Applications of Lattices in Telecommunications Amin Sakzad Dept of - - PowerPoint PPT Presentation

applications of lattices in telecommunications
SMART_READER_LITE
LIVE PREVIEW

Applications of Lattices in Telecommunications Amin Sakzad Dept of - - PowerPoint PPT Presentation

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Applications of Lattices in Telecommunications Amin Sakzad Dept of Electrical and Computer Systems Engineering Monash University


slide-1
SLIDE 1

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography

Applications of Lattices in Telecommunications

Amin Sakzad

Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu

  • Oct. 2013

Lattice Coding III: Applications Amin Sakzad

slide-2
SLIDE 2

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography

1

Sphere Decoder Algorithm Rotated Signal Constellations Sphere Decoding Algorithm

2

Lattice Reduction Algorithms Definitions

3

Integer-Forcing Linear Receiver Multiple-input Multiple-output Channel Problem statement Integer-Forcing

4

Lattice-based Cryptography GGH public-key cryptosystem

Lattice Coding III: Applications Amin Sakzad

slide-3
SLIDE 3

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Channel Model

We consider n-dimensional signal constellation A carved from the lattice Λ with generator matrix G, for example 4-QAM.

Lattice Coding III: Applications Amin Sakzad

slide-4
SLIDE 4

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Channel Model

We consider n-dimensional signal constellation A carved from the lattice Λ with generator matrix G, for example 4-QAM. Hence, x = uG represent a transmitted signal.

Lattice Coding III: Applications Amin Sakzad

slide-5
SLIDE 5

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Channel Model

We consider n-dimensional signal constellation A carved from the lattice Λ with generator matrix G, for example 4-QAM. Hence, x = uG represent a transmitted signal. The received vector y = α · x + z, where αi, are independent real Rayleigh random variables with unit second moment and zi are real Gaussian distributed with zero mean and variance σ/2.

Lattice Coding III: Applications Amin Sakzad

slide-6
SLIDE 6

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Channel Model

We consider n-dimensional signal constellation A carved from the lattice Λ with generator matrix G, for example 4-QAM. Hence, x = uG represent a transmitted signal. The received vector y = α · x + z, where αi, are independent real Rayleigh random variables with unit second moment and zi are real Gaussian distributed with zero mean and variance σ/2. With perfect Channel State Information (CSI) at the receiver, the ML decoder requires to solve the following optimization problem min

n

  • i=1

|yi − αixi|2.

Lattice Coding III: Applications Amin Sakzad

slide-7
SLIDE 7

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Pairwise error probability

Using standard Chernoff bound technique one can estimate pairwise error probability under ML decoder as Pr(x → x′) ≤ 1 2

  • xi=x′

i

4σ (xi − x′

i)2 =

(4σ)ℓ 2d(ℓ)

min,p(x, x′)2 ,

where the ℓ-product distance is d(ℓ)

min,p(x, x′)

  • xi=x′

i

|xi − x′

i|.

Lattice Coding III: Applications Amin Sakzad

slide-8
SLIDE 8

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Goal

Definition The parameter L = min(ℓ) is called modulation diversity.

Lattice Coding III: Applications Amin Sakzad

slide-9
SLIDE 9

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Goal

Definition The parameter L = min(ℓ) is called modulation diversity. Definition We define the product distance as dmin,p = min d(L)

min,p.

Lattice Coding III: Applications Amin Sakzad

slide-10
SLIDE 10

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Goal

Definition The parameter L = min(ℓ) is called modulation diversity. Definition We define the product distance as dmin,p = min d(L)

min,p.

To minimize the error probability, one should increase both L and dmin,p

Lattice Coding III: Applications Amin Sakzad

slide-11
SLIDE 11

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Rotated Zn-lattice constellations

Lattice Coding III: Applications Amin Sakzad

slide-12
SLIDE 12

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Rotated Zn-lattice constellations

“Algebraic Number Theory” has been used as a strong tool to construct good lattices for signal constellations.

Lattice Coding III: Applications Amin Sakzad

slide-13
SLIDE 13

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Rotated Zn-lattice constellations

“Algebraic Number Theory” has been used as a strong tool to construct good lattices for signal constellations. For these lattices, the minimum product distance will be related to the volume of the lattice and the “discriminant” of the underlying number field.

Lattice Coding III: Applications Amin Sakzad

slide-14
SLIDE 14

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Rotated Zn-lattice constellations

“Algebraic Number Theory” has been used as a strong tool to construct good lattices for signal constellations. For these lattices, the minimum product distance will be related to the volume of the lattice and the “discriminant” of the underlying number field. The “signature” of a number field determines the modulation diversity.

Lattice Coding III: Applications Amin Sakzad

slide-15
SLIDE 15

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Rotated Signal Constellations

Rotated Zn-lattice constellations

“Algebraic Number Theory” has been used as a strong tool to construct good lattices for signal constellations. For these lattices, the minimum product distance will be related to the volume of the lattice and the “discriminant” of the underlying number field. The “signature” of a number field determines the modulation diversity. List of good algebraic rotations are available online. See Emanuele’s webpage.

Lattice Coding III: Applications Amin Sakzad

slide-16
SLIDE 16

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Optimization Problem

The problem is to solve the following: min

x∈Λ y − x2 =

min

w∈y−Λ w2.

Lattice Coding III: Applications Amin Sakzad

slide-17
SLIDE 17

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Algorithm[Viterbo’99]

Set x = uG, y = ρG, and w = ζG for u ∈ Zn and ρ, ζ ∈ Rn.

Lattice Coding III: Applications Amin Sakzad

slide-18
SLIDE 18

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Algorithm[Viterbo’99]

Set x = uG, y = ρG, and w = ζG for u ∈ Zn and ρ, ζ ∈ Rn. Let the Gram matrix M = GGT has the following Cholesky decomposition M = RRT , where R is an upper triangular matrix.

Lattice Coding III: Applications Amin Sakzad

slide-19
SLIDE 19

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Algorithm[Viterbo’99]

Set x = uG, y = ρG, and w = ζG for u ∈ Zn and ρ, ζ ∈ Rn. Let the Gram matrix M = GGT has the following Cholesky decomposition M = RRT , where R is an upper triangular matrix. We have w2 = ζRRT ζT =

n

  • i=1

qiiU 2

i ≤ C,

where Ui, qii are based on rij and ζi, for 1 ≤ i, j ≤ n.

Lattice Coding III: Applications Amin Sakzad

slide-20
SLIDE 20

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Algorithm[Viterbo’99]

Set x = uG, y = ρG, and w = ζG for u ∈ Zn and ρ, ζ ∈ Rn. Let the Gram matrix M = GGT has the following Cholesky decomposition M = RRT , where R is an upper triangular matrix. We have w2 = ζRRT ζT =

n

  • i=1

qiiU 2

i ≤ C,

where Ui, qii are based on rij and ζi, for 1 ≤ i, j ≤ n. Starting from Un and working backward, one can find bounds

  • n Ui, these will be transformed to bounds on ui.

Lattice Coding III: Applications Amin Sakzad

slide-21
SLIDE 21

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Comments

The sphere decoding algorithm can be adapted to work on fading channels as well.

Lattice Coding III: Applications Amin Sakzad

slide-22
SLIDE 22

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Comments

The sphere decoding algorithm can be adapted to work on fading channels as well. Choosing the radius C is a crucial part of the algorithm. Covering radius is an excellent choice.

Lattice Coding III: Applications Amin Sakzad

slide-23
SLIDE 23

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Sphere Decoding Algorithm

Comments

The sphere decoding algorithm can be adapted to work on fading channels as well. Choosing the radius C is a crucial part of the algorithm. Covering radius is an excellent choice. The complexity is reasonable for low dimensions, n = 64.

Lattice Coding III: Applications Amin Sakzad

slide-24
SLIDE 24

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography

Lattice Reduction Algorithms; Key to Application

Lattice Coding III: Applications Amin Sakzad

slide-25
SLIDE 25

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Given a basis set, a lattice reduction technique is a process to

  • btain a new basis set of the lattice with shorter vectors.

Lattice Coding III: Applications Amin Sakzad

slide-26
SLIDE 26

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Given a basis set, a lattice reduction technique is a process to

  • btain a new basis set of the lattice with shorter vectors.

Figure: Geometrical view of Lattice Reduction.

Lattice Coding III: Applications Amin Sakzad

slide-27
SLIDE 27

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Gram-Schmidt Orthogonalization

The orthogonal vectors generated by the Gram-Schmidt

  • rthogonalization procedure are denoted by {GS(g1), . . . , GS(gn)}

which spans the same space of {g1, . . . , gn}.

Lattice Coding III: Applications Amin Sakzad

slide-28
SLIDE 28

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Gram-Schmidt Orthogonalization

The orthogonal vectors generated by the Gram-Schmidt

  • rthogonalization procedure are denoted by {GS(g1), . . . , GS(gn)}

which spans the same space of {g1, . . . , gn}. Definition We define µm,j GS(gm), GS(gj) GS(gj)2 , where 1 ≤ m, j ≤ n.

Lattice Coding III: Applications Amin Sakzad

slide-29
SLIDE 29

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Gram-Schmidt Orthogonalization

The orthogonal vectors generated by the Gram-Schmidt

  • rthogonalization procedure are denoted by {GS(g1), . . . , GS(gn)}

which spans the same space of {g1, . . . , gn}. Definition We define µm,j GS(gm), GS(gj) GS(gj)2 , where 1 ≤ m, j ≤ n. Definition The m–th successive minima of a lattice, denoted by λm, is the radius of the smallest possible closed ball around origin containing m or more linearly independent lattice points forming a basis.

Lattice Coding III: Applications Amin Sakzad

slide-30
SLIDE 30

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

CLLL Reduction

A generator matrix G′ for a lattice Λ is called LLL-reduced if it satisfies

1 |µm,j| ≤ 1/2 for all 1 ≤ j < m ≤ n, and 2 δGS

  • g′

m−1

  • 2 ≤ GS (g′

m) + µ2 m,m−1GS

  • g′

m−1

  • 2 for all

1 < m ≤ n, where δ ∈ (1/4, 1] is a factor selected to achieve a good quality-complexity tradeoff.

Lattice Coding III: Applications Amin Sakzad

slide-31
SLIDE 31

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Mikowski Lattice Reduction

A lattice generator matrix G′ is called Minkowski-reduced if for 1 ≤ m ≤ n, the vectors g′

m are as short as possible.

Lattice Coding III: Applications Amin Sakzad

slide-32
SLIDE 32

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Mikowski Lattice Reduction

A lattice generator matrix G′ is called Minkowski-reduced if for 1 ≤ m ≤ n, the vectors g′

m are as short as possible.

In particular, G′ is Minkowski-reduced if for 1 ≤ m ≤ n, the row vector g′

m has minimum possible energy amongst all the other

lattice points such that {g′

1, . . . , g′ m} can be extended to another

basis of Λ.

Lattice Coding III: Applications Amin Sakzad

slide-33
SLIDE 33

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

HKZ Lattice Reduction

A generator matrix G′ for a lattice Λ is called HKZ-reduced if it satisfies

1 |Rm,j| ≤ 1

2|Rm,m| for all 1 ≤ m ≤ j ≤ n, and

2 Rj,j be the length of the shortest vector of a lattice generated

by the columns of the sub matrix R ([j, j + 1, . . . , n], [j, j + 1, . . . , n]). Note that G′ = QR is the QR decomposition of G′.

Lattice Coding III: Applications Amin Sakzad

slide-34
SLIDE 34

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Properties

The m-th row vector in G′ is upper bounded by a scaled version of the m-th successive minima of Λ. For CLLL reduction, we have β1−mλ2

m ≤ g′ m2 ≤ βn−1λ2 m, for 1 ≤ m ≤ n,

where β = (δ − 1/4)−1.

Lattice Coding III: Applications Amin Sakzad

slide-35
SLIDE 35

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Properties

The m-th row vector in G′ is upper bounded by a scaled version of the m-th successive minima of Λ. For CLLL reduction, we have β1−mλ2

m ≤ g′ m2 ≤ βn−1λ2 m, for 1 ≤ m ≤ n,

where β = (δ − 1/4)−1. For the Minkowski reduction, we have λ2

m ≤ g′ m2 ≤ max

  • 1,

5 4 n−4 λ2

m, for 1 ≤ m ≤ n.

Lattice Coding III: Applications Amin Sakzad

slide-36
SLIDE 36

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Definitions

Properties

The m-th row vector in G′ is upper bounded by a scaled version of the m-th successive minima of Λ. For CLLL reduction, we have β1−mλ2

m ≤ g′ m2 ≤ βn−1λ2 m, for 1 ≤ m ≤ n,

where β = (δ − 1/4)−1. For the Minkowski reduction, we have λ2

m ≤ g′ m2 ≤ max

  • 1,

5 4 n−4 λ2

m, for 1 ≤ m ≤ n.

For the HKZ reduction, we have 4λ2

m

m + 3 ≤ g′

m2 ≤ (m + 3)λ2 m

4 , for 1 ≤ m ≤ n.

Lattice Coding III: Applications Amin Sakzad

slide-37
SLIDE 37

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography

One Example of Using Lattice Reduction Algorithms

Lattice Coding III: Applications Amin Sakzad

slide-38
SLIDE 38

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Lattice Coding III: Applications Amin Sakzad

slide-39
SLIDE 39

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

MIMO Channel Model

We consider a flat-fading MIMO channel with n transmit antennas and n receive antennas.

Lattice Coding III: Applications Amin Sakzad

slide-40
SLIDE 40

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

MIMO Channel Model

We consider a flat-fading MIMO channel with n transmit antennas and n receive antennas. The channel matrix is denoted by G ∈ Cn×n, where the entries of G are i.i.d. as CN(0, 1).

Lattice Coding III: Applications Amin Sakzad

slide-41
SLIDE 41

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

MIMO Channel Model

We consider a flat-fading MIMO channel with n transmit antennas and n receive antennas. The channel matrix is denoted by G ∈ Cn×n, where the entries of G are i.i.d. as CN(0, 1). For 1 ≤ m ≤ n, the m-th layer is equipped with an encoder E : Rk → CN which maps a message m ∈ Rk over the ring R into a lattice codeword xm ∈ Λ ⊂ CN in the complex space.

Lattice Coding III: Applications Amin Sakzad

slide-42
SLIDE 42

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

If X denotes the matrix of transmitted vectors, the received signal Y is given by Yn×N = √ PGn×nXn×N + Zn×N, where P = SNR

n

and SNR denotes the average signal-to-noise ratio at each receive antenna.

Lattice Coding III: Applications Amin Sakzad

slide-43
SLIDE 43

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

If X denotes the matrix of transmitted vectors, the received signal Y is given by Yn×N = √ PGn×nXn×N + Zn×N, where P = SNR

n

and SNR denotes the average signal-to-noise ratio at each receive antenna. We assume that the entries of Z are i.i.d. as CN(0, 1).

Lattice Coding III: Applications Amin Sakzad

slide-44
SLIDE 44

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

This model will be used in this section.

Lattice Coding III: Applications Amin Sakzad

slide-45
SLIDE 45

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

This model will be used in this section. Lattice reductions can improve the performance of MIMO channels if employed at either transmitters or receivers.

Lattice Coding III: Applications Amin Sakzad

slide-46
SLIDE 46

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Multiple-input Multiple-output Channel

This model will be used in this section. Lattice reductions can improve the performance of MIMO channels if employed at either transmitters or receivers. Lattice-reduction-aided MIMO detectors, Lattice reduction precoders, etc.

Lattice Coding III: Applications Amin Sakzad

slide-47
SLIDE 47

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Problem statement

In order to uniquely recover the information symbols, the matrix A must be invertible over the ring R. Thus, we have Y′ = BY = √ PBGX + BZ.

Lattice Coding III: Applications Amin Sakzad

slide-48
SLIDE 48

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Problem statement

In order to uniquely recover the information symbols, the matrix A must be invertible over the ring R. Thus, we have Y′ = BY = √ PBGX + BZ. The goal is to project G (by left multiplying it with a receiver filtering matrix B) onto a non-singular integer matrix A.

Lattice Coding III: Applications Amin Sakzad

slide-49
SLIDE 49

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Problem statement

In order to uniquely recover the information symbols, the matrix A must be invertible over the ring R. Thus, we have Y′ = BY = √ PBGX + BZ. The goal is to project G (by left multiplying it with a receiver filtering matrix B) onto a non-singular integer matrix A. For the IF receiver formulation, a suitable signal model is Y′ = √ PAX + √ P(BG − A)X + BZ, where √ PAX is the desired signal component, and the effective noise is √ P(BG − A)X + BZ.

Lattice Coding III: Applications Amin Sakzad

slide-50
SLIDE 50

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Problem statement

Problem Formulation

In particular, the effective noise power along the m-th row of Y′ is defined as g(am, bm) bm2 + PbmG − am2, where am and bm denotes the m-th row of A and B, respectively.

Lattice Coding III: Applications Amin Sakzad

slide-51
SLIDE 51

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Problem statement

Problem Formulation

In particular, the effective noise power along the m-th row of Y′ is defined as g(am, bm) bm2 + PbmG − am2, where am and bm denotes the m-th row of A and B, respectively. Problem Given G and P, the problem is to find the matrices B ∈ Cn×n and A ∈ Z[i]n×n such that: The max1≤m≤n g(am, bm) is minimized, and The corresponding matrix A is invertible over the ring R.

Lattice Coding III: Applications Amin Sakzad

slide-52
SLIDE 52

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver

Given a, the optimum value of bm can be obtained as bm = aGhS−1.

Lattice Coding III: Applications Amin Sakzad

slide-53
SLIDE 53

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver

Given a, the optimum value of bm can be obtained as bm = aGhS−1. Then, after replacing bm in g(a, bm), we get am = arg min

a∈Z[i]n aVDVhah,

where V is the matrix composed of the eigenvectors of GGh, and D is a diagonal matrix with m-th entry Dm,m =

  • Pρ2

m + 1

−1, where ρm is the m-th singular value

  • f G.

Lattice Coding III: Applications Amin Sakzad

slide-54
SLIDE 54

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver; Continued

With this, we have to obtain n vectors am, 1 ≤ m ≤ n, which result in the first n smaller values of aVDVhah along with the non-singular property on A.

Lattice Coding III: Applications Amin Sakzad

slide-55
SLIDE 55

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver; Continued

With this, we have to obtain n vectors am, 1 ≤ m ≤ n, which result in the first n smaller values of aVDVhah along with the non-singular property on A. The minimization problem is the shortest vector problem for a lattice with Gram matrix M = VDVh.

Lattice Coding III: Applications Amin Sakzad

slide-56
SLIDE 56

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver; Continued

With this, we have to obtain n vectors am, 1 ≤ m ≤ n, which result in the first n smaller values of aVDVhah along with the non-singular property on A. The minimization problem is the shortest vector problem for a lattice with Gram matrix M = VDVh. Since M is a positive definite matrix, we can write M = LLh for some L ∈ Cn×n by using Choelsky decomposition.

Lattice Coding III: Applications Amin Sakzad

slide-57
SLIDE 57

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver; Continued

With this, we have to obtain n vectors am, 1 ≤ m ≤ n, which result in the first n smaller values of aVDVhah along with the non-singular property on A. The minimization problem is the shortest vector problem for a lattice with Gram matrix M = VDVh. Since M is a positive definite matrix, we can write M = LLh for some L ∈ Cn×n by using Choelsky decomposition. With this, the rows of L = VD

1 2 generate a lattice, say Λ. Lattice Coding III: Applications Amin Sakzad

slide-58
SLIDE 58

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

IF Receiver; Continued

With this, we have to obtain n vectors am, 1 ≤ m ≤ n, which result in the first n smaller values of aVDVhah along with the non-singular property on A. The minimization problem is the shortest vector problem for a lattice with Gram matrix M = VDVh. Since M is a positive definite matrix, we can write M = LLh for some L ∈ Cn×n by using Choelsky decomposition. With this, the rows of L = VD

1 2 generate a lattice, say Λ.

A set of possible choices for {a1, . . . , an} is the set of complex integer vectors, whose corresponding lattice points in Λ have lengths at most equal to the n-th successive minima of Λ.

Lattice Coding III: Applications Amin Sakzad

slide-59
SLIDE 59

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

The Proposed Algorithm

The two well-known lattice reduction algorithms satisfying the above property up to constants are HKZ and Minkowski lattice reduction algorithms.

Lattice Coding III: Applications Amin Sakzad

slide-60
SLIDE 60

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

The Proposed Algorithm

The two well-known lattice reduction algorithms satisfying the above property up to constants are HKZ and Minkowski lattice reduction algorithms. Input: G ∈ Cn×n, and P. Output: A unimodular matrix A.

1 Form the generator matrix L = VD 1 2 of a lattice Λ. 2 Reduce L to L′ using either HKZ or Minkowski lattice

reduction algorithm.

3 The n rows of L′L−1 provide n rows am of A for 1 ≤ m ≤ n. Lattice Coding III: Applications Amin Sakzad

slide-61
SLIDE 61

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

Receive Diversity

Theorem (Sakzad’13) For a MIMO channel with n transmit and n receive antennas over a Rayleigh fading channel, the integer-forcing linear receiver based

  • n lattice reduction achieves full receive diversity.

Lattice Coding III: Applications Amin Sakzad

slide-62
SLIDE 62

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography Integer-Forcing

Performance against exhaustive search

5 10 15 20 25 30 10

−5

10

−4

10

−3

10

−2

10

−1

10 SNR in dB Coded−Block Error Rate ML IF Brute Force IF−Minkowski IF−HKZ MMSE Lattice Coding III: Applications Amin Sakzad

slide-63
SLIDE 63

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography

A toy example from Cryptography

Lattice Coding III: Applications Amin Sakzad

slide-64
SLIDE 64

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Public and private keys

1 GGH involves a private key and a public key. Lattice Coding III: Applications Amin Sakzad

slide-65
SLIDE 65

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Public and private keys

1 GGH involves a private key and a public key. 2 The private key of user j is a generator matrix Gj of a lattice

Λ with “nearly orthogonal” basis vectors and a unimodular matrix Uj, for j ∈ {a, b}.

Lattice Coding III: Applications Amin Sakzad

slide-66
SLIDE 66

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Public and private keys

1 GGH involves a private key and a public key. 2 The private key of user j is a generator matrix Gj of a lattice

Λ with “nearly orthogonal” basis vectors and a unimodular matrix Uj, for j ∈ {a, b}.

3 The public key of user j is G′

j = UjGj, which is another

generator matrix of the lattice Λ.

Lattice Coding III: Applications Amin Sakzad

slide-67
SLIDE 67

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Public and private keys

1 GGH involves a private key and a public key. 2 The private key of user j is a generator matrix Gj of a lattice

Λ with “nearly orthogonal” basis vectors and a unimodular matrix Uj, for j ∈ {a, b}.

3 The public key of user j is G′

j = UjGj, which is another

generator matrix of the lattice Λ.

4 Security parameters are n and σ. Lattice Coding III: Applications Amin Sakzad

slide-68
SLIDE 68

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Public and private keys

1 GGH involves a private key and a public key. 2 The private key of user j is a generator matrix Gj of a lattice

Λ with “nearly orthogonal” basis vectors and a unimodular matrix Uj, for j ∈ {a, b}.

3 The public key of user j is G′

j = UjGj, which is another

generator matrix of the lattice Λ.

4 Security parameters are n and σ. 5 Works based on the hardness of closest vector problem (CVP). Lattice Coding III: Applications Amin Sakzad

slide-69
SLIDE 69

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Description

1 Alice wants to send a message m to Bob. Lattice Coding III: Applications Amin Sakzad

slide-70
SLIDE 70

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Description

1 Alice wants to send a message m to Bob. 2 She uses Bob’s public key G′

b and encrypts m to

c = mG′

b + e,

where e ∈ {±σ}n.

Lattice Coding III: Applications Amin Sakzad

slide-71
SLIDE 71

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Description

1 Alice wants to send a message m to Bob. 2 She uses Bob’s public key G′

b and encrypts m to

c = mG′

b + e,

where e ∈ {±σ}n.

3 Bob employs U and G to decrypt c as follows. Bob first

computes cG−1

b

= mG′

bG−1 b

+ eG−1

b

= mUb + eG−1

b ,

then ⌊cG−1

b ⌉U−1 b

= mUbU−1

b

= m.

Lattice Coding III: Applications Amin Sakzad

slide-72
SLIDE 72

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem 1 Various attacks have been proposed. Almost dead! Lattice Coding III: Applications Amin Sakzad

slide-73
SLIDE 73

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem 1 Various attacks have been proposed. Almost dead! 2 NTRU is a special instance of GGH using a circulant matrix

for the public key.

Lattice Coding III: Applications Amin Sakzad

slide-74
SLIDE 74

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem 1 Various attacks have been proposed. Almost dead! 2 NTRU is a special instance of GGH using a circulant matrix

for the public key.

3 Increase the dimension of the lattice up to 1000. Lattice Coding III: Applications Amin Sakzad

slide-75
SLIDE 75

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem 1 Various attacks have been proposed. Almost dead! 2 NTRU is a special instance of GGH using a circulant matrix

for the public key.

3 Increase the dimension of the lattice up to 1000. 4 One very famous attack on these cryptosystems is lattice

reduction algorithms.

Lattice Coding III: Applications Amin Sakzad

slide-76
SLIDE 76

Sphere Decoder Algorithm Lattice Reduction Algorithms Integer-Forcing Linear Receiver Lattice-based Cryptography GGH public-key cryptosystem

Thanks for your attention!

Lattice Coding III: Applications Amin Sakzad