Papers
Topics
Authors
Recent
Search
2000 character limit reached

Closest Vector Problem (CVP)

Updated 28 July 2025
  • Closest Vector Problem (CVP) is a computational challenge defined on a lattice basis where the goal is to find the lattice vector nearest to a target under a given norm.
  • Researchers employ exact and approximate algorithms, including randomized methods, lattice sparsification, and geometric covering techniques, to tackle CVP efficiently.
  • CVP’s computational hardness underpins post-quantum cryptographic schemes and influences optimization, integer programming, and coding theory with broad practical applications.

The Closest Vector Problem (CVP) is a foundational computational problem in lattice theory, discrete optimization, and cryptography. Given a full-rank lattice ΛRn\Lambda \subset \mathbb{R}^n, specified by a basis BRn×nB \in \mathbb{R}^{n \times n}, and a target vector tRnt \in \mathbb{R}^n, CVP asks for a lattice vector vΛv \in \Lambda that minimizes tv\|t - v\| with respect to a specified norm (typically p\ell_p). The intractability of CVP underpins the security of post-quantum cryptographic schemes, and its computational complexity has been the subject of intense research due to its connections with complexity theory, integer programming, coding theory, and geometric algorithms.

1. Formal Definition and Structural Variants

The formal CVP is as follows: For a given lattice Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\} (with basis BB), and a target tRnt \in \mathbb{R}^n, find vΛv \in \Lambda minimizing BRn×nB \in \mathbb{R}^{n \times n}0. Variants include:

  • Exact CVP: Output BRn×nB \in \mathbb{R}^{n \times n}1 satisfying BRn×nB \in \mathbb{R}^{n \times n}2.
  • Approximate CVP: Output BRn×nB \in \mathbb{R}^{n \times n}3 with BRn×nB \in \mathbb{R}^{n \times n}4 for some BRn×nB \in \mathbb{R}^{n \times n}5.
  • Preprocessing CVP (CVPP): The lattice is preprocessed arbitrarily (with unbounded space/time), and then, given BRn×nB \in \mathbb{R}^{n \times n}6, answer CVP for that particular target efficiently (Dadush et al., 2014, Bonifas et al., 2014).
  • (0,1)-CVP: Restrict lattice vectors to be BRn×nB \in \mathbb{R}^{n \times n}7 combinations of the basis (Abboud et al., 7 Jan 2025).

For BRn×nB \in \mathbb{R}^{n \times n}8 (Euclidean) norm, CVP is strongest in cryptographic applications, but other norms such as BRn×nB \in \mathbb{R}^{n \times n}9, especially tRnt \in \mathbb{R}^n0, are studied for their role in complexity-theoretic analyses (Bennett et al., 2017, Aggarwal et al., 2019).

2. Exact Algorithms and Complexity Barriers

CVP is known to be NP-hard for the Euclidean and most other norms, and remains NP-hard to approximate within some small constant factor (Bennett et al., 2017). The best known exact algorithm (for general lattices in tRnt \in \mathbb{R}^n1) is randomized and runs in time tRnt \in \mathbb{R}^n2 and space tRnt \in \mathbb{R}^n3 (Aggarwal et al., 2015). Earlier, deterministic Voronoi cell-based methods achieved tRnt \in \mathbb{R}^n4 time and tRnt \in \mathbb{R}^n5 space (Hunkenschröder et al., 2018, Bonifas et al., 2014).

Barriers and Fine-Grained Complexity: Reductions from tRnt \in \mathbb{R}^n6-SAT establish no tRnt \in \mathbb{R}^n7-time algorithm exists for CVPtRnt \in \mathbb{R}^n8 with odd tRnt \in \mathbb{R}^n9 and vΛv \in \Lambda0 (under SETH), but these reductions fundamentally fail for vΛv \in \Lambda1 (Euclidean norm) and other even vΛv \in \Lambda2 (Bennett et al., 2017, Aggarwal et al., 2019). The inherent rigidity of Euclidean CVP solutions, as analyzed by additive combinatorics (notably through Szemerédi's cube lemma on boolean cubes), restricts the possible structure of solution sets; in particular, closest vector sets cannot simulate all vΛv \in \Lambda3-CNF structure in vΛv \in \Lambda4 (Aggarwal et al., 2019). This structural limitation is pivotal in explaining the current inability to rule out vΛv \in \Lambda5-time algorithms for exact CVPvΛv \in \Lambda6 via natural reductions.

Problem Variant Best Known Complexity Hardness Result
CVP (exact, vΛv \in \Lambda7) vΛv \in \Lambda8 randomized No vΛv \in \Lambda9 known (barrier) (Bennett et al., 2017Aggarwal et al., 2019)
CVP, tv\|t - v\|0 odd or tv\|t - v\|1 tv\|t - v\|2 SETH-hard for tv\|t - v\|3 (Bennett et al., 2017Aggarwal et al., 2019)
(0,1)-CVPtv\|t - v\|4 tv\|t - v\|5 Equivalence to Max-tv\|t - v\|6-SAT, clique (Abboud et al., 7 Jan 2025)

Special Cases and Algorithmic Breakthroughs: In the restricted (0,1)–CVP (where lattice vectors are 0–1 combinations of basis vectors), recent (Abboud et al., 7 Jan 2025) results break the tv\|t - v\|7 barrier, achieving tv\|t - v\|8 time for exact CVPtv\|t - v\|9 when basis/target coordinates are bounded by p\ell_p0. This exploits reductions to weighted Max-SAT and p\ell_p1-clique, achieving computational equivalence (for even p\ell_p2) with well-understood problems.

3. Approximation Algorithms: Lattice Sparsification and Geometric Techniques

A core theme in recent work is achieving improved approximations in high-dimensional CVP via lattice sparsification (Dadush et al., 2012, Naszódi et al., 2019). The central idea is to construct a sublattice p\ell_p3 such that p\ell_p4 (for norm ball p\ell_p5), with low local density, reducing enumeration cost. This enables deterministic p\ell_p6-approximate CVP solvers in time p\ell_p7 and p\ell_p8 space, improving the dependency on p\ell_p9 and derandomizing earlier sieve-based approaches.

Geometric covering arguments improve the dependence of Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}0-CVP on Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}1 for Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}2 norms:

  • For Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}3: Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}4 time;
  • For Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}5: Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}6 (Naszódi et al., 2019).

These improvements leverage coverings of convex bodies with their homothets (parameterized by the modulus of smoothness), boosting coarser solvers to Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}7-accuracy.

Heuristic approaches such as nearest-colattice algorithms (Espitau et al., 2020) apply filtration and projection strategies, achieving HSVP-equivalent distance guarantees and efficient batch solving after precomputation.

4. Quantum and Classical Algorithms in Special Regimes

Recent work explores leveraging both deep learning and quantum algorithms for CVP:

  • Deep Neural Solvers for Structured Lattices: For root lattices, folding symmetries dramatically reduce the number of decision regions characterizing the CVP, yielding polynomial-time solution by deep ReLU networks, where shallow networks would require exponential width (Corlay et al., 2019).
  • QUBO and Optimization Techniques: CVP can be efficiently reduced to quadratic unconstrained binary optimization (QUBO) formulations with Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}8 binary variables, permitting solution via Ising-type quantum annealers and classical QUBO solvers, with polynomial reduction overhead (Canale et al., 2023).
  • Quantum Approximate Optimization Algorithm (QAOA): For CVP instances arising in lattice-based sieving for integer factorization (the “prime lattice”), heuristic application of QAOA with pre-trained, fixed angles yields an effective sampling complexity Λ=spanZ{b1,,bn}\Lambda = \text{span}_{\mathbb{Z}}\{b_1, \ldots, b_n\}9 (for circuit depth BB0), exceeding the quadratic speed-up of Grover’s search in these structured CVP settings (Priestley et al., 11 Mar 2025). Here, the pre-training scheme allows parameter sets to generalize across increasing lattice dimensions, facilitating scalability for sieving in cryptanalytic settings.

5. Structural Rigidity, Reductions, and Hardness

Fine-grained complexity results show exact and approximate CVP in BB1 with BB2 (odd BB3 and BB4) are SETH-hard, i.e., no BB5-time algorithm exists unless SETH fails (Bennett et al., 2017, Aggarwal et al., 2019). For the Euclidean norm (BB6), the situation is subtler:

  • Structural Rigidity: Closest vector solutions in BB7 exhibit combinatorial rigidity, forbidding arbitrary expressiveness required to encode generic NP-complete problems (notably BB8-SAT).
  • Szemerédi's Cube Lemma: This lemma, a key tool from additive combinatorics, guarantees the existence of affine cubes (i.e., large structured subspaces) in any sufficiently large subset of BB9. The inability to realize arbitrary affine cubes among the coordinates (modulo 2) of closest vectors in CVPtRnt \in \mathbb{R}^n0 instances shows a fundamental barrier: natural reductions from tRnt \in \mathbb{R}^n1-SAT to CVPtRnt \in \mathbb{R}^n2 lack the flexibility needed, as the set of closest vectors' mod-2 projections cannot reproduce arbitrary tRnt \in \mathbb{R}^n3-CNF satisfiability structure (Aggarwal et al., 2019). This demonstrates a true boundary for proof methods—faster than tRnt \in \mathbb{R}^n4 exact Euclidean CVP algorithms cannot be ruled out by known (natural) reductions.
Setting SETH-hardness (for tRnt \in \mathbb{R}^n5)? Underlying Obstacle
CVPtRnt \in \mathbb{R}^n6, tRnt \in \mathbb{R}^n7 odd/tRnt \in \mathbb{R}^n8 Yes (Bennett et al., 2017Aggarwal et al., 2019) Reduction via isolating parallelepipeds
CVPtRnt \in \mathbb{R}^n9 No (barriers) Combinatorial rigidity/Szemerédi cube lemma

This combinatorial rigidity blocks complexity-theoretic reductions, motivating research into “unnatural” reductions or alternate problem structures. The structural constraints deepen understanding of the landscape of computational hardness for lattice problems.

6. Applications and Broader Impact

CVP is not only central in theoretical computer science and cryptography but also arises in diverse applications:

  • Cryptographic constructions: Lattice-based encryption schemes and signatures rely on the worst-case hardness of CVP for security. Advances or weaknesses in algorithms for CVP or its variants directly impact the parameter choices and security margins in post-quantum cryptography (Laarhoven, 2016, Li et al., 2017).
  • Communications and Coding: CVP appears in lattice decoding, e.g., for error-correction in high-dimensional spaces, where efficiency and accuracy of CVP solvers influence practical system performance.
  • Optimization: Integer programming and cutting plane methods often reduce, via rounding arguments, to solving CVP in various norms (Dadush et al., 2012).
  • Biometrics and Fuzzy Extraction: Efficient linear-time CVP solvers for structured lattices (such as triangular lattices) directly enable fast cryptographic fuzzy extractors and signatures on high-dimensional biometric data (Takahashi et al., 2024).

Further, methods such as lattice sparsification, convex covering, and reductions to well-studied combinatorial optimization problems (Max-SAT, vΛv \in \Lambda0-Clique) highlight the tight links between lattice algorithms and broader discrete optimization paradigms.

7. Future Directions and Open Problems

Several key avenues for ongoing research emerge:

  • Exploring Hardness for CVPvΛv \in \Lambda1: Given that reductions based on affine cube structure are blocked, research may pursue more intricate (“unnatural”) reductions or explore other problem classes for potential connections.
  • Algorithmic Improvements Under Structural Constraints: The (0,1)-CVP algorithm breaking the vΛv \in \Lambda2 barrier (Abboud et al., 7 Jan 2025) points toward leveraging combinatorial decompositions and problem structure more generally.
  • Quantum and Deep Learning Methods: Further refinement of quantum pre-training and neural network folding techniques for CVP-like problems could expand practical capability in large-scale or constrained classes of lattices (Corlay et al., 2019, Priestley et al., 11 Mar 2025).
  • Understanding Clustering Phenomena in Gaussian Samplers: Analysis of discrete Gaussian clustering underlying efficient sampling and recursion for exact CVP could lead to tighter bounds or new algorithms (Aggarwal et al., 2015).
  • Applications to New Domains: Adapting advanced CVP solvers to emerging settings, such as biometric cryptosystems, coding for next-gen communication, or integer optimization under non-symmetric norms.

The Closest Vector Problem thus serves both as a driver and a barometer for progress in computational geometry, cryptography, optimization, and the fine-grained study of computational intractability. The interplay between hardness (barriers as formalized through combinatorial rigidity) and algorithmic innovation (as evidenced by breakthroughs in restricted domains and new connections) continues to fuel the development of both theory and practical methods.

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Closest Vector Problem (CVP).