On Communication for Distributed Babai Point Computation

We present a communication-efficient distributed protocol for computing the Babai point, an approximate nearest point for a random vector ${\bf X}\in\mathbb{R}^n$ in a given lattice. We show that the protocol is optimal in the sense that it minimizes the sum rate when the components of ${\bf X}$ are mutually independent. We then investigate the error probability, i.e. the probability that the Babai point does not coincide with the nearest lattice point. In dimensions two and three, this probability is seen to grow with the packing density. For higher dimensions, we use a bound from probability theory to estimate the error probability for some well-known lattices. Our investigations suggest that for uniform distributions, the error probability becomes large with the dimension of the lattice, for lattices with good packing densities. We also consider the case where $\mathbf{X}$ is obtained by adding Gaussian noise to a randomly chosen lattice point. In this case, the error probability goes to zero with the lattice dimension when the noise variance is sufficiently small. In such cases, a distributed algorithm for finding the approximate nearest lattice point is sufficient for finding the nearest lattice point.

[1]  Sueli I. Rodrigues Costa,et al.  On the communication cost of determining an approximate nearest lattice point , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[2]  Avishek Adhikari,et al.  Introduction to Mathematical Cryptography , 2014 .

[3]  Lenny Fukshansky,et al.  Canonical basis twists of ideal lattices from real quadratic number fields. , 2018, 1808.09007.

[4]  Alon Orlitsky,et al.  Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[5]  Curtis T. McMullen,et al.  Minkowski’s Conjecture, Well-Rounded Lattices and Topological Dimension , 2005 .

[6]  Jörg Peters,et al.  Symmetric box-splines on the A*n lattice , 2010, J. Approx. Theory.

[7]  Brendan J. Frey,et al.  Interactive Decoding of a Broadcast Message , 2003 .

[8]  László Lovász,et al.  Factoring polynomials with rational coefficients , 1982 .

[9]  Alexander Vardy,et al.  Closest point search in lattices , 2002, IEEE Trans. Inf. Theory.

[10]  C. A. Rogers,et al.  An Introduction to the Geometry of Numbers , 1959 .

[11]  Miklós Ajtai,et al.  Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.

[12]  Georgios B. Giannakis,et al.  High-Performance Cooperative Demodulation With Decode-and-Forward Relays , 2007, IEEE Transactions on Communications.

[13]  Neil J. A. Sloane,et al.  Low-dimensional lattices. VI. Voronoi reduction of three-dimensional lattices , 1992, Proceedings of the Royal Society of London. Series A: Mathematical and Physical Sciences.

[14]  Camilla Hollanti,et al.  Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels , 2016, IEEE Transactions on Information Theory.

[15]  Camilla Hollanti,et al.  Well-rounded lattices for reliability and security in Rayleigh fading SISO channels , 2016, 2016 IEEE Information Theory Workshop (ITW).

[16]  Xiao-Wen Chang,et al.  Effects of the LLL Reduction on the Success Probability of the Babai Point and on the Complexity of Sphere Decoding , 2012, IEEE Transactions on Information Theory.

[17]  László Babai,et al.  On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..

[18]  Damien Stehlé,et al.  Low-dimensional lattice basis reduction revisited , 2004, TALG.

[19]  Andrew Mayer,et al.  Low dimensional lattices have a strict Voronoï basis , 1995 .

[20]  Shafi Goldwasser,et al.  Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.

[21]  Vinay A. Vaishampayan,et al.  Communication cost of transforming a nearest plane partition to the Voronoi partition , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[22]  N. J. A. Sloane,et al.  Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.

[23]  Chris Peikert,et al.  A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..

[24]  M. Hellman The Mathematics of Public-Key Cryptography , 1979 .

[25]  Alexander J. Smola,et al.  Communication Efficient Distributed Machine Learning with the Parameter Server , 2014, NIPS.