{"date_updated":"2025-12-29T11:51:13Z","doi":"10.1007/978-3-032-12293-3_9","abstract":[{"text":"We develop new attacks against the Evasive LWE family of assumptions, in both the public and private-coin regime. To the best of our knowledge, ours are the first attacks against Evasive LWE in the public-coin regime, for any instantiation from the family. Our attacks are summarized below.\r\n\r\nPublic-Coin Attacks.\r\n1.The recent work by Hseih, Lin and Luo [17] constructed the first Attribute Based Encryption (ABE) for unbounded depth circuits by relying on the “circular” evasive LWE assumption. This assumption has been popularly considered as a safe, public-coin instance of Evasive LWE in contrast to its “private-coin” cousins (for instance, see [10, 11]).\r\nWe provide the first attack against this assumption, challenging the widely held belief that this is a public-coin assumption.\r\n2. We demonstrate a counter-example against vanilla public-coin evasive LWE by Wee [26] in an unnatural parameter regime. Our attack crucially relies on the error in the pre-condition being larger than the error in the post-condition, necessitating a refinement of the assumption.\r\n\r\nPrivate-Coin Attacks.\r\n1. The recent work by Agrawal, Kumari and Yamada [2] constructed the first functional encryption scheme for pseudorandom functionalities (PRFE) and extended this to obfuscation for pseudorandom functionalities (PRIO) [4] by relying on private-coin evasive LWE. We provide a new attack against the assumption stated in the first posting of their work (subsequently refined to avoid these attacks).\r\n2. The recent work by Branco et al. [8] (concurrently to [4]) provides a construction of obfuscation for pseudorandom functionalities by relying on private-coin evasive LWE. We provide a new attack against their stated assumption.\r\n3. Branco et al. [8] showed that there exist contrived, “self-referential” classes of pseudorandom functionalities for which pseudorandom obfuscation cannot exist. We extend their techniques to develop an analogous result for pseudorandom functional encryption.\r\n\r\nWhile Evasive LWE was developed to specifically avoid “zeroizing attacks”, our work shows that in certain settings, such attacks can still apply.","lang":"eng"}],"scopus_import":"1","year":"2025","intvolume":" 16269","quality_controlled":"1","conference":{"location":"Aarhus, Denmark","start_date":"2025-12-01","name":"TCC: Theory of Cryptography","end_date":"2025-12-05"},"publication_status":"published","acknowledgement":"We thank Rachel Lin for expressing concern about the applicability of “HJL-style” attacks [15] on the construction in [2] during a talk by the first author about [2]. This was the starting point of the investigation that led us to develop the attack in [5, Sec 4.1]. The first author also thanks Hoeteck Wee for sharing his rationale for introducing evasive LWE.\r\nThe first author is supported by the CyStar center of excellence, the VHAR faculty chair, and the C3iHub fellowship. The third author thanks Cystar, IIT Madras, for supporting a visit to IIT Madras during which the collaboration was initiated. The 4th author is partly supported by JST CREST Grant Number JPMJCR22M1.","month":"12","oa":1,"citation":{"ista":"Agrawal S, Modi A, Yadav A, Yamada S. 2025. Zeroizing attacks against evasive and circular evasive LWE. 23rd International Conference on Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 16269, 259–290.","apa":"Agrawal, S., Modi, A., Yadav, A., & Yamada, S. (2025). Zeroizing attacks against evasive and circular evasive LWE. In 23rd International Conference on Theory of Cryptography (Vol. 16269, pp. 259–290). Aarhus, Denmark: Springer Nature. https://doi.org/10.1007/978-3-032-12293-3_9","short":"S. Agrawal, A. Modi, A. Yadav, S. Yamada, in:, 23rd International Conference on Theory of Cryptography, Springer Nature, 2025, pp. 259–290.","mla":"Agrawal, Shweta, et al. “Zeroizing Attacks against Evasive and Circular Evasive LWE.” 23rd International Conference on Theory of Cryptography, vol. 16269, Springer Nature, 2025, pp. 259–90, doi:10.1007/978-3-032-12293-3_9.","ama":"Agrawal S, Modi A, Yadav A, Yamada S. Zeroizing attacks against evasive and circular evasive LWE. In: 23rd International Conference on Theory of Cryptography. Vol 16269. Springer Nature; 2025:259-290. doi:10.1007/978-3-032-12293-3_9","ieee":"S. Agrawal, A. Modi, A. Yadav, and S. Yamada, “Zeroizing attacks against evasive and circular evasive LWE,” in 23rd International Conference on Theory of Cryptography, Aarhus, Denmark, 2025, vol. 16269, pp. 259–290.","chicago":"Agrawal, Shweta, Anuja Modi, Anshu Yadav, and Shota Yamada. “Zeroizing Attacks against Evasive and Circular Evasive LWE.” In 23rd International Conference on Theory of Cryptography, 16269:259–90. Springer Nature, 2025. https://doi.org/10.1007/978-3-032-12293-3_9."},"date_published":"2025-12-05T00:00:00Z","volume":16269,"language":[{"iso":"eng"}],"OA_place":"repository","department":[{"_id":"KrPi"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication_identifier":{"isbn":["9783032122926"],"eissn":["1611-3349"],"issn":["0302-9743"]},"alternative_title":["LNCS"],"oa_version":"Preprint","type":"conference","page":"259-290","status":"public","article_processing_charge":"No","publication":"23rd International Conference on Theory of Cryptography","OA_type":"green","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2025/375"}],"title":"Zeroizing attacks against evasive and circular evasive LWE","date_created":"2025-12-21T23:01:33Z","publisher":"Springer Nature","day":"05","author":[{"first_name":"Shweta","last_name":"Agrawal","full_name":"Agrawal, Shweta"},{"first_name":"Anuja","last_name":"Modi","full_name":"Modi, Anuja"},{"first_name":"Anshu","last_name":"Yadav","id":"dc8f1524-403e-11ee-bf07-9649ad996e21","full_name":"Yadav, Anshu"},{"last_name":"Yamada","first_name":"Shota","full_name":"Yamada, Shota"}],"_id":"20845"}