{"id":"https://openalex.org/W4388313077","doi":"https://doi.org/10.1186/s42400-023-00173-w","title":"Improved lower bound for the complexity of unique shortest vector problem","display_name":"Improved lower bound for the complexity of unique shortest vector problem","publication_year":2023,"publication_date":"2023-11-04","ids":{"openalex":"https://openalex.org/W4388313077","doi":"https://doi.org/10.1186/s42400-023-00173-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00173-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00173-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00173-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00173-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108875604","display_name":"Baolong Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baolong Jin","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079155690","display_name":"Rui Xue","orcid":"https://orcid.org/0000-0001-6024-3635"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Xue","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108875604"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1758,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58185823,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5827758312225342},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4106835722923279},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35341382026672363}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5827758312225342},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4106835722923279},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35341382026672363}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00173-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00173-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00173-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c09b809ccade432d9a8c22c656beb4e3","is_oa":true,"landing_page_url":"https://doaj.org/article/c09b809ccade432d9a8c22c656beb4e3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-9 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00173-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00173-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00173-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6487752525","display_name":null,"funder_award_id":"62172405","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4388313077.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W216855343","https://openalex.org/W1490468194","https://openalex.org/W1971361630","https://openalex.org/W1987609195","https://openalex.org/W1994208342","https://openalex.org/W2012589104","https://openalex.org/W2015281423","https://openalex.org/W2020913456","https://openalex.org/W2029538739","https://openalex.org/W2030170158","https://openalex.org/W2051176401","https://openalex.org/W2058785578","https://openalex.org/W2077244027","https://openalex.org/W2132050984","https://openalex.org/W2142048307","https://openalex.org/W2163375015","https://openalex.org/W2169690324","https://openalex.org/W2293438091","https://openalex.org/W2402835844","https://openalex.org/W4233090147"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Abstract":[0],"Unique":[1],"shortest":[2,97],"vector":[3,98],"problem":[4,99],"(uSVP)":[5],"plays":[6],"an":[7],"important":[8],"role":[9],"in":[10,127,152,165],"lattice":[11],"based":[12,17],"cryptography.":[13],"Many":[14],"cryptographic":[15],"schemes":[16],"their":[18],"security":[19],"on":[20],"it.":[21],"For":[22],"the":[23,33,42,50,53,62,78,158,162],"cofidence":[24],"of":[25,35,44,52,64,80,103],"those":[26],"applications,":[27],"it":[28],"is":[29,90,126,167],"essential":[30],"to":[31,60],"clarify":[32],"complexity":[34],"uSVP":[36,45,65,81,89],"with":[37,66,82,101],"different":[38],"parameters.":[39,68],"However,":[40],"proving":[41],"NP-hardness":[43,63],"appears":[46],"quite":[47],"hard.":[48],"To":[49],"state":[51],"art,":[54],"we":[55,72,86],"are":[56],"even":[57],"not":[58],"able":[59],"prove":[61],"constant":[67,83,159],"In":[69],"this":[70],"work,":[71],"gave":[73],"a":[74,153],"lower":[75],"bound":[76],"for":[77,150],"hardness":[79],"parameters,":[84],"i.e.":[85],"proved":[87],"that":[88],"at":[91],"least":[92],"as":[93,95],"hard":[94],"gap":[96,102],"(GapSVP)":[100],"$$O(\\sqrt{n/\\log":[104],"(n)})$$":[105],"<mml:math":[106,131],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[107,132],"<mml:mrow>":[108,112,133],"<mml:mi>O</mml:mi>":[109],"<mml:mo>(</mml:mo>":[110,116],"<mml:msqrt>":[111],"<mml:mi>n</mml:mi>":[113,117],"<mml:mo>/</mml:mo>":[114],"<mml:mo>log</mml:mo>":[115],"<mml:mo>)</mml:mo>":[118,121],"</mml:mrow>":[119,122,141],"</mml:msqrt>":[120],"</mml:math>":[123,142],",":[124],"which":[125],"$$NP":[128],"\\cap":[129],"coAM$$":[130],"<mml:mi>N</mml:mi>":[134],"<mml:mi>P</mml:mi>":[135],"<mml:mo>\u2229</mml:mo>":[136],"<mml:mi>c</mml:mi>":[137],"<mml:mi>o</mml:mi>":[138],"<mml:mi>A</mml:mi>":[139],"<mml:mi>M</mml:mi>":[140],".":[143],"Unlike":[144],"previous":[145],"works,":[146],"our":[147],"reduction":[148],"works":[149],"paramters":[151],"bigger":[154],"range,":[155],"especially":[156],"when":[157],"hidden":[160],"by":[161],"big-":[163],"O":[164],"GapSVP":[166],"smaller":[168],"than":[169],"1.":[170],"Graphical":[171],"abstract":[172]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
