More Basis Reduction for Linear Codes: Backward Reduction, BKZ, Slide Reduction, and More

Authors Surendra Ghentiyala, Noah Stephens-Davidowitz



PDF
Thumbnail PDF

File

LIPIcs.APPROX-RANDOM.2024.19.pdf
  • Filesize: 0.76 MB
  • 22 pages

Document Identifiers

Author Details

Surendra Ghentiyala
  • Cornell University, Ithaca, NY, USA
Noah Stephens-Davidowitz
  • Cornell University, Ithaca, NY, USA

Cite AsGet BibTex

Surendra Ghentiyala and Noah Stephens-Davidowitz. More Basis Reduction for Linear Codes: Backward Reduction, BKZ, Slide Reduction, and More. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 317, pp. 19:1-19:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2024.19

Abstract

We expand on recent exciting work of Debris-Alazard, Ducas, and van Woerden [Transactions on Information Theory, 2022], which introduced the notion of basis reduction for codes, in analogy with the extremely successful paradigm of basis reduction for lattices. We generalize DDvW’s LLL algorithm and size-reduction algorithm from codes over 𝔽₂ to codes over 𝔽_q, and we further develop the theory of proper bases. We then show how to instantiate for codes the BKZ and slide-reduction algorithms, which are the two most important generalizations of the LLL algorithm for lattices. Perhaps most importantly, we show a new and very efficient basis-reduction algorithm for codes, called full backward reduction. This algorithm is quite specific to codes and seems to have no analogue in the lattice setting. We prove that this algorithm finds vectors as short as LLL does in the worst case (i.e., within the Griesmer bound) and does so in less time. We also provide both heuristic and empirical evidence that it outperforms LLL in practice, and we give a variant of the algorithm that provably outperforms LLL (in some sense) for random codes. Finally, we explore the promise and limitations of basis reduction for codes. In particular, we show upper and lower bounds on how "good" of a basis a code can have, and we show two additional illustrative algorithms that demonstrate some of the promise and the limitations of basis reduction for codes.

Subject Classification

ACM Subject Classification
  • Theory of computation → Error-correcting codes
Keywords
  • Linear Codes
  • Basis Reduction

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Divesh Aggarwal, Daniel Dadush, Oded Regev, and Noah Stephens-Davidowitz. Solving the shortest vector problem in 2ⁿ time using discrete Gaussian sampling. In STOC, 2015. Google Scholar
  2. Divesh Aggarwal and Noah Stephens-Davidowitz. (Gap/S)ETH hardness of SVP. In STOC, 2018. Google Scholar
  3. Miklós Ajtai. Generating hard instances of lattice problems. In STOC, 1996. Google Scholar
  4. Miklós Ajtai. The Shortest Vector Problem in L2 is NP-hard for randomized reductions. In STOC, 1998. Google Scholar
  5. Miklós Ajtai and Cynthia Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In STOC, 1997. Google Scholar
  6. Miklós Ajtai, Ravi Kumar, and D. Sivakumar. A sieve algorithm for the Shortest Lattice Vector Problem. In STOC, pages 601-610, 2001. Google Scholar
  7. Michael Alekhnovich. More on average case vs approximation complexity. In FOCS, pages 298-307, 2003. Google Scholar
  8. Nicolas Aragon, Julien Lavauzelle, and Matthieu Lequesne. decodingchallenge.org, 2019. URL: http://decodingchallenge.org.
  9. Sanjeev Arora, László Babai, Jacques Stern, and Z. Sweedyk. The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations. J. Comput. Syst. Sci., 54(2):317-331, 1997. Google Scholar
  10. L. Babai. On Lovász' lattice reduction and the nearest lattice point problem. Combinatorica, 6(1):1-13, 1986. Google Scholar
  11. Shi Bai, Damien Stehlé, and Weiqiang Wen. Measuring, simulating and exploiting the head concavity phenomenon in BKZ. In Asiacrypt, 2018. Google Scholar
  12. Anja Becker, Léo Ducas, Nicolas Gama, and Thijs Laarhoven. New directions in nearest neighbor searching with applications to lattice sieving. In SODA, 2016. Google Scholar
  13. Huck Bennett, Alexander Golovnev, and Noah Stephens-Davidowitz. On the quantitative hardness of CVP. In FOCS, 2017. Google Scholar
  14. E. Berlekamp, R. McEliece, and H. van Tilborg. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24(3):384-386, 1978. Google Scholar
  15. Peter van Emde Boas. Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical report, University of Amsterdam, 1981. Google Scholar
  16. Yuanmi Chen and Phong Q. Nguyen. BKZ 2.0: Better lattice security estimates. In Asiacrypt, 2011. Google Scholar
  17. Thomas Debris-Alazard, Léo Ducas, and Wessel P. J. van Woerden. An algorithmic reduction theory for binary codes: LLL and more. IEEE Transactions on Information Theory, 68(5):3426-3444, 2022. URL: https://eprint.iacr.org/2020/869.
  18. Irit Dinur, Guy Kindler, Ran Raz, and Shmuel Safra. Approximating CVP to within almost-polynomial factors is NP-hard. Combinatorica, 23(2):205-243, 2003. Google Scholar
  19. I. Dumer, D. Micciancio, and M. Sudan. Hardness of approximating the minimum distance of a linear code. IEEE Transactions on Information Theory, 49(1):22-37, 2003. Google Scholar
  20. Nicolas Gama and Phong Q. Nguyen. Finding short lattice vectors within Mordell’s inequality. In STOC, 2008. Google Scholar
  21. Surendra Ghentiyala and Noah Stephens-Davidowitz. More basis reduction for linear codes: backward reduction, BKZ, slide reduction, and more, 2024. Google Scholar
  22. J. H. Griesmer. A bound for error-correcting codes. IBM Journal of Research and Development, 4(5):532-542, 1960. Google Scholar
  23. Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. NTRU: A ring-based public key cryptosystem. In ANTS, pages 267-288, 1998. Google Scholar
  24. P. J. Lee and E. F. Brickell. An observation on the security of McEliece’s public-key cryptosystem. In Eurocrypt, 1988. Google Scholar
  25. Arjen K. Lenstra, Hendrik W. Lenstra, Jr., and László Lovász. Factoring polynomials with rational coefficients. Mathematische Annalen, 261(4):515-534, December 1982. Google Scholar
  26. Robert J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, Jet Propulsion Laboratory, 1978. Google Scholar
  27. Daniele Micciancio. The Shortest Vector Problem is NP-hard to approximate to within some constant. SIAM Journal on Computing, 30(6):2008-2035, 2001. Google Scholar
  28. Daniele Micciancio and Michael Walter. Practical, predictable lattice basis reduction. In Eurocrypt, 2016. URL: http://eprint.iacr.org/2015/1123.
  29. Phong Q. Nguyen and Brigitte Vallée, editors. The LLL Algorithm: Survey and Applications. Springer-Verlag, 2010. Google Scholar
  30. Oded Regev. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, 56(6):Art. 34, 40, 2009. URL: https://doi.org/10.1145/1568318.1568324.
  31. Claus-Peter Schnorr. A hierarchy of polynomial time lattice basis reduction algorithms. Theor. Comput. Sci., 53(23):201-224, 1987. Google Scholar
  32. Noah Stephens-Davidowitz and Vinod Vaikuntanathan. SETH-hardness of coding problems. In FOCS, 2019. Google Scholar
  33. Alexander Vardy. Algorithmic complexity in coding theory and the Minimum Distance Problem. In STOC, 1997. Google Scholar
  34. Michael Walter. Lattice blog reduction: The Simons Institute blog. https://blog.simons.berkeley.edu/2020/04/lattice-blog-reduction-part-i-bkz/, 2020.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail