The Approximate k-List Problem

We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In the k-list problem, one starts with k lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target vector. In our generalized Approximate k-list prob...

Full description

Bibliographic Details
Main Authors: Leif Both, Alexander May
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/600
id doaj-659efa6458a3418eaa650853908529ea
record_format Article
spelling doaj-659efa6458a3418eaa650853908529ea2021-03-02T04:40:55ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-03-0138039710.13154/tosc.v2017.i1.380-397600The Approximate k-List ProblemLeif Both0Alexander May1Horst Görtz Institute for IT-Security Ruhr-University Bochum, Faculty of MathematicsHorst Görtz Institute for IT-Security Ruhr-University Bochum, Faculty of MathematicsWe study a generalization of the k-list problem, also known as the Generalized Birthday problem. In the k-list problem, one starts with k lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target vector. In our generalized Approximate k-list problem, one has to find a set of vectors that sum to a vector of small Hamming weight ω. Thus, we relax the condition on the target vector and allow for some error positions. This in turn helps us to significantly reduce the size of the starting lists, which determines the memory consumption, and the running time as a function of ω. For ω = 0, our algorithm achieves the original k-list run-time/memory consumption, whereas for ω = n/2 it has polynomial complexity. As in the k-list case, our Approximate k-list algorithm is defined for all k = 2m,m > 1. Surprisingly, we also find an Approximate 3-list algorithm that improves in the runtime exponent compared to its 2-list counterpart for all 0 < ω < n/2. To the best of our knowledge this is the first such improvement of some variant of the notoriously hard 3-list problem. As an application of our algorithm we compute small weight multiples of a given polynomial with more flexible degree than with Wagner’s algorithm from Crypto 2002 and with smaller time/memory consumption than with Minder and Sinclair’s algorithm from SODA 2009.https://tosc.iacr.org/index.php/ToSC/article/view/600nearest neighbor problemapproximate matchingk-list problembirthday problemcollision searchlow weight polynomials
collection DOAJ
language English
format Article
sources DOAJ
author Leif Both
Alexander May
spellingShingle Leif Both
Alexander May
The Approximate k-List Problem
IACR Transactions on Symmetric Cryptology
nearest neighbor problem
approximate matching
k-list problem
birthday problem
collision search
low weight polynomials
author_facet Leif Both
Alexander May
author_sort Leif Both
title The Approximate k-List Problem
title_short The Approximate k-List Problem
title_full The Approximate k-List Problem
title_fullStr The Approximate k-List Problem
title_full_unstemmed The Approximate k-List Problem
title_sort approximate k-list problem
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2017-03-01
description We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In the k-list problem, one starts with k lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target vector. In our generalized Approximate k-list problem, one has to find a set of vectors that sum to a vector of small Hamming weight ω. Thus, we relax the condition on the target vector and allow for some error positions. This in turn helps us to significantly reduce the size of the starting lists, which determines the memory consumption, and the running time as a function of ω. For ω = 0, our algorithm achieves the original k-list run-time/memory consumption, whereas for ω = n/2 it has polynomial complexity. As in the k-list case, our Approximate k-list algorithm is defined for all k = 2m,m > 1. Surprisingly, we also find an Approximate 3-list algorithm that improves in the runtime exponent compared to its 2-list counterpart for all 0 < ω < n/2. To the best of our knowledge this is the first such improvement of some variant of the notoriously hard 3-list problem. As an application of our algorithm we compute small weight multiples of a given polynomial with more flexible degree than with Wagner’s algorithm from Crypto 2002 and with smaller time/memory consumption than with Minder and Sinclair’s algorithm from SODA 2009.
topic nearest neighbor problem
approximate matching
k-list problem
birthday problem
collision search
low weight polynomials
url https://tosc.iacr.org/index.php/ToSC/article/view/600
work_keys_str_mv AT leifboth theapproximateklistproblem
AT alexandermay theapproximateklistproblem
AT leifboth approximateklistproblem
AT alexandermay approximateklistproblem
_version_ 1724243031926767616