Abstract
We propose a concrete family of dense lattices of arbitrary dimension n in which the lattice bounded distance decoding (BDD) problem can be solved in deterministic polynomial time. This construction is directly adapted from the Chor–Rivest cryptosystem (IEEE-TIT 1988). The lattice construction needs discrete logarithm computations that can be made in deterministic polynomial time for well-chosen parameters. Each lattice comes with a deterministic polynomial time decoding algorithm able to decode up to large radius. Namely, we reach decoding radius within \(O(\log n)\) Minkowski’s bound, for both \(\ell _1\) and \(\ell _2\) norms.
Similar content being viewed by others
Notes
Later we relax this assumption and discuss about m.
References
Ajtai M.: Generating random lattices according to the invariant distribution. Draft (2006)
Barbulescu R., Gaudry P., Joux A., Thomé E.: A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. In: Advances in Cryptology—EUROCRYPT 2014—33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, May 11–15, 2014. Proceedings, pp. 1–16 (2014)
Brier E., Coron J.-S., Géraud R., Maimut D., Naccache D.: A number-theoretic error-correcting code. In: Innovative Security Solutions for Information Technology and Communications—8th International Conference, SECITC 2015, Bucharest, June 11–12, 2015. Revised Selected Papers, pp. 25–35 (2015)
Chevallier-Mames B., Naccache D., Stern J.: Linear bandwidth Naccache–Stern encryption. In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, September 10–12, 2008. Proceedings, pp. 327–339 (2008)
Chor B., Rivest R.L.: A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. Inf. Theory 34(5), 901–909 (1988).
Conway J.H., Sloane N.J.A.: Sphere Packings, Lattices and Groups, vol. 290. Springer, New York (2013).
Elkies N.D.: Mordell–Weil lattices in characteristic 2: I. construction and first properties. Int. Math. Res. Not. 1994(8), 343–361 (1994).
Grigorescu E., Peikert C.: List decoding Barnes–Wall lattices. In: IEEE 27th Annual Conference on Computational Complexity (CCC), pp. 316–325. IEEE (2012)
Lenstra H.W.: Factoring integers with elliptic curves. Ann. Math. 126(3), 649–673 (1987).
Lenstra H.W.: On the Chor–Rivest knapsack cryptosystem. J. Cryptol. 3(3), 149–155 (1991).
Li Z., Ling S., Xing C., Yeo S.L.: On the closest vector problem for lattices constructed from polynomials and their cryptographic applications. Cryptology ePrint Archive, Report 2017/1002 (2017). https://eprint.iacr.org/2017/1002.
Martinet J.: Tours de corps de classes et estimations de discriminants. Invent. Math. 44(1), 65–73 (1978).
Micciancio D., Nicolosi A.: Efficient bounded distance decoders for Barnes–Wall lattices. In: IEEE International Symposium on Information Theory, 2008. ISIT 2008, pp. 2484–2488. IEEE (2008)
Naccache D., Stern J.: A new public-key cryptosystem. In: Advances in Cryptology—EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, May 11–15, 1997, Proceeding. pp 27–36 (1997)
Okamoto T., Tanaka K., Uchiyama S.: Quantum public-key cryptosystems. In: Advances in Cryptology—CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, August 20–24, 2000, Proceedings, pp. 147–165 (2000)
Pohlig Stephen C, Hellman Martin E: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.). IEEE Trans. Inf. Theory 24(1), 106–110 (1978).
Pollard J.: Monte Carlo methods for index computations mod \(p\). Math. Comput. 32, 918–924 (1978).
Poltyrev Gregory: On coding without restrictions for the AWGN channel. IEEE Trans. Inf. Theory 40(2), 409–417 (1994).
Shanks D.: Solved and Unsolved Problems in Number Theory. New York: Chelsea, 4th ed. (1993). ISBN: 978-0828412971.
Shioda T.: Mordell–Weil lattices and sphere packings. Am. J. Math. 113(5), 931–948 (1991).
Toth L.F.: Uber einen geometrischen satz. Math. Z. 46, 79–83 (1940).
Yan Y., Ling L., Cong L., Xiaofu W.: Polar lattices. CoRR, construction of capacity-achieving lattice codes (2014)
Acknowledgements
We would like to thank Steven Galbraith, Cong Ling, Dan Shepherd and Chaoping Xing for their interesting discussions and precious comments about this work. We are also grateful for the helpful comments of the anonymous reviewers of Design, Code and Cryptography.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by O. Ahmadi.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Léo Ducas: Supported by a Veni Innovational Research Grant from NWO under Project Number 639.021.645.
Rights and permissions
About this article
Cite this article
Ducas, L., Pierrot, C. Polynomial time bounded distance decoding near Minkowski’s bound in discrete logarithm lattices. Des. Codes Cryptogr. 87, 1737–1748 (2019). https://doi.org/10.1007/s10623-018-0573-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-018-0573-3