Previous Article in Journal
Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Lower Bound on the Overlattice-Based Sieve Algorithm

1
Software Engineering Institute, East China Normal University, Shanghai 200241, China
2
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
*
Authors to whom correspondence should be addressed.
Cryptography 2026, 10(1), 5; https://doi.org/10.3390/cryptography10010005 (registering DOI)
Submission received: 6 December 2025 / Revised: 23 December 2025 / Accepted: 27 December 2025 / Published: 1 January 2026

Abstract

Lattice-based cryptography stands as one of the most pivotal candidates in post-quantum cryptography. To configure the parameters of lattice-based cryptographic schemes, a thorough comprehension of their concrete security is indispensable. Lattice sieving algorithms represent among the most critical tools for conducting concrete security analysis. Currently, the state-of-the-art BDGL-sieve (SODA 2016) achieves a time complexity of 20.292n+o(n), and Kirshanova and Laarhoven (CRYPTO 2021) have proven that the BDGL-sieve attains the lower bound under the technical paradigm of the Nearest Neighbor Search (NNS) problem. A natural question emerges: whether overlattice-based sieving algorithms (ANTS 2014) can outperform the BDGL-sieve within an alternative technical framework. This work provides an almost negative response to this question. Specifically, we propose a generalized overlattice tower model, which facilitates the proof of the lower bound for the overlattice-based method. Our findings indicate that the original Overlattice-sieve has already reached this lower bound. Consequently, the BDGL-sieve will maintain its status as the sieving algorithm with optimal time complexity, unless a revolutionary technical optimization is developed in the future.
Keywords: lattice cryptanalysis; sieving algorithms; lower bound; overlattice-based lattice cryptanalysis; sieving algorithms; lower bound; overlattice-based

Share and Cite

MDPI and ACS Style

Shen, T.; Li, X.; Wang, L. Lower Bound on the Overlattice-Based Sieve Algorithm. Cryptography 2026, 10, 5. https://doi.org/10.3390/cryptography10010005

AMA Style

Shen T, Li X, Wang L. Lower Bound on the Overlattice-Based Sieve Algorithm. Cryptography. 2026; 10(1):5. https://doi.org/10.3390/cryptography10010005

Chicago/Turabian Style

Shen, Tongchen, Xiangxue Li, and Licheng Wang. 2026. "Lower Bound on the Overlattice-Based Sieve Algorithm" Cryptography 10, no. 1: 5. https://doi.org/10.3390/cryptography10010005

APA Style

Shen, T., Li, X., & Wang, L. (2026). Lower Bound on the Overlattice-Based Sieve Algorithm. Cryptography, 10(1), 5. https://doi.org/10.3390/cryptography10010005

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop