Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs

被引:0
|
作者
Debris-Alazard, Thomas [1 ,2 ]
Fallahpour, Pouria [3 ,4 ]
Stehle, Damien [3 ,4 ,5 ]
机构
[1] INRIA, Palaiseau, France
[2] Ecole Polytech, Lab LIX, Palaiseau, France
[3] ENS Lyon, Lyon, France
[4] U Lyon, UCBL, ENS Lyon, LIP,CNRS,Inria, Lyon, France
[5] Cryptolab Inc, Lyon, France
关键词
learning with errors; oblivious sampling; quantum algorithms; succint non-interactive arguments of knowledge;
D O I
10.1145/3618260.3649766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Learning With Errors (LWE) problem asks to find s from an input of the form (A, b = As+e) epsilon (Z/qZ)(m x n) x (Z/qZ)(m), for a vector e that has small-magnitude entries. In this work, we do not focus on solving LWE but on the task of sampling instances. As these are extremely sparse in their range, it may seem plausible that the only way to proceed is to first create s and e and then set b = As+e. In particular, such an instance sampler knows the solution. This raises the question whether it is possible to obliviously sample (A, As+e), namely, without knowing the underlying s. A variant of the assumption that oblivious LWE sampling is hard has been used in a series of works to analyze the security of candidate constructions of Succinct Non-interactive Arguments of Knowledge (SNARKs). As the assumption is related to LWE, these SNARKs have been conjectured to be secure in the presence of quantum adversaries. Our main result is a quantum polynomial-time algorithm that samples well-distributed LWE instances while provably not knowing the solution, under the assumption that LWE is hard. Moreover, the approach works for a vast range of LWE parametrizations, including those used in the above-mentioned SNARKs. This invalidates the assumptions used in their security analyses, although it does not yield attacks against the constructions themselves.
引用
收藏
页码:423 / 434
页数:12
相关论文
共 50 条
  • [31] Lattice-based autonomous path proxy re-encryption in the standard model
    Wenli XIE
    Jian WENG
    Yao TONG
    Xiaojian LIANG
    Lisha YAO
    Feixiang ZHAO
    Science China(Information Sciences), 2023, 66 (10) : 184 - 195
  • [32] Error-Free Lattice-Based Key Encapsulation Mechanism Based on Ring-LWE
    Tan, Chik How
    Prabowo, Theo Fanuela
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 163 - 179
  • [33] A fully secure lattice-based signcryption with designated equality test in standard model
    Xiao, Kaifeng
    Chen, Xinjian
    Li, Hongbo
    Huang, Jianye
    Susilo, Willy
    Huang, Qiong
    INFORMATION SCIENCES, 2024, 658
  • [34] Improved lattice-based CCA2-secure PKE in the standard model
    Jiang ZHANG
    Yu YU
    Shuqin FAN
    Zhenfeng ZHANG
    ScienceChina(InformationSciences), 2020, 63 (08) : 147 - 168
  • [35] Lattice-based autonomous path proxy re-encryption in the standard model
    Xie, Wenli
    Weng, Jian
    Tong, Yao
    Liang, Xiaojian
    Yao, Lisha
    Zhao, Feixiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (10)
  • [36] Lattice-based Encryption Over Standard Lattices in Hardware
    Howe, J.
    Moore, C.
    O'Neill, M.
    Regazzoni, F.
    Gueneysu, T.
    Beeden, K.
    2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [37] Resilience of lattice-based Cryptosystems to Quantum Attacks
    Koeppl, Tobias
    Zander, Rene
    Tcholtchev, Nikolay
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,
  • [38] A Lattice-based Model for Recommender Systems
    Narayanaswamy, Shriram
    Bhatnagar, Raj
    20TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, VOL 2, PROCEEDINGS, 2008, : 349 - 356
  • [39] Standard lattice-based key encapsulation on embedded devices
    Howe J.
    Oder T.
    Krausz M.
    Güneysu T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, 2018 (03): : 372 - 393
  • [40] A lattice-based model of rotavirus epidemics
    Lara-Sagahón, A
    Govezensky, T
    Méndez-Sánchez, RA
    José, MV
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2006, 359 : 525 - 537