108 research outputs found

    A Remark on Fourier Transform

    Full text link
    In this note, we describe an interpretation of the (continuous) Fourier transform from the perspective of the Chinese Remainder Theorem. Some related issues are discussed

    On Recovery of Sparse Signals via β„“1\ell_1 Minimization

    Get PDF
    This article considers constrained β„“1\ell_1 minimization methods for the recovery of high dimensional sparse signals in three settings: noiseless, bounded error and Gaussian noise. A unified and elementary treatment is given in these noise settings for two β„“1\ell_1 minimization methods: the Dantzig selector and β„“1\ell_1 minimization with an β„“2\ell_2 constraint. The results of this paper improve the existing results in the literature by weakening the conditions and tightening the error bounds. The improvement on the conditions shows that signals with larger support can be recovered accurately. This paper also establishes connections between restricted isometry property and the mutual incoherence property. Some results of Candes, Romberg and Tao (2006) and Donoho, Elad, and Temlyakov (2006) are extended

    New Bounds for Restricted Isometry Constants

    Get PDF
    In this paper we show that if the restricted isometry constant Ξ΄k\delta_k of the compressed sensing matrix satisfies Ξ΄k<0.307, \delta_k < 0.307, then kk-sparse signals are guaranteed to be recovered exactly via β„“1\ell_1 minimization when no noise is present and kk-sparse signals can be estimated stably in the noisy case. It is also shown that the bound cannot be substantively improved. An explicitly example is constructed in which Ξ΄k=kβˆ’12kβˆ’1<0.5\delta_{k}=\frac{k-1}{2k-1} < 0.5, but it is impossible to recover certain kk-sparse signals

    Fast Arithmetics Using Chinese Remaindering

    Full text link
    In this paper, some issues concerning the Chinese remaindering representation are discussed. Some new converting methods, including an efficient probabilistic algorithm based on a recent result of von zur Gathen and Shparlinski \cite{Gathen-Shparlinski}, are described. An efficient refinement of the NC1^1 division algorithm of Chiu, Davida and Litow \cite{Chiu-Davida-Litow} is given, where the number of moduli is reduced by a factor of log⁑n\log n

    Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure

    Get PDF
    Primal attack, BKW attack, and dual attack are three well-known attacks to LWE. To build efficient post-quantum cryptosystems in practice, the structured variants of LWE (i.e. MLWE/RLWE) are often used. Some efforts have been spent on addressing concerns about additional vulnerabilities introduced by algebraic structures and no effective attack method based on ideal lattices or module lattices has been proposed so far; these include refining primal attack and BKW attack to MLWE/RLWE. It is thus an interesting problem to consider how to enhance the dual attack against LWE with the rich algebraic structure of MLWE (including RLWE). In this paper, we present the first attempt to this problem by observing that each short vector found by BKZ generates another n βˆ’ 1 vectors of the same length automatically and all of these short vectors can be used to distinguish. To this end, an interesting property which indicates the rotations are consistent with certain linear transformations is proved, and a new kind of intersection lattice is constructed with some tricks. Moreover, we notice that coefficient vectors of different rotations of the same polynomial are near-orthogonal in high-dimensional spaces. This is validated by extensive experiments and is treated as an extension to the assumption under the original dual attack against LWE. Taking Newhope512 as an example, we show that by our enhanced dual attack method, the required blocksize and time complexity (in both classical and quantum cases) all decrease. It is remarked that our improvement is not significant and its limitation is also touched on. Our results do not reveal a severe security problem for MLWE/RLWE compared to that of a general LWE, this is consistent with the findings by the previous work for using primal and BKW attacks to MLWE/RLWE
    • …
    corecore