Author:
Zhiyong Zheng,Fengxia Liu,Yunfan Lu,Kun Tian
Abstract
AbstractCyclic lattices and ideal lattices were introduced by Micciancio (2002), Lyubashevsky and Micciancio (2006), respectively, which play an efficient role in Ajtai’s construction of a collision resistant Hash function (see Ajtai (1996), Ajtai and Dwork (1997)) and in Gentry’s construction of fully homomorphic encryption (see Gentry (2009)). Let $$R=Z[x]/\langle \phi (x)\rangle $$
R
=
Z
[
x
]
/
⟨
ϕ
(
x
)
⟩
be a quotient ring of the integer coefficients polynomials ring, Lyubashevsky and Micciancio regarded an ideal lattice as the correspondence of an ideal of R, but they neither explain how to extend this definition to whole Euclidean space $$\mathbb {R}^n$$
R
n
, nor exhibit the relationship of cyclic lattices and ideal lattices. In this chapter, we regard the cyclic lattices and ideal lattices as the correspondences of finitely generated R-modules, so that we may show that ideal lattices are actually a special subclass of cyclic lattices, namely, cyclic integer lattices. In fact, there is a one to one correspondence between cyclic lattices in $$\mathbb {R}^n$$
R
n
and finitely generated R-modules (see Theorem 4). On the other hand, since R is a Noether ring, each ideal of R is a finitely generated R-module, so it is natural and reasonable to regard ideal lattices as a special subclass of cyclic lattices (see Corollary 7). It is worth noting that we use a more general rotation matrix here, so our definition and results on cyclic lattices and ideal lattices are more general forms. As an application, we provide a cyclic lattice with an explicit and countable upper bound for the smoothing parameter (see Theorem 5). It is an open problem that is the shortest vector problem on cyclic lattice NP-hard (see Micciancio (2002)). Our results may be viewed as a substantial progress in this direction.
Publisher
Springer Nature Singapore
Reference22 articles.
1. Ajtai, M. (1996). Generating hard instances of the short basis problem. In Proceedings of 28th STOC (pp. 99–108).
2. Ajtai, M., & Dwork, C. (1997). A public-key cryptosystem with worst-case/average-case equivalence. In Proceedings of 29th STOC (pp. 284–293).
3. Banaszczyk, W. (1993). New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen, 296(4), 625–635.
4. Cassels, J. W. S. (1963). Introduction to diophantine approximation. Cambridge University Press.
5. Cassels, J. W. S. (1971). An introduction to the geometry of numbers. Springer.