{"id":"https://openalex.org/W7118001689","doi":"https://doi.org/10.3390/cryptography10010005","title":"Lower Bound on the Overlattice-Based Sieve Algorithm","display_name":"Lower Bound on the Overlattice-Based Sieve Algorithm","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118001689","doi":"https://doi.org/10.3390/cryptography10010005"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010005","pdf_url":"https://www.mdpi.com/2410-387X/10/1/5/pdf?version=1767259935","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/1/5/pdf?version=1767259935","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066606693","display_name":"Tongchen Shen","orcid":"https://orcid.org/0000-0002-7283-5301"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongchen Shen","raw_affiliation_strings":["Software Engineering Institute, East China Normal University, Shanghai 200241, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Software Engineering Institute, East China Normal University, Shanghai 200241, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121698686","display_name":"Xiangxue Li","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangxue Li","raw_affiliation_strings":["Software Engineering Institute, East China Normal University, Shanghai 200241, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Software Engineering Institute, East China Normal University, Shanghai 200241, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121828203","display_name":"Licheng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Licheng Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5121698686","https://openalex.org/A5121828203"],"corresponding_institution_ids":["https://openalex.org/I125839683","https://openalex.org/I66867065"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02624983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":"5","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9038000106811523,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9038000106811523,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.030300000682473183,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.025100000202655792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.7014999985694885},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5424000024795532},{"id":"https://openalex.org/keywords/sieve","display_name":"Sieve (category theory)","score":0.400299996137619},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.3296999931335449},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.3271999955177307}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.7014999985694885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5424000024795532},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4812999963760376},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45100000500679016},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43380001187324524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4318999946117401},{"id":"https://openalex.org/C17732976","wikidata":"https://www.wikidata.org/wiki/Q7511782","display_name":"Sieve (category theory)","level":2,"score":0.400299996137619},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.37450000643730164},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.33809998631477356},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2757999897003174}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010005","pdf_url":"https://www.mdpi.com/2410-387X/10/1/5/pdf?version=1767259935","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:52c31eb5bf9c410db47e752af8d328e8","is_oa":false,"landing_page_url":"https://doaj.org/article/52c31eb5bf9c410db47e752af8d328e8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 1, p 5 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010005","pdf_url":"https://www.mdpi.com/2410-387X/10/1/5/pdf?version=1767259935","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5091499090194702}],"awards":[{"id":"https://openalex.org/G1304099850","display_name":null,"funder_award_id":"23511100200","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G2529735970","display_name":null,"funder_award_id":"2021-01-07-00-08-E00101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G291445193","display_name":null,"funder_award_id":"021-01-07-00-08-E00101","funder_id":"https://openalex.org/F4320321881","funder_display_name":"Shanghai Municipal Education Commission"},{"id":"https://openalex.org/G3317515205","display_name":null,"funder_award_id":"62272040","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3787113657","display_name":null,"funder_award_id":"2021-01-07-00-08-E00101","funder_id":"https://openalex.org/F4320321881","funder_display_name":"Shanghai Municipal Education Commission"},{"id":"https://openalex.org/G7413427463","display_name":null,"funder_award_id":"2021-01","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321881","display_name":"Shanghai Municipal Education Commission","ror":"https://ror.org/05tewj457"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118001689.pdf","grobid_xml":"https://content.openalex.org/works/W7118001689.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Lattice-based":[0],"cryptography":[1],"stands":[2],"as":[3,151],"one":[4],"of":[5,17,24,54,75,123],"the":[6,15,35,45,65,68,72,76,94,121,124,128,135,145,152,167],"most":[7,36],"pivotal":[8],"candidates":[9],"in":[10,166],"post-quantum":[11],"cryptography.":[12],"To":[13],"configure":[14],"parameters":[16],"lattice-based":[18],"cryptographic":[19],"schemes,":[20],"a":[21,51,114,160],"thorough":[22],"comprehension":[23],"their":[25],"concrete":[26,41],"security":[27,42],"is":[28,164],"indispensable.":[29],"Lattice":[30],"sieving":[31,88,153],"algorithms":[32,89],"represent":[33],"among":[34],"critical":[37],"tools":[38],"for":[39,127],"conducting":[40],"analysis.":[43],"Currently,":[44],"state-of-the-art":[46],"BDGL-sieve":[47,66,95,146],"(SODA":[48],"2016)":[49],"achieves":[50],"time":[52,157],"complexity":[53],"20.292n+o(n),":[55],"and":[56,58],"Kirshanova":[57],"Laarhoven":[59],"(CRYPTO":[60],"2021)":[61],"have":[62],"proven":[63],"that":[64,134],"attains":[67],"lower":[69,125,142],"bound":[70,126],"under":[71],"technical":[73,99,162],"paradigm":[74],"Nearest":[77],"Neighbor":[78],"Search":[79],"(NNS)":[80],"problem.":[81],"A":[82],"natural":[83],"question":[84],"emerges:":[85],"whether":[86],"overlattice-based":[87,129],"(ANTS":[90],"2014)":[91],"can":[92],"outperform":[93],"within":[96],"an":[97,104],"alternative":[98],"framework.":[100],"This":[101],"work":[102],"provides":[103],"almost":[105],"negative":[106],"response":[107],"to":[108],"this":[109,141],"question.":[110],"Specifically,":[111],"we":[112],"propose":[113],"generalized":[115],"overlattice":[116],"tower":[117],"model,":[118],"which":[119],"facilitates":[120],"proof":[122],"method.":[130],"Our":[131],"findings":[132],"indicate":[133],"original":[136],"Overlattice-sieve":[137],"has":[138],"already":[139],"reached":[140],"bound.":[143],"Consequently,":[144],"will":[147],"maintain":[148],"its":[149],"status":[150],"algorithm":[154],"with":[155],"optimal":[156],"complexity,":[158],"unless":[159],"revolutionary":[161],"optimization":[163],"developed":[165],"future.":[168]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-02T00:00:00"}
