{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article12511","name":"A Time-Distance Trade-Off for GDD with Preprocessing - Instantiating the DLW Heuristic","abstract":"For 0 <= alpha <= 1\/2, we show an algorithm that does the following. Given appropriate preprocessing P(L) consisting of N_alpha := 2^{O(n^{1-2 alpha} + log n)} vectors in some lattice L subset {R}^n and a target vector t in R^n, the algorithm finds y in L such that ||y-t|| <= n^{1\/2 + alpha} eta(L) in time poly(n) * N_alpha, where eta(L) is the smoothing parameter of the lattice.\r\nThe algorithm itself is very simple and was originally studied by Doulgerakis, Laarhoven, and de Weger (to appear in PQCrypto, 2019), who proved its correctness under certain reasonable heuristic assumptions on the preprocessing P(L) and target t. Our primary contribution is a choice of preprocessing that allows us to prove correctness without any heuristic assumptions.\r\nOur main motivation for studying this is the recent breakthrough algorithm for IdealSVP due to Hanrot, Pellet - Mary, and Stehl\u00e9 (to appear in Eurocrypt, 2019), which uses the DLW algorithm as a key subprocedure. In particular, our result implies that the HPS IdealSVP algorithm can be made to work with fewer heuristic assumptions.\r\nOur only technical tool is the discrete Gaussian distribution over L, and in particular, a lemma showing that the one-dimensional projections of this distribution behave very similarly to the continuous Gaussian. This lemma might be of independent interest.","keywords":["Lattices","guaranteed distance decoding","GDD","GDDP"],"author":{"@type":"Person","name":"Stephens-Davidowitz, Noah","givenName":"Noah","familyName":"Stephens-Davidowitz","email":"mailto:noahsd@gmail.com","affiliation":"Massachusetts Institute of Technology, Cambridge, MA, USA"},"position":11,"pageStart":"11:1","pageEnd":"11:8","dateCreated":"2019-07-16","datePublished":"2019-07-16","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":{"@type":"Person","name":"Stephens-Davidowitz, Noah","givenName":"Noah","familyName":"Stephens-Davidowitz","email":"mailto:noahsd@gmail.com","affiliation":"Massachusetts Institute of Technology, Cambridge, MA, USA"},"copyrightYear":"2019","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.CCC.2019.11","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/arxiv.org\/abs\/abs\/1412.7994","http:\/\/arxiv.org\/abs\/1504.01995","http:\/\/arxiv.org\/abs\/1409.8063","https:\/\/eprint.iacr.org\/2016\/888","https:\/\/eprint.iacr.org\/2016\/888\/20161219:141310","https:\/\/eprint.iacr.org\/2011\/501","http:\/\/arxiv.org\/abs\/1902.08340"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6340","volumeNumber":137,"name":"34th Computational Complexity Conference (CCC 2019)","dateCreated":"2019-07-16","datePublished":"2019-07-16","editor":{"@type":"Person","name":"Shpilka, Amir","givenName":"Amir","familyName":"Shpilka","email":"mailto:shpilka@tauex.tau.ac.il","affiliation":"Tel Aviv University, Tel Aviv, 69978, Israel"},"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article12511","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6340"}}}