Projects per year
Abstract
The Learning with Errors (LWE) problem asks to distinguish noisy samples s^T A + e^T mod q from uniformly random values given the random matrix A. In this work, we show that a variant called Leaky LWE, where the distinguisher receives additionally noisy leakages (s^T, e^T) L + f^T of the LWE secret s and error e for low-norm matrix L chosen adaptively by the distinguisher after seeing A, is not easier than the standard LWE of the same dimensions up to polynomial losses in the noise level and the modulus. More generally, we show that the Leaky LWE problem is hard even if the public matrix A is structured and/or hinted and if the non-leaky parts of the secret and error do not follow Gaussian distributions, as long as the corresponding LWE problem without leakage is hard.
Our reduction from LWE to Leaky LWE unifies and extends prior results on the Error-Leakage LWE problem [Döttling-Kolonelos-Lai-Lin-Malavolta-Rahimi, EUROCRYPT'23], where L only acts on the error e and the Hint-MLWE problem [Kim-Lee-Seo-Song, CRYPTO'23], where L is restricted to concatenations of random Gaussian scalar matrices not controlled by the distinguisher. Previously, the Hint-MLWE and Error-Leakage LWE assumptions were used as computational replacements of the statistical noise flooding technique in security proofs which led to improved parameters in lattice-based cryptographic constructions such as zero-knowledge proofs, threshold signatures and registration-based encryption. We provide lemmas which abstract out such computational arguments based on Leaky LWE.
Our reduction from LWE to Leaky LWE unifies and extends prior results on the Error-Leakage LWE problem [Döttling-Kolonelos-Lai-Lin-Malavolta-Rahimi, EUROCRYPT'23], where L only acts on the error e and the Hint-MLWE problem [Kim-Lee-Seo-Song, CRYPTO'23], where L is restricted to concatenations of random Gaussian scalar matrices not controlled by the distinguisher. Previously, the Hint-MLWE and Error-Leakage LWE assumptions were used as computational replacements of the statistical noise flooding technique in security proofs which led to improved parameters in lattice-based cryptographic constructions such as zero-knowledge proofs, threshold signatures and registration-based encryption. We provide lemmas which abstract out such computational arguments based on Leaky LWE.
| Original language | English |
|---|---|
| Pages (from-to) | 1-23 |
| Number of pages | 23 |
| Journal | IACR Communications in Cryptology |
| DOIs | |
| Publication status | Published - 6 Oct 2025 |
| MoE publication type | A1 Journal article-refereed |
Funding
The research of Russell W. F. Lai and Monisha Swarnakar are supported by the Research Council of Finland grant 358951. The research of Ivy K. Y. Woo is supported by the Research Council of Finland grant 358950.
Fingerprint
Dive into the research topics of 'Leaky LWE : Learning with Errors with Semi-Adaptive Secret- and Error-Leakage'. Together they form a unique fingerprint.Projects
- 1 Active
-
Brzuska ICT: Limits of Lattice-based Cryptography: A New Era of Hinted and Structured Assumptions
Brzuska, C. (Principal investigator), Woo, I. K. Y. (Project Member), Puniamurthy, K. (Project Member), Karanko, P. (Project Member), Haapaniemi, A. (Project Member) & Rajabi, A. (Project Member)
01/01/2024 → 31/12/2026
Project: RCF Academy Project targeted call