Lattice Problems Beyond Polynomial Time

11/21/2022
by   Divesh Aggarwal, et al.
0

We study the complexity of lattice problems in a world where algorithms, reductions, and protocols can run in superpolynomial time, revisiting four foundational results: two worst-case to average-case reductions and two protocols. We also show a novel protocol. 1. We prove that secret-key cryptography exists if O(√(n))-approximate SVP is hard for 2^ε n-time algorithms. I.e., we extend to our setting (Micciancio and Regev's improved version of) Ajtai's celebrated polynomial-time worst-case to average-case reduction from O(n)-approximate SVP to SIS. 2. We prove that public-key cryptography exists if O(n)-approximate SVP is hard for 2^ε n-time algorithms. This extends to our setting Regev's celebrated polynomial-time worst-case to average-case reduction from O(n^1.5)-approximate SVP to LWE. In fact, Regev's reduction is quantum, but ours is classical, generalizing Peikert's polynomial-time classical reduction from O(n^2)-approximate SVP. 3. We show a 2^ε n-time coAM protocol for O(1)-approximate CVP, generalizing the celebrated polynomial-time protocol for O(√(n/log n))-CVP due to Goldreich and Goldwasser. These results show complexity-theoretic barriers to extending the recent line of fine-grained hardness results for CVP and SVP to larger approximation factors. (This result also extends to arbitrary norms.) 4. We show a 2^ε n-time co-non-deterministic protocol for O(√(log n))-approximate SVP, generalizing the (also celebrated!) polynomial-time protocol for O(√(n))-CVP due to Aharonov and Regev. 5. We give a novel coMA protocol for O(1)-approximate CVP with a 2^ε n-time verifier. All of the results described above are special cases of more general theorems that achieve time-approximation factor tradeoffs.

READ FULL TEXT
research
10/17/2020

On the Hardness of Average-case k-SUM

In this work, we show the first worst-case to average-case reduction for...
research
04/14/2021

Dimension-Preserving Reductions Between SVP and CVP in Different p-Norms

We show a number of reductions between the Shortest Vector Problem and t...
research
04/27/2018

On Basing One-way Permutations on NP-hard Problems under Quantum Reductions

A fundamental pursuit in complexity theory concerns reducing worst-case ...
research
12/15/2019

Bisect and Conquer: Hierarchical Clustering via Max-Uncut Bisection

Hierarchical Clustering is an unsupervised data analysis method which ha...
research
08/10/2019

Slide Reduction, Revisited---Filling the Gaps in SVP Approximation

We show how to generalize Gama and Nguyen's slide reduction algorithm [S...
research
04/06/2022

Continuous LWE is as Hard as LWE Applications to Learning Gaussian Mixtures

We show direct and conceptually simple reductions between the classical ...
research
06/20/2021

On the Cryptographic Hardness of Learning Single Periodic Neurons

We show a simple reduction which demonstrates the cryptographic hardness...

Please sign up or login with your details

Forgot password? Click here to reset