Skip to main content
Log in

Polynomial time bounded distance decoding near Minkowski’s bound in discrete logarithm lattices

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

We propose a concrete family of dense lattices of arbitrary dimension n in which the lattice bounded distance decoding (BDD) problem can be solved in deterministic polynomial time. This construction is directly adapted from the Chor–Rivest cryptosystem (IEEE-TIT 1988). The lattice construction needs discrete logarithm computations that can be made in deterministic polynomial time for well-chosen parameters. Each lattice comes with a deterministic polynomial time decoding algorithm able to decode up to large radius. Namely, we reach decoding radius within \(O(\log n)\) Minkowski’s bound, for both \(\ell _1\) and \(\ell _2\) norms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Later we relax this assumption and discuss about m.

References

  1. Ajtai M.: Generating random lattices according to the invariant distribution. Draft (2006)

  2. Barbulescu R., Gaudry P., Joux A., Thomé E.: A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. In: Advances in Cryptology—EUROCRYPT 2014—33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, May 11–15, 2014. Proceedings, pp. 1–16 (2014)

  3. Brier E., Coron J.-S., Géraud R., Maimut D., Naccache D.: A number-theoretic error-correcting code. In: Innovative Security Solutions for Information Technology and Communications—8th International Conference, SECITC 2015, Bucharest, June 11–12, 2015. Revised Selected Papers, pp. 25–35 (2015)

  4. Chevallier-Mames B., Naccache D., Stern J.: Linear bandwidth Naccache–Stern encryption. In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, September 10–12, 2008. Proceedings, pp. 327–339 (2008)

  5. Chor B., Rivest R.L.: A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. Inf. Theory 34(5), 901–909 (1988).

    Article  MathSciNet  MATH  Google Scholar 

  6. Conway J.H., Sloane N.J.A.: Sphere Packings, Lattices and Groups, vol. 290. Springer, New York (2013).

    Google Scholar 

  7. Elkies N.D.: Mordell–Weil lattices in characteristic 2: I. construction and first properties. Int. Math. Res. Not. 1994(8), 343–361 (1994).

    Article  MathSciNet  MATH  Google Scholar 

  8. Grigorescu E., Peikert C.: List decoding Barnes–Wall lattices. In: IEEE 27th Annual Conference on Computational Complexity (CCC), pp. 316–325. IEEE (2012)

  9. Lenstra H.W.: Factoring integers with elliptic curves. Ann. Math. 126(3), 649–673 (1987).

    Article  MathSciNet  MATH  Google Scholar 

  10. Lenstra H.W.: On the Chor–Rivest knapsack cryptosystem. J. Cryptol. 3(3), 149–155 (1991).

    Article  MathSciNet  MATH  Google Scholar 

  11. Li Z., Ling S., Xing C., Yeo S.L.: On the closest vector problem for lattices constructed from polynomials and their cryptographic applications. Cryptology ePrint Archive, Report 2017/1002 (2017). https://eprint.iacr.org/2017/1002.

  12. Martinet J.: Tours de corps de classes et estimations de discriminants. Invent. Math. 44(1), 65–73 (1978).

    Article  MathSciNet  MATH  Google Scholar 

  13. Micciancio D., Nicolosi A.: Efficient bounded distance decoders for Barnes–Wall lattices. In: IEEE International Symposium on Information Theory, 2008. ISIT 2008, pp. 2484–2488. IEEE (2008)

  14. Naccache D., Stern J.: A new public-key cryptosystem. In: Advances in Cryptology—EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, May 11–15, 1997, Proceeding. pp 27–36 (1997)

  15. Okamoto T., Tanaka K., Uchiyama S.: Quantum public-key cryptosystems. In: Advances in Cryptology—CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, August 20–24, 2000, Proceedings, pp. 147–165 (2000)

  16. Pohlig Stephen C, Hellman Martin E: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.). IEEE Trans. Inf. Theory 24(1), 106–110 (1978).

    Article  MATH  Google Scholar 

  17. Pollard J.: Monte Carlo methods for index computations mod \(p\). Math. Comput. 32, 918–924 (1978).

    MathSciNet  MATH  Google Scholar 

  18. Poltyrev Gregory: On coding without restrictions for the AWGN channel. IEEE Trans. Inf. Theory 40(2), 409–417 (1994).

    Article  MathSciNet  MATH  Google Scholar 

  19. Shanks D.: Solved and Unsolved Problems in Number Theory. New York: Chelsea, 4th ed. (1993). ISBN: 978-0828412971.

  20. Shioda T.: Mordell–Weil lattices and sphere packings. Am. J. Math. 113(5), 931–948 (1991).

    Article  MathSciNet  MATH  Google Scholar 

  21. Toth L.F.: Uber einen geometrischen satz. Math. Z. 46, 79–83 (1940).

    Google Scholar 

  22. Yan Y., Ling L., Cong L., Xiaofu W.: Polar lattices. CoRR, construction of capacity-achieving lattice codes (2014)

Download references

Acknowledgements

We would like to thank Steven Galbraith, Cong Ling, Dan Shepherd and Chaoping Xing for their interesting discussions and precious comments about this work. We are also grateful for the helpful comments of the anonymous reviewers of Design, Code and Cryptography.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cécile Pierrot.

Additional information

Communicated by O. Ahmadi.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Léo Ducas: Supported by a Veni Innovational Research Grant from NWO under Project Number 639.021.645.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ducas, L., Pierrot, C. Polynomial time bounded distance decoding near Minkowski’s bound in discrete logarithm lattices. Des. Codes Cryptogr. 87, 1737–1748 (2019). https://doi.org/10.1007/s10623-018-0573-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-018-0573-3

Keywords

Mathematics Subject Classification

Navigation