malb.iomalb.io

SIS with Hints Zoo

Table of Contents

An attempt to keep track of all those new SIS-like assumptions that hand out additional hints. Some of these venture into LWE land, but for now I want to keep it more or less SIS focused.

In th jolly tradition of "Are Graded Encoding Schemes broken yet?" I tag problems as BROKEN if I am aware of cryptanalysis. I also tag them as:

STANDARD
if there is a reduction from a standard (non-hint) assumption that covers meaningful parameters, i.e. those useful in applications. For example, k-SIS is tagged like this but k-R-ISIS is not because known reductions only cover parameters that, so far, seem useless in applications.
EQUIVALENT
if there is a reduction from another hint assumption. Again, this may only cover some parameters. This is meant to indicate that cryptanalytic efforts might be better directed at the equivalent problem.

Please reach out if you find a mistake or have an update.

1. STANDARD k-SIS

(Boneh & Freeman, 2011)

We give the module variant defined in (Albrecht, Cini, Lai, Malavolta, & Thyagarajan, 2022). We recover the original definition by setting R:=Z.

For any integer k0, an instance of the k-M-SIS problem is a matrix ARqη× and a set of k vectors u0,uk1 s.t. Aui0modq with uiβ. A solution to the problem is a nonzero vector uR such that

uβ,Au0modq,anduK-span({ui}0i<k).

An LWE variant, called k-LWE was introduced in (Ling, Phan, Stehlé, & Steinfeld, 2014).

1.1. Hardness

The original paper showed that k-SIS (over Z) is hard if SIS is hard for uniform A and discrete Gaussian ui. This reduction was improved in (Ling, Phan, Stehlé, & Steinfeld, 2014) to cover k=O().

The condition uK-span({ui}0i<k) can be dropped when k<1/4 because then the probability that there is an additional short vector in the k-dimensional sublattice spanned by the ui is negligible.

No proof was provided for the module variant.

2. One-more-ISIS

(Agrawal, Kirshanova, Stehlé, & Yadav, 2022)

A challenger selects a matrix AZqη× and sends it to the adversary. The adversary can perform two types of queries:

Syndrome queries The adversary can request a challenge vector which the challenger selects at random, i.e. t$Zqη, adds to some set S and returns to the adversary.

Preimage queries. The adversary submits any vector tZqη. The challenger will return a short vector y$DZ,σ such that Aytmodq. Denote k for the number of preimage queries.

In the end the adversary is asked to output k+1 pairs {(yi,ti)}0i<k+1 satisfying: Ayitimodq,yiβ and tiS.

2.1. Hardness

The hardness of the problem is analysed using direct cryptanalysis in the original paper. The authors give a combinatorial attack and a lattice attack.

Combinatorial Attack. The adversary requests ηq preimages for all {aei  aZq,iZη}, here ei is the i-th unit vector. Then, adding up η such preimages allows to construct any image. Since the norm of the preimages returned by the challenger is σ, this allows to solve the One-more-ISIS problem when ησβ. Of course, smaller and larger sets of preimages are possible, increasing and decreasing the output norm respectively.

Lattice Attack. The adversary requests preimages of zero and uses that to produce a short basis T for the kernel of A, i.e. AT0modq. This constitutes a trapdoor for A and thus permits to return short preimages for any target. The key point here is that this trapdoor is of degraded quality relative to the trapdoor used by the challenger. The key computational challenge then is to fix-up or improve this degraded trapdoor in order to be able to sample sufficiently short vectors.

3. K-R-ISIS

(Albrecht, Cini, Lai, Malavolta, & Thyagarajan, 2022)

Let g(X)R(X) be a Laurent monomial, i.e. g(X)=Xe:=iZwXiei for some exponent vector e=(ei:iZw)Zw. Let GR(X) be a set of Laurent monomials with k:=|G|. Let gR(X) be a target Laurent monomial. We call a family G k-M-ISIS-admissible if

  1. all gG have constant degree, i.e. e1O(1);
  2. all gG are distinct, i.e. G is not a multiset; and
  3. 0G.

We call a family (G,g) k-M-ISIS-admissible if G is k-MISIS-admissible, g has constant degree, and gG.


Now, let t=(1,0,,0). Let GR(X) be a set of w-variate Laurent monomial. Let gR(X) be a target Laurent monomial. Let (G,g) be k-M-ISIS-admissible. Let A$Rqη×, v$(Rq)w. The K-M-ISIS assumption states that given (A,v,t,{ug}) with ug short and g(v)tAugmodq it is hard to find a short ug and small s s.t. sg(v)tAugmodq. When η=1, i.e. when A is just a vector, we call the problem k-R-ISIS.

3.1. Hardness

The hardness of the problem is analysed by the authors by providing some partial reductions, i.e. covering some special cases. These special cases are not interesting for applications. The authors show that

  • k-R-ISIS (with g1) is as hard as R-SIS when >k or when the system generated by G is efficiently invertible.
  • k-M-ISIS is at least as hard as k-R-ISIS and that k-M-ISIS is a true generalisation of k-R-SIS.
  • (G,g) is as hard as (G,0) for any G, formalising the intuition that the non-homogeneous variant is no easier than the homogeneous variant.
  • scaling (G,g) multiplicatively by any non-zero Laurent monomial does not change the hardness, e.g. we may choose to normalise instances to g1.

The authors also explore direct cryptanalysis:

  • a direct SIS attack on A.
  • finding short Z-linear combinations of ui
  • finding Q-linear combinations of ui that produce short images.

4. BROKEN Knowledge K-R-ISIS

(Albrecht, Cini, Lai, Malavolta, & Thyagarajan, 2022)

The assumption essentially states that for any element ct that the adversary can produce together with a short preimage, it produced that as some small linear combination of the preimages {ug} we have given it. Thus, roughly:

If an adversary outputs any c,uc s.t. ctAucmodq then there is an extractor that – with access to the adversary's randomness – outputs short {cg} s.t. cgGcgg(v)modq.

The knowledge assumption only makes sense for η2. However, in order to be able to pun about "crises of knowledge", the authors also define a ring version of the knowledge assumption. In the ring setting, they consider proper ideals rather than submodules.

4.1. Cryptanalysis

The assumption is invalidated – at least "morally" – in (Wee & Wu, 2023a). Roughly speaking, the attack uses that the preimages of g(v)t span a short basis of the submodule spanned by t: essentially an Ajtai-style trapdoor. Then, sampling an arbitrary, not-necessarily short, preimage of some ct, Babai rounding can be applied to obtain a short preimage of some other, random c~t.

An implementation of the attack in SageMath is available here.

5. EQUIVALENT Twin K-R-ISIS

(Balbás, Catalano, Fiore, & Lai, 2022)

let t=(1,0,,0). Let GA,GBR(X) be sets of w-variate Laurent monomial. Let (GAGB) be k-M-ISIS-admissible. Let A$Rqη×, B$Rqη×, v$(Rq)w. The Twin K-M-ISIS assumption states that given (A,B,{ug}gGA,{wg}gGB,t,v) with ug,wg short, g(v)tAugmodq,  gGA, and g(v)tBwgmodq,  gGB it is hard to find a short u,w s.t. 0Au+Bwmodq.

5.1. Hardness

In (Albrecht, Fenzi, Lapiha, & Nguyen, 2023), it is shown that Twin k-R-ISIS is no easier than k-R-ISIS via a re-randomisation argument.

6. STANDARD BASIS (Random)

(Wee & Wu, 2023b)

We consider BASISrand with k=2, for simplicity.

Let AZqη×. We're given B:=(A00Gη+10A1Gη+1) and a short T s.t. GηBTmodq where Ai are uniformly random for i>0 and A0:=[a|AT]T for uniformly random A and a.

The BASISrand assumption states that given (B,T) it is hard to find a short x s.t. Ax0.

6.1. Hardness

It was shown in the original paper that BASISrand is as hard as SIS. The idea is that we can construct B given A since we can trapdoor all Ai for i>0.

A way of looking at is by noting that for each column t=(t(0),t(1),t(G)) of T we have Ait(i)Gη+1t(G) where Gη+1t(G) is close to uniform. Thus, we can sample t(0), compute y:=A0t(0) and then use the gadget structure of Gη+1 to find a short t(G) s.t. Ait(i)Gη+1t(G). Then, using the trapdoors for Ai with i>0 we can find t(i) s.t. Ait(i)Gη+1t(G).

7. EQUIVALENT BASIS (Structured)

(Wee & Wu, 2023b)

We consider BASISstruct with k=2, for simplicity.

Let AZqη×. We're given B:=(A00Gη+10A1Gη+1) and a short T s.t. GηBTmodq where Ai:=WiA for known WiZqη×η.

The BASISstruct assumption states that given (B,T) it is hard to find a short x s.t. Ax0.

7.1. Hardness

The authors also show that given an algorithm for solving BASISstruct there is an algorithm for solving k-M-ISIS. This reduction outputs a BASISstruct instance of size k</k where k is the parameter k of the k-M-ISIS instance.

8. PRISIS

PRISIS (Fenzi & Nguyen, 2023) is a special case of BASIS. It is more structured than BASIS, so we might expect hardness results on PRISIS to translate to BASIS. It turns out the additional structure allows to prove a broader regime of parameters as hard as M-SIS.

Let ARqη×. We're given B:=(A0Gη+10wAGη+100Gη+10w1AGη+1) and a short T s.t. GηBTmodq.

The PRISIS assumption states that given (A,B,w,T) it is hard to find a short x s.t. Ax0.

8.1. Hardness

If =2 then PRISIS is no easier than M-SIS (Fenzi & Nguyen, 2023).

9. STANDARD h-PRISIS

h-PRISIS (Albrecht, Fenzi, Lapiha, & Nguyen, 2023) is a multi-instance version of PRISIS.

Let AiRqη× for i{0,,h1}. We're given Bi:=(Ai0Gη+10wiAiGη+100Gη+10wi1AiGη+1) and a short Ti s.t. GηBiTimodq.

The h-PRISIS assumption states that given ({Ai},{Bi},{wi},{T}i) it is hard to find a short xi s.t. Aixi0.

9.1. Hardness

h-PRISIS is no easier than PRISIS (Albrecht, Fenzi, Lapiha, & Nguyen, 2023). In particular, if =2 then h-PRISIS is no easier than M-SIS (Albrecht, Fenzi, Lapiha, & Nguyen, 2023).

10. ISISf

(Bootle, Lyubashevsky, Nguyen, & Sorniotti, 2023)

Let AZqη× and let f:ZNZqη be a function. Given (A,f) and access to an oracle that when called samples a fresh x$ZN and outputs x,ux s.t. Auxf(x)modq and uxβ, the ISISf assumption states that it is hard to output a fresh tuple (x,u) s.t. Auf(x)modq and uβ.

10.1. Hardness

If f is a random oracle then the problem, in the ROM, is as hard as SIS.

In (Bootle, Lyubashevsky, Nguyen, & Sorniotti, 2023) the authors set f to be a function that first turns xZN into a binary vector x{0,1}logN and then outputs Bx. The call this problem ISISbin. The authors analyse direct lattice reduction as well as exploiting relations on the image space. The authors also introduce an interactive variant and show its equivalence.

Bibliography

Agrawal, S., Kirshanova, E., Stehlé, D., & Yadav, A. (2022). Practical, round-optimal lattice-based blind signatures. In H. Yin, A. Stavrou, C. Cremers, & E. Shi (Eds.), Proceedings of the 2022 ACM SIGSAC conference on computer and communications security, CCS 2022 (pp. 39–53). https://doi.org/10.1145/3548606.3560650
Albrecht, M. R., Cini, V., Lai, R. W. F., Malavolta, G., & Thyagarajan, S. A. K. (2022). Lattice-based snarks: Publicly verifiable, preprocessing, and recursively composable - (extended abstract). In Y. Dodis & T. Shrimpton (Eds.), Advances in cryptology - CRYPTO 2022 (pp. 102–132). Springer. https://doi.org/10.1007/978-3-031-15979-4\_4
Albrecht, M. R., Fenzi, G., Lapiha, O., & Nguyen, N. K. (2023). Slap: Succinct lattice-based polynomial commitments from standard assumptions. Cryptology ePrint Archive, Paper 2023/1469. Retrieved from https://eprint.iacr.org/2023/1469
Balbás, D., Catalano, D., Fiore, D., & Lai, R. W. F. (2022). Functional commitments for circuits from falsifiable assumptions. Cryptology ePrint Archive, Paper 2022/1365. Retrieved from https://eprint.iacr.org/2022/1365
Boneh, D., & Freeman, D. M. (2011). Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public key cryptography - PKC 2011 (pp. 1–16). Springer. https://doi.org/10.1007/978-3-642-19379-8\_1
Bootle, J., Lyubashevsky, V., Nguyen, N. K., & Sorniotti, A. (2023). A framework for practical anonymous credentials from lattices. Cryptology ePrint Archive, Paper 2023/560. Retrieved from https://eprint.iacr.org/2023/560
Fenzi, G., & Nguyen, N. K. (2023). Lattice-based polynomial commitments: Towards asymptotic and concrete efficiency. Cryptology ePrint Archive, Paper 2023/846. Retrieved from https://eprint.iacr.org/2023/846
Ling, S., Phan, D. H., Stehlé, D., & Steinfeld, R. (2014). Hardness of k-lwe and applications in traitor tracing. In J. A. Garay & R. Gennaro (Eds.), Advances in cryptology - CRYPTO 2014 (pp. 315–334). Springer. https://doi.org/10.1007/978-3-662-44371-2\_18
Wee, H., & Wu, D. J. (2023a). Lattice-based functional commitments: Fast verification and cryptanalysis. Asiacrypt 2023. Springer-Verlag.
Wee, H., & Wu, D. J. (2023b). Succinct vector, polynomial, and functional commitments from lattices. In C. Hazay & M. Stam (Eds.), Advances in cryptology - EUROCRYPT 2023 (pp. 385–416). Springer. https://doi.org/10.1007/978-3-031-30620-4\_13