Abstract
Lattice-based cryptography is based on the hardness of the lattice problems, e.g., the shortest vector problem and the closed vector problem. In fact, these mathematical optimization problems are known to be NP-hard. Our interest is to know how large-scale shortest vector problems can be solved. For this, we provide a mixed integer quadratic programming formulation for the shortest vector problem and propose a technique to restrict the search space of the shortest vector problem. This approach is a potential technique to improve the performance of the state-of-the-art software for mixed integer programming problems. In fact, we observe that this technique improves the numerical performance for TU Darmstadt’s benchmark instances with the dimension up to 49.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This is not a precise definition of the optimal value of (1). In fact, some of optimization problems have a finite optimal value, but no optimal solutions. Hence this definition is inappropriate to such optimization problems. However, this definition is valid for optimization problems in this chapter except for Appendix because they always have optimal solutions.
References
T. Achterberg, Constraint Integer Programming, Ph.D. thesis, Technische Universität Berlin (2007)
T. Achterberg, R.E. Bixby, Z. Gu, E. Rothberg, D. Weninger, Multi-row presolve reductions in mixed integer programming, in Proceedings of the Twenty-Sixth RAMP Symposium (2014), pp. 181–196
M. Ajtai, The shortest vector problem in \(L_2\) is NP-hard for randomized reductions (extended abstract), in Proceedings of the thirtieth Annual Symposium on the Theory of Computing (1998), pp. 10–19
M. Ajtai, R. Kumar, D. Sivakumar, A sieve algorithm for the shortest lattice vector problem, in Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing (2001), pp. 601–610
F. Alizadeh, D. Goldfarb, Second-order cone programming. Math. Program. 95, 3–51 (2003)
C. Bliek, P. Bonami, A. Lodi, Solving mixed-integer quadratic programming problems with IBM-CPLEX: a progress report, in Proceedings of the Twenty-Sixth RAMP Symposium (2014), pp. 171–180
M. Fukase, K. Kashiwabara, An accelerated algorithm for solving SVP based on statistical analysis. J. Inf. Process. 23, 1–15 (2015)
A.M. Gleixner, T. Bertholdm, B.Müller, S. Weltge, Three enhancements for optimization-based bound tightening. J. Glob. Optim. (2016). doi:10.1007/s10898-016-0450-4
A.K. Lenstra, H.W. Lenstra Jr., L. Lovász, Factoring polynomials with rational coefficients. Math. Ann. 261, 515–534 (1982)
G. Pataki, Strong duality in conic linear programming: facial reduction and extended dual, in Computational and Analytical Mathematics, vol. 50, ed. By D. Bailey et al. Springer Proceedings in Mathematics & Statistics (2013), pp. 613–634
J. Renegar, A mathematical view of interior-point methods in convex optimization. SIAM (2001)
C.P. Schnorr, M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. program. 66, 181–199 (1994)
H. Waki, M. Muramatsu, Facial reduction algorithms for conic optimization problems. J. Optim. Theory Appl. 158, 188–215 (2013)
IBM ILOG CPLEX Optimizer 12.6.3, IBM ILOG (2015)
The FPLLL development team, fplll, a lattice reduction library (2016), https://github.com/fplll/fplll
Gurobi Optimization, Inc., Gurobi Optimizer Reference Manual (2015), http://www.gurobi.com
SCIP: Solving Constraint Integer Programs, http://scip.zib.de/
SVP CHALLENGE, https://www.latticechallenge.org/svp-challenge/
Acknowledgements
We would like to thank Dr. Masaya Yasuda in Kyushu University for fruitful discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix 1 : A Second-Order Cone Program Problem
We provide a brief introduction of a second-order cone program (SOCP) problem. Denote the set K by
where \(\Vert \cdot \Vert _2\) stands for the 2-norm and K is called the second-order cone. For given \(A\in \mathbb {R}^{m\times n}\), \(b\in \mathbb {R}^m\) and \(c\in \mathbb {R}^n\), the SOCP problem (14) and its dual (15) are formulated as follows:
Here \(K^*\) stands for the dual cone of K and is defined by \(K^* = \{s = (s_1, s_2)\in \mathbb {R}^n : s_1\ge \Vert s_2\Vert _2\}\). We remark that the SOCP problem (14) and its dual (15) may not have any optimal solutions even if their optimal values are finite. Such examples are given in [11]. For this, we use the terminology “\(\inf \)” and “\(\sup \)” instead of “\(\min \)” and “\(\max \)” in (14) and (15), respectively. We define \(\theta ^*_P = -\infty \) when (14) has no feasible solutions. Similarly, we define \(\theta ^*_D = -\infty \) when (15) has no feasible solutions.
For any pair (x, y) of feasible solutions of (14) and (15), we have
This inequality is called the weak duality and implies \(\theta ^*_P\ge \theta ^*_D\). It follows from the weak duality that if there exist a pair of feasible solutions x of (14) and y of (15) such that \(c^Tx=b^Ty\), \(\theta ^*_P=\theta ^*_D\) holds and thus the pair (x, y) of the feasible solution is a pair of optimal solutions for (14) and (15). The strong duality theorem ensures \(\theta ^*_P=\theta ^*_D\) under an assumption to (14) and (15). To this end, we introduce the strong feasibility for (14) and (15). (14) is said to be strongly feasible or strictly feasible if there exists a feasible solution \(\hat{x}\) of (14) such that \(A\hat{x} = b\) and \((\hat{x})_1 > \Vert \hat{x}_2\Vert _2\). (15) is said to be strongly feasible or strictly feasible if there exists a feasible solution \(\hat{y}\) of (15) such that \(c-A^T\hat{y} \in \text{ int }(K^*)\). Here \(\text{ int }(K^*)\) stands for the interior of \(K^*\).
Theorem 7.1
(Strong duality; see, e.g., [11]) If (14) is strongly feasible and (15) is feasible, then \(\theta ^*_P=\theta ^*_D\) and (15) has an optimal solution. Similarly, if (15) is strongly feasible and (14) is feasible, then \(\theta ^*_P=\theta ^*_D\) and (14) has an optimal solution.
The theoretical convergence of most of algorithms to solve (14) requires the strong feasibility for both (14) and (15). In fact, primal–dual interior-point methods approximately compute \((x, y)\in \mathbb {R}^n\times \mathbb {R}^n\) that satisfies
If (14) and (15) are strongly feasible, it follows from Theorem 7.1 that the above system has an solution, which is optimal for (14) and (15).
Finally, we give a characterization for (14) and (15) to be strongly feasible.
Theorem 7.2
(See [10, 13]) The exactly one of the following two statements is true:
-
1.
(14) is strongly feasible.
-
2.
There exists \(y\in \mathbb {R}^m\setminus \{0\}\) such that \(-A^Ty \in K^*\) and \(b^Ty \ge 0\).
In particular, if there exists \(y\in \mathbb {R}^m\setminus \{0\}\) such that \(-A^Ty \in K^*\) and \(b^Ty > 0\), (14) is infeasible. Similarly, the exactly one of the following two statements is true:
-
1.
(15) is strongly feasible.
-
2.
There exists \(x\in \mathbb {R}^n\setminus \{0\}\) such that \(Ax = 0\), \(x \in K\) and \(c^Tx \le 0\).
In particular, if there exists \(y\in \mathbb {R}^m\setminus \{0\}\) such that \(Ax =0\), \(x \in K\) and \(c^Tx < 0\), (15) is infeasible.
Appendix 2 : An SOCP Formulation for (9) and (10), and Its Strong Feasibility
In this section, we provide an SOCP formulation for (9) and (10), and prove that both the SOCP problem and its dual are strongly feasible under a mild assumption. The latter implies that both problems have optimal solutions, and that algorithms to solve SOCP problems, e.g., primal–dual interior-point methods converge an optimal solution.
We assume that (3) has a feasible solution \(\hat{\beta }\). In addition, we allow \(\ell _i = -\infty \) and \(u_I = +\infty \), but assume \(\ell _i\le u_i\) for all \(i=1, \ldots , n\).
To restrict the search space of a given SVP, we choose \(M=\Vert B\hat{\beta }\Vert _2^2\). The SOCP formulation for (9) and (10) are
where we define
and e stands for the n-dimensional ones vector and f is \(\pm e_i\) for (9) and \(\pm e\) for (10). Its dual can be formulated as follows:
By applying Theorem 7.2 to (17), we can prove the strong feasibility of (17).
Proposition 8.1
(17) is strongly feasible.
Proof
We consider the following system
As B is nonsingular, \(\Vert By\Vert _2\le 0\) implies \(y=0\) and (18) does not have any nonzero solutions. It follows from Theorem 7.2 that (17) is strongly feasible. \(\square \)
It should be noted that the strong feasibility of (17) is independent of the choice of f, L, and U although the feasible region of the dual (17) depends on them.
By applying Theorem 7.2 to (16) for the strong feasibility of (16), it is sufficient to consider the following system:
We prove that (19) has only the zero solution under a mild assumption. This implies (16) is strongly feasible.
Proposition 8.2
Assume \(\ell< \hat{\beta } < u\), i.e., \(\ell _i< \hat{\beta }_i < u_i\) for all \(i=1, \ldots , n\). Moreover, we assume that there exists \(j\in \{1, \ldots , n\}\) such that \((B\hat{\beta })^Tb_j \ne M\). Then (19) does not have any nonzero solutions.
Proof
From (19), we obtain
Then we obtain \(w(\hat{\beta }^Te) = \sum _{j\in U}\hat{\beta }_j s_j - \sum _{j\in L}\hat{\beta }_j t_j -(B\hat{\beta })^Tx_2\), and thus
It follows from \(x_1\ge \Vert x_2\Vert _2\) that the left hand side can be replaced by
We have \(\sqrt{M}\Vert x_2\Vert _2 = \Vert B\hat{\beta }\Vert _2\Vert x_2\Vert _2 \ge |(B\hat{\beta })^Tx_2|\ge -(B\hat{\beta })^Tx_2\) due to the Cauchy-Schwarz inequality. In addition, the assumption on bounds u and \(\ell \) implies
As both s and t are nonnegative, we obtain the following equalities from these inequalities:
It follows from the last equality that we have \(x_2 = -\alpha B\hat{\beta }\) for some \(\alpha \ge 0\). Substituting them into (19), we can rewrite (19) into the following system:
From \(w\ge 0\), the first and second equalities, we have \(M = b_j^TB\hat{\beta }\) for all \(j=1, \ldots , n\) if \(\alpha \ne 0\). This contradicts the assumption. Hence \(\alpha =0\) and \(w=x_1 = 0\) and \(x_2 = 0_{n-1}\), and (16) is strongly feasible under the assumption. \(\square \)
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kimura, K., Waki, H. (2018). A Mixed Integer Quadratic Formulation for the Shortest Vector Problem. In: Takagi, T., Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., Duong, D. (eds) Mathematical Modelling for Next-Generation Cryptography. Mathematics for Industry, vol 29. Springer, Singapore. https://doi.org/10.1007/978-981-10-5065-7_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-5065-7_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5064-0
Online ISBN: 978-981-10-5065-7
eBook Packages: EngineeringEngineering (R0)