Short integer solution (SIS) and ring-SIS problems are two average-case problems that are used in lattice-based cryptography constructions. Lattice-based cryptography began in 1996 from a seminal work by Ajtai [1] who presented a family of one-way functions based on SIS problem. He showed that it is secure in average case if
(where
for some constant
) is hard in worse case scenario.
Average case problems are the problems that are hard to be solved for some randomly selected instances. It should be noted that for cryptography applications, worse case complexity is not sufficient, and we need to guarantee cryptographic construction are hard based on average case complexity.
Lattices
A full rank lattice
is a set of integer linear combinations of
linearly independent vectors
, named basis:

where
is a matrix having basis vectors in its columns.
Remark: Given
two bases for lattice
, there exist unimodular matrices
such that
.
Ideal lattice
Definition: Rotational shift operator on
is denoted by
, and is defined as:
Cyclic lattices
Micciancio introduced cyclic lattices in his work in generalizing the compact knapsack problem to arbitrary rings.[2] A cyclic lattice is a lattice that is closed under rotational shift operator. Formally, cyclic lattices are defined as follows:
Definition: A lattice
is cyclic if
.
Examples: [3]
itself is a cyclic lattice.
- Lattices corresponding to any ideal in the quotient polynomial ring
are cyclic:
consider the quotient polynomial ring
, and let
be some polynomial in
, i.e.
where
for
.
Define the embedding coefficient
-module isomorphism
as:
![{\displaystyle {\begin{aligned}\quad \rho :R&\rightarrow \mathbb {Z} ^{n}\\[4pt]p(x)=\sum _{i=0}^{n-1}a_{i}x^{i}&\mapsto (a_{0},\ldots ,a_{n-1})\end{aligned}}}](/media/api/rest_v1/media/math/render/svg/3b19ef05928355e61a925130e56f50ce32cae8b4)
Let
be an ideal. The lattice corresponding to ideal
, denoted by
, is a sublattice of
, and is defined as

Theorem:
is cyclic if and only if
corresponds to some ideal
in the quotient polynomial ring
.
proof:
We have:

Let
be an arbitrary element in
. Then, define
. But since
is an ideal, we have
. Then,
. But,
. Hence,
is cyclic.
Let
be a cyclic lattice. Hence
.
Define the set of polynomials
:
- Since
a lattice and hence an additive subgroup of
,
is an additive subgroup of
.
- Since
is cyclic,
.
Hence,
is an ideal, and consequently,
.
Let
be a monic polynomial of degree
. For cryptographic applications,
is usually selected to be irreducible. The ideal generated by
is:
![{\displaystyle (f(x)):=f(x)\cdot \mathbb {Z} [x]=\{f(x)g(x):\forall g(x)\in \mathbb {Z} [x]\}.}](/media/api/rest_v1/media/math/render/svg/c970d48b2090104e40be59fc404919c712d29107)
The quotient polynomial ring
partitions
into equivalence classes of polynomials of degree at most
:
![{\displaystyle R=\mathbb {Z} [x]/(f(x))=\left\{\sum _{i=0}^{n-1}a_{i}x^{i}:a_{i}\in \mathbb {Z} \right\}}](/media/api/rest_v1/media/math/render/svg/a93ba3d1d81e47803821bcde400820a3f39cef90)
where addition and multiplication are reduced modulo $f(x)$.
Consider the embedding coefficient
-module isomorphism
. Then, each ideal in
defines a sublattice of
called ideal lattice.
Definition:
, the lattice corresponding to an ideal
, is called ideal lattice. More precisely, consider a quotient polynomial ring
, where
is the ideal generated by a degree
polynomial
.
, is a sublattice of
, and is defined as:

Rremark:[6]
- It turns out that
for even small
is typically easy on ideal lattices. The intuition is that the algebraic symmetries results the minimum distance of an ideal to lie within a narrow, easily computable range.
- By exploiting the provided algebraic symmetries in ideal lattices, one can convert a short nonzero vector into
linearly independent ones of (nearly) the same length. Therefore, on ideal lattices,
and
are equivalent with a small loss.[7] Furthermore, even for quantum algorithms,
and
are very hard in the worst case scenario.
Short integer solution problem
SIS and Ring-SIS are two average case problems that are used in lattice-based cryptography constructions. Lattice-based cryptography began in 1996 from a seminal work by Ajtai [1] who presented a family of one-way functions based on SIS problem. He showed that it is secure in average case if
(where
for some constant
) is hard in worse case scenario.
SISn,m,q,β
Let
be an
matrix with entries in
that consists of
uniformly random vectors
:
. Find a nonzero vector
such that:


It should be noted that a solution to SIS without the required constrain on the length of the solution (
) is easy to compute by using Gaussian elimination technique. We also require
, otherwise
is a trivial solution.
In order to guarantee
has non-trivial, short solution, we require:
, and

Theorem: For any
, any
, and any sufficiently large
(for any constant
), solving
with nonnegligible probability is at least as hard as solving the
and
for some
with a high probability in the worst case scenario.
Ring-SIS
Ring-SIS problem, a compact ring-based analogue of SIS problem, was studied in.[2][8]
They consider quotient polynomial ring
with
and
, respectively, and extend the definition of norm on vectors in
to vectors in
as follows:
Given a vector
where
are some polynomial in
. Consider the embedding coefficient
-module isomorphism
:

Let
. Define norm
as:

Alternatively, a better notion for norm is achieved by exploiting the canonical embedding. The canonical embedding is defined as:

where
is the
complex root of
for
.
R-SISm,q,β
Given the quotient polynomial ring
, define
. Select
independent uniformly random elements
. Define vector
. Find a nonzero vector
such that:


Recall that to guarantee existence of a solution to SIS problem, we require
. However, Ring-SIS problem prove us with more compactness and efficacy: to guarantee existence of a solution to Ring-SIS problem, we require
.
Definition: The \emph{nega-circulant matrix} of
is defined as:
![{\displaystyle {\text{for}}\quad b=\sum _{i=0}^{n-1}b_{i}x^{i}\in R,\quad \mathrm {Rot} (b):={\begin{bmatrix}b_{0}&-b_{n-1}&\ldots &-b_{1}\\[0.3em]b_{1}&b_{0}&\ldots &-b_{2}\\[0.3em]\vdots &\vdots &\ddots &\vdots \\[0.3em]b_{n-1}&b_{n-2}&\ldots &b_{0}\end{bmatrix}}}](/media/api/rest_v1/media/math/render/svg/832880cadc5f57350f3bfc486f072e8f998065e2)
When the quotient polynomial ring is
for
, the ring multiplication
can be efficiently computed by first forming
, the nega-circulant matrix of
, and then multiplying
with
, the embedding coefficient vector of
(or, alternatively with
, the canonical coefficient vector).
Moreover, R-SIS problem is a special case of SIS problem where the matrix
in the SIS problem is restricted to negacirculant blocks:
.[9]
See also
References
- ^ a b Ajtai, Miklós. [Generating hard instances of lattice problems.] Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. ACM, 1996.
- ^ a b Micciancio, Daniele. [Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions.] Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on. IEEE, 2002.
- ^ Fukshansky, Lenny, and Xun Sun. [On the geometry of cyclic lattices.] Discrete & Computational Geometry 52.2 (2014): 240-259.
- ^ Craig Gentry. Fully Homomorphic Encryption Using Ideal Lattices. In the 41st ACM Symposium on Theory of Computing (STOC), 2009.
- ^ http://web.cse.ohio-state.edu/~lai/5359-aut13/05.Gentry-FHE-concrete-scheme.pdf
- ^ Peikert, Chris. [A decade of lattice cryptography.] Cryptology ePrint Archive, Report 2015/939, 2015.
- ^ Peikert, Chris, and Alon Rosen. [Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices.] Theory of Cryptography. Springer Berlin Heidelberg, 2006. 145-166.
- ^ Lyubashevsky, Vadim, et al. [SWIFFT: A modest proposal for FFT hashing.] Fast Software Encryption. Springer Berlin Heidelberg, 2008.
- ^ Langlois, Adeline, and Damien Stehlé. [Worst-case to average-case reductions for module lattices.] Designs, Codes and Cryptography 75.3 (2015): 565-599.