ISISf: Difference between revisions
First draft |
m Add links |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
The ISIS<sub>f</sub> assumption was introduced by Bootle, Lyubashevsky, Nguyen, and Sorniotti in 2023.<ref name=":0">Bootle, | The ISIS<sub>f</sub> assumption was introduced by Bootle, Lyubashevsky, Nguyen, and Sorniotti in 2023.<ref name=":0">Bootle, J., Lyubashevsky, V., Nguyen, N.K. and Sorniotti, A. [https://eprint.iacr.org/2023/560.pdf A framework for practical anonymous credentials from lattices]. ''Annual International Cryptology Conference''. Cham: Springer Nature Switzerland, 2023.</ref> It introduces a function <math>f</math> that removes the requirement of a static target vector and passes additional hints to the adversary. | ||
== Formal Definition == | == Formal Definition == | ||
Line 47: | Line 47: | ||
== Related Assumptions == | == Related Assumptions == | ||
* Generalised ISIS<sub>f</sub> | * [[Generalised ISISf|Generalised ISIS<sub>f</sub>]] | ||
* One-More-ISIS | * [[One-More-ISIS]] | ||
* Randomised One-More-ISIS | * [[Randomised One-More-ISIS]] | ||
== References == | == References == | ||
<references /> | <references /> |
Latest revision as of 13:29, 27 August 2025
The ISISf assumption was introduced by Bootle, Lyubashevsky, Nguyen, and Sorniotti in 2023.[1] It introduces a function that removes the requirement of a static target vector and passes additional hints to the adversary.
Formal Definition
ISISf
Let be public parameters, matrix be chosen uniformly at random and be a specified function . The challenger generates hints in the following way.
Given the matrix , the function , and the set of hints , the adversary is asked to find a new tuple satisfying
Intuition. ISISf essentially expects the adversary to either successfully solve ISIS or compute a preimage of the function . Thus, the hardness of ISISf depends on the choice of . We list few examples for insecure choices of .
- Additively homomorphic functions imply trivial solutions by adding or subtracting two hints.
- Any efficiently invertible function using public information enables choosing short and finding a preimage of .
- Assume is a linear function and the domain of was mapped to . Then, any hint can be used to generate a valid ISISf solution .
Interactive ISISf
Let be public parameters, matrices be chosen uniformly at random, be a specified function , and . Given the matrices , and the function , an adversary is able to query an oracle adaptively, which on input proceeds as follows.
- if then return
- return
An adversary is asked to find a new tuple satisfying
Intuition. The interactive version expands ISISf by an Ajtai commitment and enables adaptive queries, where an adversary controls the input to the Ajtai commitment. Notice that the adversary is not capable of influencing the choice of , which can be thought of as salt in the context of a signature whereas is the signature.
Hardness of ISISf and its interactive version
If is a random oracle then the problem, in the ROM, is at least as hard as SIS.[2]
Bootle et al.[1] set to be , where outputs the binary encoding of . They call this problem ISISbin. The authors analyse direct lattice reduction as well as exploiting relations on the image space for ISISbin.
In Theorem 3.3, Bootle et al.[1] show that interactive ISISf is at least as hard as ISISf. The reduction uses for a uniformly chosen , rejection sampling, the entropy that and are sampled with and introduces a polynomial loss factor depending on the number of allowed queries to .
Constructions based on ISISf
Bootle et al.[1] provide a framework to generically build the following constructions from any interactive ISISf instance.
Related Assumptions
References
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Bootle, J., Lyubashevsky, V., Nguyen, N.K. and Sorniotti, A. A framework for practical anonymous credentials from lattices. Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2023.
- ↑ Gentry, Craig, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the fortieth annual ACM symposium on Theory of computing. 2008.
- ↑ 3.0 3.1 Lyubashevsky, Vadim, Gregor Seiler, and Patrick Steuer. The LaZer library: Lattice-based zero knowledge and succinct proofs for quantum-safe privacy. Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 2024.