simultaneous diophantine approximation
Recently Published Documents


TOTAL DOCUMENTS

84
(FIVE YEARS 7)

H-INDEX

12
(FIVE YEARS 1)

Mathematics ◽  
2021 ◽  
Vol 9 (22) ◽  
pp. 2931
Author(s):  
Muhammad Asyraf Asbullah ◽  
Normahirah Nek Abd Rahman ◽  
Muhammad Rezal Kamel Ariffin ◽  
Nur Raidah Salim

The modulus of type N=p2q is often used in many variants of factoring-based cryptosystems due to its ability to fasten the decryption process. Faster decryption is suitable for securing small devices in the Internet of Things (IoT) environment or securing fast-forwarding encryption services used in mobile applications. Taking this into account, the security analysis of such modulus is indeed paramount. This paper presents two cryptanalyses that use new enabling conditions to factor the modulus N=p2q of the factoring-based cryptosystem. The first cryptanalysis considers a single user with a public key pair (e,N) related via an arbitrary relation to equation er−(Ns+t)=αp2+βq2, where r,s,t are unknown parameters. The second cryptanalysis considers two distinct cases in the situation of k-users (i.e., multiple users) for k≥2, given the instances of (Ni,ei) where i=1,…,k. By using the lattice basis reduction algorithm for solving simultaneous Diophantine approximation, the k-instances of (Ni,ei) can be successfully factored in polynomial time.


Information ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 75 ◽  
Author(s):  
Yuan Ping ◽  
Baocang Wang ◽  
Shengli Tian ◽  
Jingxian Zhou ◽  
Hui Ma

By introducing an easy knapsack-type problem, a probabilistic knapsack-type public key cryptosystem (PKCHD) is proposed. It uses a Chinese remainder theorem to disguise the easy knapsack sequence. Thence, to recover the trapdoor information, the implicit attacker has to solve at least two hard number-theoretic problems, namely integer factorization and simultaneous Diophantine approximation problems. In PKCHD, the encryption function is nonlinear about the message vector. Under the re-linearization attack model, PKCHD obtains a high density and is secure against the low-density subset sum attacks, and the success probability for an attacker to recover the message vector with a single call to a lattice oracle is negligible. The infeasibilities of other attacks on the proposed PKCHD are also investigated. Meanwhile, it can use the hardest knapsack vector as the public key if its density evaluates the hardness of a knapsack instance. Furthermore, PKCHD only performs quadratic bit operations which confirms the efficiency of encrypting a message and deciphering a given cipher-text.


2017 ◽  
Vol 25 (2) ◽  
pp. 149-157
Author(s):  
Werner Georg Nowak

Abstract In the problem of (simultaneous) Diophantine approximation in ℝ3 (in the spirit of Hurwitz’s theorem), lower bounds for the critical determinant of the special three-dimensional body K2 : (y2 + z2)(x2 + y2 + z2) ≤ 1 play an important role; see [1], [6]. This article deals with estimates from below for the critical determinant ∆ (Kc) of more general star bodies Kc : (y2 + z2)c/2(x2 + y2 + z2) ≤ 1 ; where c is any positive constant. These are obtained by inscribing into Kc either a double cone, or an ellipsoid, or a double paraboloid, depending on the size of c.


2017 ◽  
Vol 25 (1) ◽  
pp. 5-11 ◽  
Author(s):  
Werner Georg Nowak

Abstract In a classic paper [14], W.G. Spohn established the to-date sharpest estimates from below for the simultaneous Diophantine approximation constants for three and more real numbers. As a by-result of his method which used Blichfeldt’s Theorem and the calculus of variations, he derived a bound for the critical determinant of the star body|x1|(|x1|3 + |x2|3 + |x3|3 ≤ 1.In this little note, after a brief exposition of the basics of the geometry of numbers and its significance for Diophantine approximation, this latter result is improved and extended to the star body|x1|(|x1|3 + |x22 + x32)3/2≤ 1.


Sign in / Sign up

Export Citation Format

Share Document