Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs

被引:0
|
作者
Debris-Alazard, Thomas [1 ,2 ]
Fallahpour, Pouria [3 ,4 ]
Stehle, Damien [3 ,4 ,5 ]
机构
[1] INRIA, Palaiseau, France
[2] Ecole Polytech, Lab LIX, Palaiseau, France
[3] ENS Lyon, Lyon, France
[4] U Lyon, UCBL, ENS Lyon, LIP,CNRS,Inria, Lyon, France
[5] Cryptolab Inc, Lyon, France
关键词
learning with errors; oblivious sampling; quantum algorithms; succint non-interactive arguments of knowledge;
D O I
10.1145/3618260.3649766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Learning With Errors (LWE) problem asks to find s from an input of the form (A, b = As+e) epsilon (Z/qZ)(m x n) x (Z/qZ)(m), for a vector e that has small-magnitude entries. In this work, we do not focus on solving LWE but on the task of sampling instances. As these are extremely sparse in their range, it may seem plausible that the only way to proceed is to first create s and e and then set b = As+e. In particular, such an instance sampler knows the solution. This raises the question whether it is possible to obliviously sample (A, As+e), namely, without knowing the underlying s. A variant of the assumption that oblivious LWE sampling is hard has been used in a series of works to analyze the security of candidate constructions of Succinct Non-interactive Arguments of Knowledge (SNARKs). As the assumption is related to LWE, these SNARKs have been conjectured to be secure in the presence of quantum adversaries. Our main result is a quantum polynomial-time algorithm that samples well-distributed LWE instances while provably not knowing the solution, under the assumption that LWE is hard. Moreover, the approach works for a vast range of LWE parametrizations, including those used in the above-mentioned SNARKs. This invalidates the assumptions used in their security analyses, although it does not yield attacks against the constructions themselves.
引用
收藏
页码:423 / 434
页数:12
相关论文
共 50 条
  • [41] More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 75 - 83
  • [42] Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding
    Wang, Fenghe
    Shi, Shaoquan
    Wang, Chunxiao
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 84 - 94
  • [43] More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 248 - 259
  • [44] Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS
    Lin, Xi
    Xia, Han
    Li, Yongqiang
    Wang, Mingsheng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 329 - 349
  • [45] Towards Efficient Discrete Gaussian Sampling for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    2015 25TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2015,
  • [46] Quantum-Resistant Lattice-Based Proxy Signature
    Luo, Jiaoyan
    Zuo, Liming
    Liu, Hao
    SYMMETRY-BASEL, 2025, 17 (02):
  • [47] Lattice-based Proxy Signature Scheme with Reject Sampling Method
    Jiang, Zoe L.
    Liang, Yudong
    Liu, Zechao
    Wang, Xuan
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 558 - 563
  • [48] Lattice-Based Quantum Advantage from Rotated Measurements
    Alnawakhtha, Yusuf
    Mantri, Atul
    Miller, Carl A.
    Wang, Daochen
    QUANTUM, 2024, 8
  • [49] Relativistic Path Integral as a Lattice-based Quantum Algorithm
    Jeffrey Yepez
    Quantum Information Processing, 2005, 4 : 471 - 509
  • [50] Relativistic path integral as a lattice-based quantum algorithm
    Yepez, Jeffrey
    QUANTUM INFORMATION PROCESSING, 2005, 4 (06) : 471 - 509