k-SIS: Difference between revisions
First draft |
m Update reference link |
||
Line 13: | Line 13: | ||
== Hardness of k-SIS == | == Hardness of k-SIS == | ||
k-SIS<sub>n,m,q,β,s</sub> (over <math>\mathbb{Z}</math>) is at least as hard as SIS<sub>n,m-k,q,β'</sub>. Boneh and Freeman<ref name=":0" /> proved this result for constant <math>k \in \mathcal{O}(1)</math> and Ling et al.<ref>Ling, S., Phan, D.H., Stehlé, D. and Steinfeld, R. [https:// | k-SIS<sub>n,m,q,β,s</sub> (over <math>\mathbb{Z}</math>) is at least as hard as SIS<sub>n,m-k,q,β'</sub>. Boneh and Freeman<ref name=":0" /> proved this result for constant <math>k \in \mathcal{O}(1)</math> and Ling et al.<ref>Ling, S., Phan, D.H., Stehlé, D. and Steinfeld, R. [https://eprint.iacr.org/2014/494.pdf Hardness of k-LWE and applications in traitor tracing]. ''Algorithmica'' 79.4 (2017): 1318-1352.</ref> improved this result to <math>k \in \mathcal{O}(m)</math>. | ||
The initial proof<ref name=":0" /> relies on the following observation. Let <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m-1}, \mathbf{e} \leftarrow D_{\mathbb{Z}^{m-1}, s}</math>, and <math>e_m</math> a short <math>\mathbb{Z}_q</math>-invertible entry. Define <math>\mathbf{A}' = \begin{bmatrix} \mathbf{A} &-\mathbf{A} \cdot \mathbf{e} \cdot e_m^{-1} \end{bmatrix}</math> and <math>\mathbf{e}' = \begin{bmatrix} \mathbf{e} \\ e_m \end{bmatrix}</math>. Then, <math>\mathbf{A}' \cdot \mathbf{e}' = \mathbf{A} \cdot \mathbf{e} -\mathbf{A} \cdot \mathbf{e} \cdot e_m^{-1} \cdot e_m = \mathbf{0}.</math> In this way, the proof embeds a hint for each added column to the challenge matrix. Embedding multiple hints and recovering a SIS solution requires several technical details, which we omit here. | The initial proof<ref name=":0" /> relies on the following observation. Let <math>\mathbf{A} \in \mathbb{Z}_q^{n \times m-1}, \mathbf{e} \leftarrow D_{\mathbb{Z}^{m-1}, s}</math>, and <math>e_m</math> a short <math>\mathbb{Z}_q</math>-invertible entry. Define <math>\mathbf{A}' = \begin{bmatrix} \mathbf{A} &-\mathbf{A} \cdot \mathbf{e} \cdot e_m^{-1} \end{bmatrix}</math> and <math>\mathbf{e}' = \begin{bmatrix} \mathbf{e} \\ e_m \end{bmatrix}</math>. Then, <math>\mathbf{A}' \cdot \mathbf{e}' = \mathbf{A} \cdot \mathbf{e} -\mathbf{A} \cdot \mathbf{e} \cdot e_m^{-1} \cdot e_m = \mathbf{0}.</math> In this way, the proof embeds a hint for each added column to the challenge matrix. Embedding multiple hints and recovering a SIS solution requires several technical details, which we omit here. |
Revision as of 10:18, 26 July 2025
The k-SIS assumption was introduced in 2011 by Boneh and Freeman[1]. The assumption hands out hints additionally to the SIS challenge matrix restricting the solution space by any linear combination of these hints.
Formal Definition
k-SISn,m,d,q,β,s
Let matrix be chosen uniformly at random and hint vectors from with . Given and , an adversary is asked to find a new short non-zero vector satisfying
The provided definition is the module-variant, which was defined by Albrecht et al.[2] The original version can be recovered by setting and .
Intuitively, k-SIS asks for a SIS solution that is not a linear combination of the provided hints.
The condition can be dropped when as then the probability that there is an additional short vector in the -dimensional sublattice spanned by is negligible.[1]
Hardness of k-SIS
k-SISn,m,q,β,s (over ) is at least as hard as SISn,m-k,q,β'. Boneh and Freeman[1] proved this result for constant and Ling et al.[3] improved this result to .
The initial proof[1] relies on the following observation. Let , and a short -invertible entry. Define and . Then, In this way, the proof embeds a hint for each added column to the challenge matrix. Embedding multiple hints and recovering a SIS solution requires several technical details, which we omit here.
No proof was provided for the module variant.
Constructions based on k-SIS
Related Assumptions
- k-LWE
References
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 Boneh, Dan, and David Mandell Freeman. Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
- ↑ Albrecht, M.R., Cini, V., Lai, R.W., Malavolta, G. and Thyagarajan, S.A. Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable. Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022.
- ↑ Ling, S., Phan, D.H., Stehlé, D. and Steinfeld, R. Hardness of k-LWE and applications in traitor tracing. Algorithmica 79.4 (2017): 1318-1352.