Papers
Topics
Authors
Recent
Search
2000 character limit reached

M-SIS: Module Short Integer Solution

Updated 13 April 2026
  • M-SIS is the generalization of the SIS problem to module lattices over cyclotomic rings, providing a framework to construct symplectic lattices.
  • It underpins a randomized, trapdoor-free algorithm that transforms M-SIS lattices into q-symplectic lattices for optimal Gottesman-Kitaev-Preskill (GKP) code design.
  • Efficient FFT-based ring arithmetic and carefully chosen parameter regimes ensure near-linear decoding time and high-probability distance guarantees for robust error correction.

Module Short Integer Solution (M-SIS) is the generalization of the classical SIS (Short Integer Solution) problem to module lattices defined over cyclotomic integer rings. M-SIS forms the basis of efficient, randomized constructions of symplectic lattices, which in turn yield Gottesman-Kitaev-Preskill (GKP) quantum error-correcting codes achieving optimal asymptotic distance properties, without requiring trapdoors for efficient decoding. This approach underlies recent advances in lattice-based cryptography and the theory of symplectic lattices used for fault-tolerant quantum information processing (Blömer et al., 12 Sep 2025).

1. Formal Definition of the M-SIS Problem and Associated Lattice

The M-SIS problem is parameterized by:

  • A cyclotomic ring R=Z[X]/(Φ(X))R = \mathbb{Z}[X]/(\Phi(X)), where Φ(X)=Xn+1\Phi(X) = X^n + 1 for the main constructions,
  • A finite ring Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X)) for integer modulus qq,
  • Module rank k∈Nk \in \mathbb{N}.

An M-SIS instance consists of a uniformly random matrix H∈Rqk×kH \in R_q^{k \times k} (often symmetric: HT=HH^T = H), with the objective to find a nonzero vector z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k satisfying Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR} and ∥z∥\|z\| (in the coefficient embedding Φ(X)=Xn+1\Phi(X) = X^n + 10) "short," meaning Φ(X)=Xn+1\Phi(X) = X^n + 11.

  • M-SIS Lattice: For such Φ(X)=Xn+1\Phi(X) = X^n + 12, the lattice is

Φ(X)=Xn+1\Phi(X) = X^n + 13

Identified via the coefficient map Φ(X)=Xn+1\Phi(X) = X^n + 14, Φ(X)=Xn+1\Phi(X) = X^n + 15 is a full-rank lattice embedded in Φ(X)=Xn+1\Phi(X) = X^n + 16.

  • Explicit Φ(X)=Xn+1\Phi(X) = X^n + 17-basis: The augmented matrix Φ(X)=Xn+1\Phi(X) = X^n + 18 defines the lattice as the set of Φ(X)=Xn+1\Phi(X) = X^n + 19 such that Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))0. By block-circulant lifting, the integer matrix Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))1 is built using the mapping of ring multiplications to Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))2 (negacyclic, circulant) matrices.

2. Randomized Symplectic Lattice Construction from M-SIS

A constructive algorithm, SYMP-FROM-M-SIS, transforms an M-SIS lattice Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))3 into a Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))4-symplectic lattice in Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))5 real dimensions, and thence (via scaling) into a Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))6-symplectic lattice appropriate for use as a GKP code lattice.

Let Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))7, and Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))8 be as above. The steps are:

  1. Build the block-circulant matrix Rq=(Z/qZ)[X]/(Φ(X))R_q = (\mathbb{Z}/q\mathbb{Z})[X]/(\Phi(X))9 from qq0.
  2. Form the integer block matrix:

qq1

  1. Define qq2, with qq3 (symmetrizing).
  2. Compute qq4, which is qq5-symplectic: qq6.
  3. Set the symplectic-basis qq7. The resulting symplectic lattice is qq8.

All steps use only uniform sampling in qq9 and ring/matrix arithmetic mod k∈Nk \in \mathbb{N}0.

3. Minimal Distance and GKP Code Parameters

The minimal vector length k∈Nk \in \mathbb{N}1 is analyzed to ensure robust error correction.

  • Distance Guarantee: With high probability over random k∈Nk \in \mathbb{N}2, for parameters k∈Nk \in \mathbb{N}3 chosen appropriately,

k∈Nk \in \mathbb{N}4

where k∈Nk \in \mathbb{N}5 is the volume of the k∈Nk \in \mathbb{N}6-dimensional unit ball.

A key technical argument bounds the probability that a short nonzero k∈Nk \in \mathbb{N}7 lies in k∈Nk \in \mathbb{N}8 by k∈Nk \in \mathbb{N}9, where H∈Rqk×kH \in R_q^{k \times k}0 depends on the support of H∈Rqk×kH \in R_q^{k \times k}1's projections across ring-factor blocks. Volume arguments and union bounds then show that, for H∈Rqk×kH \in R_q^{k \times k}2 at least polynomial in H∈Rqk×kH \in R_q^{k \times k}3, the inclusion probability vanishes exponentially in H∈Rqk×kH \in R_q^{k \times k}4, yielding high-probability optimal lattice distance.

  • GKP Code Parameters: Given a symplectic lattice H∈Rqk×kH \in R_q^{k \times k}5, a GKP code encoding H∈Rqk×kH \in R_q^{k \times k}6 logical qubits has code distance H∈Rqk×kH \in R_q^{k \times k}7. For scaled lattices H∈Rqk×kH \in R_q^{k \times k}8, the distance obeys

H∈Rqk×kH \in R_q^{k \times k}9

when encoding HT=HH^T = H0 qubits in HT=HH^T = H1 modes.

4. Efficient Bounded-Distance Decoding Algorithm

The decoding algorithm operates by Babai-style rounding in the coefficient embedding. For HT=HH^T = H2, and with symplectic lattice basis derived from HT=HH^T = H3, the algorithm proceeds:

  1. For HT=HH^T = H4 to HT=HH^T = H5, set HT=HH^T = H6.
  2. Compute HT=HH^T = H7.
  3. Compute HT=HH^T = H8 (ring-multiplication in HT=HH^T = H9).
  4. For z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k0 to z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k1, set z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k2.
  5. Output z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k3.

For z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k4 within distance z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k5 of z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k6, the algorithm returns the closest lattice point. The naive computational cost is z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k7, as z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k8 multiplication dominates. For z=(z1,z2)∈Rk×Rkz = (z_1, z_2) \in R^k \times R^k9 with Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}0 power of 2, each ring-multiplication admits Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}1 via FFT, yielding overall decoding in Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}2: near-linear in the real dimension Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}3 when Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}4 is constant.

5. Parameter Regimes for Code Construction

Concrete regimes realize optimal or near-optimal GKP code distances with high probability:

  • Case A (Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}5 power of 2, Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}6, Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}7):
    • If Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}8, then Hz1≡z2(modqR)H z_1 \equiv z_2 \pmod{qR}9 with probability at least ∥z∥\|z\|0.
    • For ∥z∥\|z\|1, the guarantee strengthens: ∥z∥\|z\|2.
  • Case B (∥z∥\|z\|3, ∥z∥\|z\|4 odd primes, ∥z∥\|z\|5, ∥z∥\|z\|6 primitive-∥z∥\|z\|7 root of ∥z∥\|z\|8):
    • If ∥z∥\|z\|9 and Φ(X)=Xn+1\Phi(X) = X^n + 100: Φ(X)=Xn+1\Phi(X) = X^n + 101.
    • If Φ(X)=Xn+1\Phi(X) = X^n + 102 and Φ(X)=Xn+1\Phi(X) = X^n + 103: Φ(X)=Xn+1\Phi(X) = X^n + 104.
  • Case C (Φ(X)=Xn+1\Phi(X) = X^n + 105, Φ(X)=Xn+1\Phi(X) = X^n + 106, Φ(X)=Xn+1\Phi(X) = X^n + 107 prime): See (Blömer et al., 12 Sep 2025), Theorem 4.7 for analogous Φ(X)=Xn+1\Phi(X) = X^n + 108-bounds.

Scaling yields Φ(X)=Xn+1\Phi(X) = X^n + 109 GKP codes with distance as above. For Φ(X)=Xn+1\Phi(X) = X^n + 110 (R-SIS case), decoding is Φ(X)=Xn+1\Phi(X) = X^n + 111. For larger Φ(X)=Xn+1\Phi(X) = X^n + 112, arbitrary Φ(X)=Xn+1\Phi(X) = X^n + 113 is supported at Φ(X)=Xn+1\Phi(X) = X^n + 114.

6. Applications and Significance

The M-SIS to symplectic lattice pipeline supplies the first efficient randomized construction of multi-mode GKP codes from standard lattice-cryptographic assumptions, using only uniform sampling without secret trapdoors.

Notably:

  • The code distances match (up to constants) the information-theoretic optimum Φ(X)=Xn+1\Phi(X) = X^n + 115.
  • The decoding algorithm is both trapdoor-free and near-linear time, enabled for Φ(X)=Xn+1\Phi(X) = X^n + 116 by efficient FFT-based ring arithmetic.
  • Useful parameter regimes correspond to cases where Φ(X)=Xn+1\Phi(X) = X^n + 117 splits into a small number of large factors over Φ(X)=Xn+1\Phi(X) = X^n + 118 (e.g., Φ(X)=Xn+1\Phi(X) = X^n + 119 a power of two).

A plausible implication is that such cryptographic-lattice-based constructions can serve as practical, scalable GKP code sources for extended quantum computation and error correction, bridging cryptography and quantum information (Blömer et al., 12 Sep 2025).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Module Short Integer Solution (M-SIS).