The computational complexity of simultaneous diophantine approximation problems
SIAM Journal on Computing
Breaking the Ong-Schnorr-Shamir signature scheme for quadratic number fields
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The use of fractions in public-key cryptosystems
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Cryptanalysis of a public-key crptosystem based on approximations by rational numbers
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Generalizing the continued fraction algorithm to arbitrary dimensions
SIAM Journal on Computing
Approximating shortest lattice vectors is not harder than approximating closet lattice vectors
Information Processing Letters
Approximating Good Simultaneous Diophantine Approximations Is Almost NP-Hard
MFCS '96 Proceedings of the 21st International Symposium on Mathematical Foundations of Computer Science
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
New lattice-based cryptographic constructions
Journal of the ACM (JACM)
MPFR: A multiple-precision binary floating-point library with correct rounding
ACM Transactions on Mathematical Software (TOMS)
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
The LLL Algorithm: Survey and Applications
The LLL Algorithm: Survey and Applications
Factoring integers and computing discrete logarithms via diophantine approximation
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Fully homomorphic encryption over the integers
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
We introduce the Inhomogeneous Simultaneous Approximation Problem (ISAP), an old problem from the field of analytic number theory. Although the Simultaneous Approximation Problem (SAP) is already known in cryptography, it has mainly been considered in its homogeneous instantiation for attacking schemes. We take a look at the hardness and applicability of ISAP, i. e., the inhomogeneous variant, for designing schemes. More precisely, we define a decisional problem related to ISAP, called DISAP, and show that it is NP-complete. With respect to its hardness, we review existing approaches for solving related problems and give suggestions for the efficient generation of hard instances. Regarding the applicability, we describe as a proof of concept a bit commitment scheme where the hiding property is directly reducible to DISAP. An implementation confirms its usability in principle (e. g., size of one commitment is 6273 bits and execution time is in the milliseconds).