Short Integer Solution: Difference between revisions
m Remove tags |
m Update titles of versions |
||
Line 12: | Line 12: | ||
== Versions of SIS == | == Versions of SIS == | ||
=== | === Inhomogeneous SIS<sub>n,m,q,β</sub> === | ||
Let matrix <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m}</math>and target vector <math>\mathbf{t} \in \mathbb{Z}_q^n</math> be chosen uniformly at random. An adversary is asked to find a short vector <math>\mathbf{s} \in \mathbb{Z}^m</math> satisfying <math>\mathbf{A} \cdot \mathbf{s} = \mathbf{t} \bmod q \land \lVert \mathbf{s} \rVert \leq \beta</math>. | Let matrix <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m}</math>and target vector <math>\mathbf{t} \in \mathbb{Z}_q^n</math> be chosen uniformly at random. An adversary is asked to find a short vector <math>\mathbf{s} \in \mathbb{Z}^m</math> satisfying <math>\mathbf{A} \cdot \mathbf{s} = \mathbf{t} \bmod q \land \lVert \mathbf{s} \rVert \leq \beta</math>. | ||
The inhomogeneous version of SIS introduces a target vector <math>\mathbf{t} \in \mathbb{Z}_q^n</math>, which is chosen uniformly at random. The probability of ending up in the homogeneous case with <math>\mathbf{t} = \mathbf{0}</math> happens with probability <math>q^{-n}</math>, which allows removing the condition of <math>\mathbf{s}</math> being non-zero. | The inhomogeneous version of SIS (ISIS) introduces a target vector <math>\mathbf{t} \in \mathbb{Z}_q^n</math>, which is chosen uniformly at random. The probability of ending up in the homogeneous case with <math>\mathbf{t} = \mathbf{0}</math> happens with probability <math>q^{-n}</math>, which allows removing the condition of <math>\mathbf{s}</math> being non-zero. | ||
ISIS is as hard as SIS. A SIS instance can be reduced to ISIS using the last column of <math>\mathbf{A}</math> as target vector for ISIS. Any solution <math>\mathbf{s} \in \mathbb{Z}^{m-1}</math> to the ISIS instance with challenge matrix <math>\mathbf{A}_{[1:m-1]}</math> and target vector <math>\mathbf{a}_m</math> yields a valid SIS solution <math>(\mathbf{s}^T, -1) \in \mathbb{Z}^m</math> of slightly larger norm. The reduction from ISIS to SIS requires index guessing a non-zero entry in the SIS solution and embedding the target vector at this position in the challenge matrix <math>\mathbf{A}</math>. | ISIS is as hard as SIS. A SIS instance can be reduced to ISIS using the last column of <math>\mathbf{A}</math> as target vector for ISIS. Any solution <math>\mathbf{s} \in \mathbb{Z}^{m-1}</math> to the ISIS instance with challenge matrix <math>\mathbf{A}_{[1:m-1]}</math> and target vector <math>\mathbf{a}_m</math> yields a valid SIS solution <math>(\mathbf{s}^T, -1) \in \mathbb{Z}^m</math> of slightly larger norm. The reduction from ISIS to SIS requires index guessing a non-zero entry in the SIS solution and embedding the target vector at this position in the challenge matrix <math>\mathbf{A}</math>. | ||
=== | === Normal Form SIS<sub>n,m,q,β</sub> === | ||
Let matrix <math>\bar{\mathbf{A}} \in \mathbb{Z}_q^{n \times m-n}</math> be chosen uniformly at random and define <math>\mathbf{A} = \begin{bmatrix} \mathbf{I}_n &\bar{\mathbf{A}} \end{bmatrix}</math>. An adversary is asked to find a short non-zero vector <math>\mathbf{s} \in \mathbb{Z}^m</math>satisfying <math>\mathbf{A} \cdot \mathbf{s} = \mathbf{t} \bmod q \land 0 < \lVert \mathbf{s} \rVert \leq \beta</math>. | Let matrix <math>\bar{\mathbf{A}} \in \mathbb{Z}_q^{n \times m-n}</math> be chosen uniformly at random and define <math>\mathbf{A} = \begin{bmatrix} \mathbf{I}_n &\bar{\mathbf{A}} \end{bmatrix}</math>. An adversary is asked to find a short non-zero vector <math>\mathbf{s} \in \mathbb{Z}^m</math>satisfying <math>\mathbf{A} \cdot \mathbf{s} = \mathbf{t} \bmod q \land 0 < \lVert \mathbf{s} \rVert \leq \beta</math>. | ||
Normal Form SIS is related to the Hermite normal form of a uniformly random matrix <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m}</math>. The normal form version of SIS is often used to reduce public key sizes by size <math>n</math> as the static part of the matrix, the identity matrix <math>\mathbf{I}_n</math>, can be omitted for data transmission. | Normal Form SIS (NFSIS) is related to the Hermite normal form of a uniformly random matrix <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m}</math>. The normal form version of SIS is often used to reduce public key sizes by size <math>n</math> as the static part of the matrix, the identity matrix <math>\mathbf{I}_n</math>, can be omitted for data transmission. | ||
A SIS instance can be reduced to a NFSIS instance if the first <math>n | A SIS instance can be reduced to a NFSIS instance if the first <math>n |
Revision as of 14:07, 25 July 2025
Short Integer Solution (SIS) is an average-case problem, which was introduced in 1996 by Miklós Ajtai.[1] He introduced a family of one-way functions based on SIS and showed that SIS is hard to solve on average if a version of the shortest vector problem is hard in a worst-case scenario.
Formal Definition
SISn,m,q,β
Let matrix be chosen uniformly at random. An adversary is asked to find a short non-zero vector satisfying .
SIS intuitively states that it is hard to find a short vector in the kernel of matrix .
A solution to SIS without the condition can be found using Gaussian elimination. Thus, the condition is required as otherwise is a trivial solution.
Versions of SIS
Inhomogeneous SISn,m,q,β
Let matrix and target vector be chosen uniformly at random. An adversary is asked to find a short vector satisfying .
The inhomogeneous version of SIS (ISIS) introduces a target vector , which is chosen uniformly at random. The probability of ending up in the homogeneous case with happens with probability , which allows removing the condition of being non-zero.
ISIS is as hard as SIS. A SIS instance can be reduced to ISIS using the last column of as target vector for ISIS. Any solution to the ISIS instance with challenge matrix and target vector yields a valid SIS solution of slightly larger norm. The reduction from ISIS to SIS requires index guessing a non-zero entry in the SIS solution and embedding the target vector at this position in the challenge matrix .
Normal Form SISn,m,q,β
Let matrix be chosen uniformly at random and define . An adversary is asked to find a short non-zero vector satisfying .
Normal Form SIS (NFSIS) is related to the Hermite normal form of a uniformly random matrix . The normal form version of SIS is often used to reduce public key sizes by size as the static part of the matrix, the identity matrix , can be omitted for data transmission.
A SIS instance can be reduced to a NFSIS instance if the first columns of its challenge matrix are invertible over . Assuming this is the case, denote the first columns of by and define the NFSIS challenge matrix by . Then, any solution of the NFSIS instance is a solution of the SIS instance and vice versa.
Further versions
Hardness of SIS
The initial hardness results of Ajtai[1] in 1996 were later refined by a series of works[3][4][5]. All results follow are instances of the following theorem.
Theorem[6] For any m = poly(n), any β > 0, and any sufficiently large q ≥ β · poly(n), solving SISn,m,q,β with non-negligible probability is at least as hard as solving the decisional approximate shortest vector problem GapSVPγ and the approximate shortest independent vectors problems SIVPγ (among others) on arbitrary n-dimensional lattices (i.e., in the worst case) with overwhelming probability, for some γ = β · poly(n).
Constructions based on SIS
This is a non-exhaustive list of constructions, whose security is or can be based on SIS (or R-SIS and M-SIS).
- One-way function[1]
- Collision-resistant hash function
- Preimage Sampleable Function[4]
- Signatures[2][4][7]
- Commitments[8][9]
- Vector and Functional Commitments[10]
Related Assumptions
- Approximate SIS
- Learning with Errors
Further reading suggestions
- Section 4.1 in A decade of lattice cryptography[6] can help providing further intuition about SIS
- TODO - Discussion about NFSIS
References
- ↑ 1.0 1.1 1.2 Ajtai, Miklós. Generating hard instances of lattice problems. Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996.
- ↑ 2.0 2.1 2.2 Lyubashevsky, Vadim. Lattice signatures without trapdoors. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
- ↑ Micciancio, Daniele, and Oded Regev. Worst-case to average-case reductions based on Gaussian measures. SIAM journal on computing 37.1 (2007): 267-302.
- ↑ 4.0 4.1 4.2 Gentry, Craig, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the fortieth annual ACM symposium on Theory of computing. 2008.
- ↑ Micciancio, Daniele, and Chris Peikert. Hardness of SIS and LWE with small parameters. Annual cryptology conference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
- ↑ 6.0 6.1 Peikert, Chris. A decade of lattice cryptography. Foundations and trends® in theoretical computer science 10.4 (2016): 283-424.
- ↑ Boyen, Xavier. Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. International workshop on public key cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
- ↑ Baum, Carsten, et al. More efficient commitments from structured lattice assumptions. International conference on security and cryptography for networks. Cham: Springer International Publishing, 2018.
- ↑ Lyubashevsky, Vadim, Ngoc Khanh Nguyen, and Maxime Plançon. Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general. Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022.
- ↑ Peikert, Chris, Zachary Pepin, and Chad Sharp. Vector and functional commitments from lattices. Theory of Cryptography Conference. Cham: Springer International Publishing, 2021.