Abstract
The purpose of this work is to propose an efficient algorithm to solve the closest vector problem (CVP) in the tensor product of two root lattices of type \(D_n\) (\(n\ge 2\)). In 2018, Léo Ducas and Wessel van Woerden proposed a polynomial algorithm allowing to solve this problem in the tensor product of two root lattices of type \(A_n\) (\(n\ge 1\)). In our present case, we show that the root lattice \(D_{nm}\) is a full-rank sub-lattice of the tensor product \(D_n\otimes D_m\) (\(n,m\ge 2\)) of the root lattices \(D_n\) and \(D_m\), enabling us to derive a polynomial algorithm for solving the CVP in \(D_n\) (\(n\ge 2\)). The proposed algorithm performs at most \(O(n+m)\) arithmetic operations.
Similar content being viewed by others
References
Aggarwal D, Dadush D, Stephens-Davidowitz N. Solving the closest vector problem in \(2^{\rm n}\) time: the discrete gaussian strikes again! In: Guruswami V, editor. IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015. IEEE Computer Society; 2015. p. 563–582.
Ahuja RK, Magnanti TL, Orlin JB. Network flows-theory, algorithms and applications. Hoboken: Prentice Hall; 1993.
Conway JH, Sloane NJA. Fast quantizing and decoding and algorithms for lattice quantizers and codes. IEEE Trans Inf Theory. 1982;28(2):227–31.
Conway JH, Sloane NJA. Sphere Packings, Lattices and Groups, volume 290 of Grundlehren der mathematischen Wissenschaften. Berlin: Springer; 1988.
Dachman-Soled D, Ducas L, Gong H, Rossi M. LWE with side information: attacks and concrete security estimation. In: Micciancio D, Ristenpart T, editors. Advances in Cryptology-CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part II, volume 12171 of Lecture Notes in Computer Science. Springer; 2020. p. 329–358.
Ducas L. Shortest vector from lattice sieving: a few dimensions for free. In: Nielsen JB, Rijmen V, editors. Advances in Cryptology-EUROCRYPT 2018-37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part I, volume 10820 of Lecture Notes in Computer Science. Springer; 2018. p. 125–145.
Ducas L, van Woerden WPJ. The closest vector problem in tensored root lattices of type A and in their duals. Des Codes Cryptogr. 2018;86(1):137–50.
Ducas L, van Woerden WPJ. On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography. In: Dunkelman O, Dziembowski S, editors. Advances in Cryptology-EUROCRYPT 2022-41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30-June 3, 2022, Proceedings, Part III, volume 13277 of Lecture Notes in Computer Science. Springer; 2022. p. 643–673.
Gersho A. Asymptotically optimal block quantization. IEEE Trans Inf Theory. 1979;25(4):373–80.
Goldreich O, Goldwasser S, Halevi S. Public-key cryptosystems from lattice reduction problems. In: Kaliski Jr BS, editor. Advances in Cryptology-CRYPTO ’97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, Proceedings, volume 1294 of Lecture Notes in Computer Science. Springer; 1997. p. 112–131.
Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. In: Gilbert H, editor. Advances in Cryptology-EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco/French Riviera, May 30-June 3, 2010. Proceedings, volume 6110 of Lecture Notes in Computer Science. Springer; 2010. p. 1–23.
Lyubashevsky V, Peikert C, Regev O. A toolkit for ring-lwe cryptography. IACR Cryptol ePrint Arch. 2013;2013:293.
Micciancio D, Voulgaris P. A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations. In: Schulman LJ, editor. Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010. ACM; 2010. p. 351–358.
Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput. 1997;26(5):1484–509.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tchinda, A.G.F., Fouotsa, E. & Jugnia, C.N. A Polynomial Algorithm for Solving the Closest Vector Problem in Tensored Root Lattices of Type D. SN COMPUT. SCI. 4, 19 (2023). https://doi.org/10.1007/s42979-022-01440-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01440-2