11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

133 7.5 Sublattice and Generalized Bound<br />

Let us define the following notation:<br />

C(α,k) = k2 (1−2α)+k(5α−2)−2α+1− √ k 2 (1−α 2 )+2k(α 2 −1)+1<br />

.<br />

k 2 −3k +2<br />

We will use this notation in the following theorem as well as in later part <strong>of</strong> this<br />

chapter. Now we present the main result describing the bound on β.<br />

Theorem 7.12. Consider EPACDP with g ≈ a 1−α and ˜x 2 ≈ ··· ≈ ˜x k ≈ a α+β .<br />

Then, under Assumption 1, one can solve EPACDP in poly{loga,exp(k)} time<br />

when<br />

β <<br />

with the constraint 2α+β ≤ 1.<br />

{<br />

C(α,k), for k > 2<br />

1−3α+α 2 , for k = 2<br />

Pro<strong>of</strong>. We start by explaining the shift polynomials. First we consider the following<br />

ones which are same as given in Equation (7.9) in the previous section.<br />

H j2 ,...,j k<br />

(x 2 ,...,x k ) = h j 2<br />

2 ···h j k<br />

k<br />

a m−j 2−···−j k<br />

1 , (7.20)<br />

for non-negative integers j 2 ,...,j k such that j 2 +···+j k ≤ m, where the integer<br />

m ≥ 0 fixed. Further, we define another set <strong>of</strong> shift polynomials<br />

with the following:<br />

H ′ i 2 ,0,...,0,j 2 ,...,j k<br />

(x 2 ,...,x k ) = x i 2<br />

2 h j 2<br />

2 ···h j k<br />

k<br />

, (7.21)<br />

1. 1 ≤ i 2 ≤ t, for a positive integer t, and<br />

2. j 2 +···+j k = m, for non-negative integers j 2 ,...,j k .<br />

Note that this set <strong>of</strong> shift polynomials is a sub-collection <strong>of</strong> the polynomials presented<br />

in Equation (7.10).<br />

Next, we define L ′ using the coefficient vectors <strong>of</strong><br />

H j2 ,...,j k<br />

(x 2 X 2 ,...,x k X k ), and<br />

H ′ 0,...,i n,...,0,j 2 ,...,j k<br />

(x 2 X 2 ,...,x k X k ).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!