Lattices Part II — Dual Lattices , Fourier Transform , Smoothing Parameter , Public Key

نویسنده

  • Boaz Barak
چکیده

Fourier transform Consider the interval [0, λ] and suppose that we identify the point λ with 0 (i.e., think of it as a Torus and work modulo λ). Another way to think about this is as the basic cell of the lattice λZ, whose dual is the lattice (1/λ)Z. A periodic function on this torus has to period length of the form λ/n for an integer n. Thus, the Fourier transform of a function on this torus involves representing it as a sum of functions of the form x 7→ e−2πinx/λ. More generally, the Fourier transform of a function f on P(L) represents f as the sum of functions of the form x 7→ e2πi〈x,y〉 where y is an element in L∗. That is, we have the following theorem:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lattices Part II — Dual Lattices , Fourier Transform , Smoothing Parameter , Public Key Encryption

Fourier transform Consider the interval [0, λ] and suppose that we identify the point λ with 0 (i.e., think of it as a Torus and work modulo λ). Another way to think about this is as the basic cell of the lattice λZ, whose dual is the lattice (1/λ)Z. A periodic function on this torus has to period length of the form λ/n for an integer n. Thus, the Fourier transform of a function on this torus i...

متن کامل

New transference theorems on lattices possessing n∈-unique shortest vectors

We prove three optimal transference theorems on lattices possessing n -unique shortest vectors which relate to the successive minima, the covering radius and the minimal length of generating vectors respectively. The theorems result in reductions between GapSVPγ′ and GapSIVPγ for this class of lattices. Furthermore, we prove a new transference theorem giving an optimal lower bound relating the ...

متن کامل

Key Recovery and Message Attacks on NTRU-Composite

NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman of Brown University. It operates in the ring of polynomials Z[X]/(X − 1), where the domain parameter N largely determines the security of the system. Although N is typically chosen to be prime, Silverman proposes taking N to be a power of two to enable the use of Fast Fourier Transforms. We break this sc...

متن کامل

A Fast Fourier Transform with Rectangular Output on the BCC and FCC Lattices

This paper discusses the efficient, non-redundant evaluation of a Discrete Fourier Transform on the three dimensional Body-Centered and Face-Centered Cubic lattices. The key idea is to use an axis aligned window to truncate and periodize the sampled function which leads to separable transforms. We exploit the geometry of these lattices and show that by choosing a suitable non-redundant rectangu...

متن کامل

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware

In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classical cryptographic schemes (like ECC or RSA). In addition to that, lattices are a versatile tool and play an important role in the development of efficient fully or somewhat homomorphic encryption (SHE/FHE) schemes. In practice, ideal lattices defined in the polynomial ring Zp[...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008