skip to main content
10.1145/384101.384133acmconferencesArticle/Chapter ViewAbstractPublication PagesissacConference Proceedingsconference-collections
Article

A linear space algorithm for computing the hermite normal form

Published:01 July 2001Publication History

ABSTRACT

Computing the Hermite Normal Form of an n × n integer matrix using the best current algorithms typically requires Ο(n3 log M) space, where M is a bound on the entries of the input matrix. Although polynomial in the input size (which is Ο(n2 log M)), this space blow-up can easily become a serious issue in practice when working on big integer matrices. In this paper we present a new algorithm for computing the Hermite Normal Form which uses only Ο(n2 log M) space (i.e., essentially the same as the input size). When implemented using standard algorithms for integer and matrix multiplication, our algorithm has the same time complexity of the asymptotically fastest (but space inefficient) algorithms. We also present a heuristic algorithm for HNF that achieves a substantial speedup when run on randomly generated input matrices.

References

  1. 1.AJTAI, M. Generating hard instances of lattice problems (extended abstract). In Proceedings of the Twenty-Eighth Annual A CM Symposium on the Theory of Computing (Philadelphia, Pennsylvania, 22-24 May 1996), pp. 99-108.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Cnou, T. W. J., AND COLLINS, G. E. Algorithms for the solution of systems of linear Diophantine equations. SIAM Journal on Computing 11, 4 (1982), 687-708.]]Google ScholarGoogle Scholar
  3. 3.DIXON, J. Exact solution of linear equations using p-adic expansions. Numerical Mathematics 40 (1982), 137-141.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.DOMICH, P. D. Residual Hermite normal form computations. ACM Trans. Math. Software 15, 3 (1989), 275-286.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.DOMICH, P. D., R.KANNAN, AND L.E.TROTTER. Hermite normal form computation using modulo determinant arithmetic. Mathematics of Operations Research 1P, 1 (Feb. 1987), 50-59.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.FANG, X. G., AND HAVAS, G. On the worst-case complexity of integer gaussian elimination. In Proceedings of the 1997 22nd International Symposium on Symbolic and Algebraic Computation, ISSA C (Maui, HI, USA, 1997), ACM, pp. 28-31.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.FISCHLIN, a ., AND SEIFERT, J.-P. Tensor-based trapdoors for CVP and their application to public key cryptography. In 7th IMA International Conference "Cryptography and Coding" (1999), vol. 1746 of Lecture Notes in Computer Science, Springer-Verlag, pp. 244-257.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.FRUMKIN, M. A. Polynominal time algorithms in the theory of linear diophantine equations. In Proceedings of the 1977 International Conference on Fundamentals of Computation Theory (Poznafi-KSrnik, Poland, Sept. 1977), M. Karpifiski, Ed., vol. 56 of LNCS, Springer, pp. 386-392.]]Google ScholarGoogle Scholar
  9. 9.FRUMKIN, M. A. Complexity question in number theory. J. Soviet Math., 29 29 (1985), 1502-1517.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. 10.GOLDREICH, 0 ., GOLDWASSER, S., AND HALEVI, S. Public-key cryptosystems from lattice reduction problems. In Advances in Cryptology--CRYPTO '97 (17-21 Aug. 1997), B. S. Kaliski Jr., Ed., vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, pp. 112-131.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.HAFNER, J. L., AND McCURLEY, K. S. A rigurous subexponential algorithm for computation of class groups. J. Amer. Math. Soc. 2 (1989), 837-850.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. 12.HAFNER, J. a., AND McCURLEY, K. S. Asymptotically fast triangularization of matrices over rings. SIAM Journal on Computing P0, 6 (1991), 1068-1083.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.HERMITE, C. Sur l'introduction des variables continues dans la thorie des hombres. J. Reine Angew. Math. 41 (1851), 191-216.]]Google ScholarGoogle ScholarCross RefCross Ref
  14. 14.HUNG, M. S., AND ROM, W. O. An application of the Hermite normal form in integer programming. Linear Algebra and its Applications 149 (1990), 163-179.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. 15.ILIOPOULOS, C. S. Worst-case complexity bounds on algorithms for computing the canonical structure of finite abelian groups and the Hermite and Smith normal forms of an integer matrix. SIAM Journal on Computing 18, 4 (1989), 658-669.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.KALTOFEN, E., KRISHNAMOORTHY, M., AND SAUNDERS, B. Fast parallel computation of Hermite and Smith forms of polynomial matrices. SIAM J. ALg. Disc. Math (1987), 683-690.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.KANNAN, R., AND BACHEM, A. Polynomial algorithms for computing the Smith and Hermite normal forms of an integer matrix. SIAM Journal on Computing 8, 4 (Nov. 1979), 499-507.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. 18.MICCIANCIO, D. Improving lattice based cryptosystems using the Hermite normal form. In Cryptography and Lattices Conference 2001 (2001), LNCS, Springer-Verlag.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.RAMANUJAM, J. Beyond unimodular transformation. The Journal of Supercomputing 9, 4 (1995), 365-389.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.STORJOHANN, A. Computing Hermite and Smith normal forms of triangular integer matrices. Linear Algebra and its Applications 282, 1-3 (1998), 25-45.]]Google ScholarGoogle ScholarCross RefCross Ref
  21. 21.STORJOHANN, A., AND LABAHN, G. Asymptotically fast computation of Hermite normal forms of integer matrices. In ISSAC'96 (Zurich, Switzerland, 1996), ACM, pp. 259-266.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.STORJOHANN, A., AND MULDERS, T. Diophantine linear system solving. In ISSAC'99 (Zurich, Switzerland, 1999), ACM, pp. 181-188.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.VILLARD, G. Computing Popov and Hermite forms of polynomial matrices. In Proceedings of the 1996 international symposium on Symbolic and algebraic computation (1996), pp. 250-258.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.VON ZUR GATHEN, J., AND GERHARD, J. Modern Computer Algebra. Cambridge University Press, Cambridge, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A linear space algorithm for computing the hermite normal form

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ISSAC '01: Proceedings of the 2001 international symposium on Symbolic and algebraic computation
        July 2001
        345 pages
        ISBN:1581134177
        DOI:10.1145/384101

        Copyright © 2001 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 July 2001

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate395of838submissions,47%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader