{"conference":{"name":"ASIACRYPT: Conference on the Theory and Application of Cryptology and Information Security","end_date":"2024-12-13","start_date":"2024-12-09","location":"Kolkata, India"},"type":"conference","main_file_link":[{"url":"https://eprint.iacr.org/2024/2000","open_access":"1"}],"month":"12","oa_version":"Preprint","status":"public","title":"Evasive LWE assumptions: Definitions, classes, and counterexamples","_id":"18756","publication_status":"published","day":"13","date_updated":"2025-01-08T10:12:16Z","doi":"10.1007/978-981-96-0894-2_14","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"No","publisher":"Springer Nature","year":"2025","scopus_import":"1","department":[{"_id":"KrPi"}],"quality_controlled":"1","abstract":[{"text":"The evasive LWE assumption, proposed by Wee [Eurocrypt’22 Wee] for constructing a lattice-based optimal broadcast encryption, has shown to be a powerful assumption, adopted by subsequent works to construct advanced primitives ranging from ABE variants to obfuscation for null circuits. However, a closer look reveals significant differences among the precise assumption statements involved in different works, leading to the fundamental question of how these assumptions compare to each other. In this work, we initiate a more systematic study on evasive LWE assumptions:\r\n(i) Based on the standard LWE assumption, we construct simple counterexamples against three private-coin evasive LWE variants, used in [Crypto’22 Tsabary, Asiacrypt’22 VWW, Crypto’23 ARYY] respectively, showing that these assumptions are unlikely to hold.\r\n\r\n(ii) Based on existing evasive LWE variants and our counterexamples, we propose and define three classes of plausible evasive LWE assumptions, suitably capturing all existing variants for which we are not aware of non-obfuscation-based counterexamples.\r\n\r\n(iii) We show that under our assumption formulations, the security proofs of [Asiacrypt’22 VWW] and [Crypto’23 ARYY] can be recovered, and we reason why the security proof of [Crypto’22 Tsabary] is also plausibly repairable using an appropriate evasive LWE assumption.","lang":"eng"}],"author":[{"last_name":"Brzuska","full_name":"Brzuska, Chris","first_name":"Chris"},{"orcid":"0000-0002-8929-0221","full_name":"Ünal, Akin","first_name":"Akin","last_name":"Ünal","id":"f6b56fb6-dc63-11ee-9dbf-f6780863a85a"},{"full_name":"Woo, Ivy K.Y.","first_name":"Ivy K.Y.","last_name":"Woo"}],"OA_place":"repository","acknowledgement":"The authors thank the anonymous reviewers for insightful comments which very much improved this work, in particular, sharing with us the counterexamples against a prior version of Hiding Evasive LWE, and against public-coin Evasive LWE when the sampler inputs B. Chris Brzuska and Ivy K. Y. Woo are supported by Research Council of Finland grant 358950. We thank Russell W. F. Lai and Hoeteck Wee for helpful discussions.","language":[{"iso":"eng"}],"OA_type":"green","publication":"30th International Conference on the Theory and Application of Cryptology and Information Security","intvolume":" 15487","citation":{"short":"C. Brzuska, A. Ünal, I.K.Y. Woo, in:, 30th International Conference on the Theory and Application of Cryptology and Information Security, Springer Nature, 2025, pp. 418–449.","mla":"Brzuska, Chris, et al. “Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.” 30th International Conference on the Theory and Application of Cryptology and Information Security, vol. 15487, Springer Nature, 2025, pp. 418–49, doi:10.1007/978-981-96-0894-2_14.","apa":"Brzuska, C., Ünal, A., & Woo, I. K. Y. (2025). Evasive LWE assumptions: Definitions, classes, and counterexamples. In 30th International Conference on the Theory and Application of Cryptology and Information Security (Vol. 15487, pp. 418–449). Kolkata, India: Springer Nature. https://doi.org/10.1007/978-981-96-0894-2_14","ama":"Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2025:418-449. doi:10.1007/978-981-96-0894-2_14","chicago":"Brzuska, Chris, Akin Ünal, and Ivy K.Y. Woo. “Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.” In 30th International Conference on the Theory and Application of Cryptology and Information Security, 15487:418–49. Springer Nature, 2025. https://doi.org/10.1007/978-981-96-0894-2_14.","ista":"Brzuska C, Ünal A, Woo IKY. 2025. Evasive LWE assumptions: Definitions, classes, and counterexamples. 30th International Conference on the Theory and Application of Cryptology and Information Security. ASIACRYPT: Conference on the Theory and Application of Cryptology and Information Security, LNCS, vol. 15487, 418–449.","ieee":"C. Brzuska, A. Ünal, and I. K. Y. Woo, “Evasive LWE assumptions: Definitions, classes, and counterexamples,” in 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, 2025, vol. 15487, pp. 418–449."},"date_published":"2025-12-13T00:00:00Z","oa":1,"page":"418-449","alternative_title":["LNCS"],"date_created":"2025-01-05T23:01:56Z","publication_identifier":{"eissn":["1611-3349"],"issn":["0302-9743"],"isbn":["9789819608935"]},"volume":15487}