k-SIS: Difference between revisions
m Update reference link |
m Update link |
||
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
=== k-SIS<sub>n,m,d,q,β,s</sub> === | === k-SIS<sub>n,m,d,q,β,s</sub> === | ||
Let matrix <math>\mathbf{A} \in \mathcal{R}_q^{n \times m}</math> be chosen uniformly at random and <math>k</math> hint vectors <math>\mathbf{s}_i</math> from <math>D_{\Lambda_q^\perp(\mathbf{A}), s}</math> with <math>\lVert \mathbf{s}_i \rVert</math>. Given <math>\mathbf{A}</math> and <math>\{ \mathbf{s}_i \}_{i \in [k]}</math>, an adversary is asked to find a new short non-zero vector <math>\mathbf{s}^* \in \mathcal{R}^m</math> satisfying <math>\ | Let matrix <math>\mathbf{A} \in \mathcal{R}_q^{n \times m}</math> be chosen uniformly at random and <math>k</math> hint vectors <math>\mathbf{s}_i</math> from <math>D_{\Lambda_q^\perp(\mathbf{A}), s}</math> with <math>\lVert \mathbf{s}_i \rVert</math>. Given <math>\mathbf{A}</math> and <math>\{ \mathbf{s}_i \}_{i \in [k]}</math>, an adversary is asked to find a new short non-zero vector <math>\mathbf{s}^* \in \mathcal{R}^m</math> satisfying <math>\mathbf{A} \cdot \mathbf{s}^* = \mathbf{0} \bmod q \land \lVert \mathbf{s}^* \rVert \leq \beta \land \mathbf{s}^* \notin \mathcal{K}-\text{span}\left( \{ \mathbf{s}_i \}_{i \in [k]} \right).</math> | ||
The provided definition is the module-variant, which was defined by Albrecht et al.<ref>Albrecht, M.R., Cini, V., Lai, R.W., Malavolta, G. and Thyagarajan, S.A. [https://eprint.iacr.org/2022/941.pdf Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable]. ''Annual International Cryptology Conference''. Cham: Springer Nature Switzerland, 2022.</ref> The original version can be recovered by setting <math>\mathcal{R} = \mathbb{Z}</math> and <math>\mathcal{K} = \mathbb{Q}</math>. | The provided definition is the module-variant, which was defined by Albrecht et al.<ref>Albrecht, M.R., Cini, V., Lai, R.W., Malavolta, G. and Thyagarajan, S.A. [https://eprint.iacr.org/2022/941.pdf Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable]. ''Annual International Cryptology Conference''. Cham: Springer Nature Switzerland, 2022.</ref> The original version can be recovered by setting <math>\mathcal{R} = \mathbb{Z}</math> and <math>\mathcal{K} = \mathbb{Q}</math>. | ||
Intuitively, k-SIS asks for a SIS solution that is not a linear combination of the provided hints. | Intuitively, k-SIS asks for a [[Short Integer Solution|SIS]] solution that is not a linear combination of the provided hints. | ||
The condition <math>\mathbf{s}^* \notin \mathcal{K}-\text{span}\left( \{ \mathbf{s}_i \}_{i \in [k]} \right) </math> can be dropped when <math>k < m^{1/4} </math> as then the probability that there is an additional short vector in the <math>k </math>-dimensional sublattice spanned by <math>\{ \mathbf{s}_i \}_{i \in [k]}</math> is negligible.<ref name=":0" /> | The condition <math>\mathbf{s}^* \notin \mathcal{K}-\text{span}\left( \{ \mathbf{s}_i \}_{i \in [k]} \right) </math> can be dropped when <math>k < m^{1/4} </math> as then the probability that there is an additional short vector in the <math>k </math>-dimensional sublattice spanned by <math>\{ \mathbf{s}_i \}_{i \in [k]}</math> is negligible.<ref name=":0" /> | ||
Line 26: | Line 26: | ||
== Related Assumptions == | == Related Assumptions == | ||
* k-LWE | * [[k-LWE]] | ||
== References == | == References == | ||
<references /> | <references /> |
Latest revision as of 12:23, 29 August 2025
The k-SIS assumption was introduced in 2011 by Boneh and Freeman[1]. The assumption hands out hints additionally to the SIS challenge matrix restricting the solution space by any linear combination of these hints.
Formal Definition
k-SISn,m,d,q,β,s
Let matrix be chosen uniformly at random and hint vectors from with . Given and , an adversary is asked to find a new short non-zero vector satisfying
The provided definition is the module-variant, which was defined by Albrecht et al.[2] The original version can be recovered by setting and .
Intuitively, k-SIS asks for a SIS solution that is not a linear combination of the provided hints.
The condition can be dropped when as then the probability that there is an additional short vector in the -dimensional sublattice spanned by is negligible.[1]
Hardness of k-SIS
k-SISn,m,q,β,s (over ) is at least as hard as SISn,m-k,q,β'. Boneh and Freeman[1] proved this result for constant and Ling et al.[3] improved this result to .
The initial proof[1] relies on the following observation. Let , and a short -invertible entry. Define and . Then, In this way, the proof embeds a hint for each added column to the challenge matrix. Embedding multiple hints and recovering a SIS solution requires several technical details, which we omit here.
No proof was provided for the module variant.
Constructions based on k-SIS
Related Assumptions
References
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 Boneh, Dan, and David Mandell Freeman. Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
- ↑ Albrecht, M.R., Cini, V., Lai, R.W., Malavolta, G. and Thyagarajan, S.A. Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable. Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022.
- ↑ Ling, S., Phan, D.H., Stehlé, D. and Steinfeld, R. Hardness of k-LWE and applications in traitor tracing. Algorithmica 79.4 (2017): 1318-1352.