{"title":"An Attack on $p$-adic Lattice Public-key Cryptosystems and Signature Schemes","authors":"Chi Zhang","doi":"arxiv-2409.08774","DOIUrl":null,"url":null,"abstract":"Lattices have many significant applications in cryptography. In 2021, the\n$p$-adic signature scheme and public-key encryption cryptosystem were\nintroduced. They are based on the Longest Vector Problem (LVP) and the Closest\nVector Problem (CVP) in $p$-adic lattices. These problems are considered to be\nchallenging and there are no known deterministic polynomial time algorithms to\nsolve them. In this paper, we improve the LVP algorithm in local fields. The\nmodified LVP algorithm is a deterministic polynomial time algorithm when the\nfield is totally ramified and $p$ is a polynomial in the rank of the input\nlattice. We utilize this algorithm to attack the above schemes so that we are\nable to forge a valid signature of any message and decrypt any ciphertext.\nAlthough these schemes are broken, this work does not mean that $p$-adic\nlattices are not suitable in constructing cryptographic primitives. We propose\nsome possible modifications to avoid our attack at the end of this paper.","PeriodicalId":501064,"journal":{"name":"arXiv - MATH - Number Theory","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - MATH - Number Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.08774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Lattices have many significant applications in cryptography. In 2021, the
$p$-adic signature scheme and public-key encryption cryptosystem were
introduced. They are based on the Longest Vector Problem (LVP) and the Closest
Vector Problem (CVP) in $p$-adic lattices. These problems are considered to be
challenging and there are no known deterministic polynomial time algorithms to
solve them. In this paper, we improve the LVP algorithm in local fields. The
modified LVP algorithm is a deterministic polynomial time algorithm when the
field is totally ramified and $p$ is a polynomial in the rank of the input
lattice. We utilize this algorithm to attack the above schemes so that we are
able to forge a valid signature of any message and decrypt any ciphertext.
Although these schemes are broken, this work does not mean that $p$-adic
lattices are not suitable in constructing cryptographic primitives. We propose
some possible modifications to avoid our attack at the end of this paper.