A Method of Constructing Orthogonal Basis in $p$-adic Fields

Chi Zhang,Yingpu Deng
2024-10-23
Abstract:In 2021, the $p$-adic signature scheme and public-key encryption cryptosystem were introduced. These schemes have good efficiency but are shown to be not secure. The attack succeeds because the extension fields used in these schemes are totally ramified. In order to avoid this attack, the extension field should have a large residue degree. In this paper, we propose a method of constructing a kind of specific orthogonal basis in $p$-adic fields with a large residue degree. Then, we use it to modify the $p$-adic signature scheme so that it can resist the attack.
Number Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: how to improve the signature scheme based on p -adic lattices by constructing an orthogonal basis in the p -adic number field with a large residue degree, so that it can resist known attacks. Specifically: 1. **Background problems**: - In 2021, the signature scheme and public - key encryption system based on p -adic lattices were introduced. Although these schemes are efficient, they are proven to be insecure because the extension fields used are totally ramified. - To prevent such attacks, it is necessary to use extension fields with a large residue degree. 2. **Proposed method**: - The paper proposes a method for constructing a specific orthogonal basis in the p -adic number field to ensure that the extension fields used have a large residue degree. - Use these orthogonal bases to modify the original p -adic signature scheme, thereby improving its security. 3. **Theoretical basis**: - Through definitions and properties, the paper explores concepts such as orthogonal bases, norms, residue degrees, and ramification indices in the p -adic number field. - An equivalent condition is proposed to determine whether a given basis is an orthogonal basis (Theorem 3.3). 4. **Specific construction**: - Use roots of unity and other mathematical tools to construct orthogonal bases that meet the requirements (Section 4 and Section 5). - Provide a specific algorithm to implement this construction process (Algorithm in Section 5). 5. **Application**: - Apply the above - mentioned methods to modify the p -adic signature scheme to ensure that it can resist the previously proposed attacks (Section 6). Through these methods, the paper aims to provide a new, more secure p -adic signature scheme to meet the challenges of the quantum computing era.