45, 209–221 (1985)
Plesken, W., Souvignier, B.: Computing isometries of lattices. Mathematics of Computation 45, 209–221 (1985)
Schnorr, C.-P.: Reduction of quadratic forms reconsidered (preprint, 2004)
Simon, D.: Quadratic equations in dimensions 4, 5 and more (preprint, 2005)
Simon, D.: Solving quadratic equations using reduced unimodular quadratic forms. Mathematics of Computation 74(251), 1531–1543 (2005)
Stehlé, D., Hanrot, G.: Improved analysis of Kannan’s shortest lattice vector algorithm. In: Menezes, A.J. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 170–186. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hartung, R.J. (2008). Cryptography Based on Quadratic Forms: Complexity Considerations. In: Lucks, S., Sadeghi, AR., Wolf, C. (eds) Research in Cryptology. WEWoRC 2007. Lecture Notes in Computer Science, vol 4945. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88353-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-88353-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88352-4
Online ISBN: 978-3-540-88353-1
eBook Packages: Computer ScienceComputer Science (R0)