LWE-based Identification Schemes
Some hard problems from lattices, like LWE (Learning with Errors), are particularly suitable for application in Cryptography due to the possibility of using worst-case to average-case reductions as evidence of strong security properties. In this work, we show two LWE-based constructions of zero-knowledge identification schemes and discuss their performance and security. We also highlight the design choices that make our solution of both theoretical and practical interest.
š” Research Summary
The paper presents two novel zeroāknowledge identification (ZKI) protocols whose security is rooted in the hardness of the Learning with Errors (LWE) problem, a cornerstone of latticeābased cryptography. After a brief motivation, the authors recall the definition of LWE, its search and decision variants, and the worstācase to averageācase reductions that link LWE to classic lattice problems such as SVP and SIVP, thereby providing quantumāresistant security guarantees.
The first construction is a threeāround protocol with a soundness error of 2/3. The key generation algorithm samples a random matrix Aāā¤_q^{nĆm}, a secret vector sāā¤_q^m, and an error vector eāā¤_q^n drawn from a prescribed distribution Ļ. The public key consists of (A,āÆb=As+e,āÆp=wt(e)), while the secret key is (s,āÆe). During identification, the prover picks a random mask u, a nonāzero scaling vector γ, and a permutation Ī£ of the coordinates. Three commitments are computed: cā = com(Ī _{γ,Ī£}), cā = com(Ī _{γ,Ī£}(A(u+s))) and cā = com(Ī _{γ,Ī£}(Au+b)). The verifier challenges the prover with a random value chā{1,2,3}. Depending on ch, the prover opens the appropriate pair of commitments together with the necessary auxiliary data (e.g., u+s, Ī _{γ,Ī£}(e)). Completeness follows directly from the knowledge of (s,e). Soundness is proved by a standard āpuzzleāballotā argument: if a cheating prover can answer two different challenges for the same commitment triple with probability exceeding 2/3+ε, then either a collision in the commitment scheme is found or the secret (s,e) can be recovered, contradicting LWE hardness. Zeroāknowledge is established via a simulator that predicts the verifierās challenge, constructs commitments accordingly (sometimes using dummy values), and rewinds the verifier when the predicted challenge does not match. Because the commitment scheme is statistically hiding, the simulated transcript is indistinguishable from a real execution.
The second construction adapts a previously known identification scheme with soundness error 1/2 to the LWE setting and further optimizes it using ringāLWE. The key generation algorithm now also computes a matrix Aā„ satisfying AĀ·Aā„=0 and a vector y=Aā„e. The public key becomes (A,āÆAā„,āÆy,āÆb,āÆp). The prover again selects a random vector u, a scaling vector γ, and a permutation Ī£, and forms two commitments: cā = com(γ·Σ·Aā„Ā·u) and cā = com(Ī _{γ,Ī£}(u)Ā·Ī _{γ,Ī£}(e)). The verifier sends a random scalar α; the prover replies with β = Ī _{γ,Ī£}(u+αe). After receiving a binary challenge chā{1,2}, the prover opens the corresponding commitment (cā or cā) together with the relevant auxiliary data. Completeness, soundness (error (q+1)/(2q)ā1/2), and zeroāknowledge are proved analogously to the first scheme, with the crucial observation that revealing Ī _{γ,Ī£}(e) in one challenge and Ī _{γ,Ī£}(u) in the other allows extraction of e if a cheating prover can answer both challenges for the same commitment pair.
Both protocols benefit from the use of the weightāpreserving transformation Ī _{γ,Ī£}, which enables the verifier to check the Hamming weight of the error vector without learning its content, and from a statistically hiding commitment scheme that provides collision resistance. To improve practical performance, the authors suggest instantiating the schemes over the ring ā¤_q
Comments & Academic Discussion
Loading comments...
Leave a Comment