Lattice Problems Beyond Polynomial Time

We study the complexity of lattice problems in a world where algorithms, reductions, and protocols can run in superpolynomial time, revisiting four foundational results: two worst-case to average-case reductions and two protocols. We also show a novel protocol. 1. We prove that secret-key cryptography exists if -approximate SVP is hard for -time algorithms. I.e., we extend to our setting (Micciancio and Regev's improved version of) Ajtai's celebrated polynomial-time worst-case to average-case reduction from -approximate SVP to SIS. 2. We prove that public-key cryptography exists if -approximate SVP is hard for -time algorithms. This extends to our setting Regev's celebrated polynomial-time worst-case to average-case reduction from -approximate SVP to LWE. In fact, Regev's reduction is quantum, but ours is classical, generalizing Peikert's polynomial-time classical reduction from -approximate SVP. 3. We show a -time coAM protocol for -approximate CVP, generalizing the celebrated polynomial-time protocol for -CVP due to Goldreich and Goldwasser. These results show complexity-theoretic barriers to extending the recent line of fine-grained hardness results for CVP and SVP to larger approximation factors. (This result also extends to arbitrary norms.) 4. We show a -time co-non-deterministic protocol for -approximate SVP, generalizing the (also celebrated!) polynomial-time protocol for -CVP due to Aharonov and Regev. 5. We give a novel coMA protocol for -approximate CVP with a -time verifier. All of the results described above are special cases of more general theorems that achieve time-approximation factor tradeoffs.
View on arXiv