Paper 2025/375
Evasive LWE: Attacks, Variants & Obfustopia
Abstract
Evasive LWE (Wee, Eurocrypt 2022 and Tsabary, Crypto 2022) is a recently introduced, popular lattice assumption which has been used to tackle long-standing problems in lattice based cryptography. In this work, we develop new counter-examples against Evasive LWE, in both the private and public-coin regime, propose counter-measures that define safety zones, and finally explore modifications to construct full compact FE/iO.
Attacks: Our attacks are summarized as follows.
- The recent work by Hseih, Lin and Luo [HLL23] constructed the first ABE for unbounded depth circuits by relying on the (public coin) ''circular'' evasive LWE assumption, which incorporates circularity into the Evasive LWE assumption. We provide a new attack against this assumption by exhibiting a sampler such that the pre-condition is true but post-condition is false.
- We demonstrate a counter-example against public-coin evasive LWE which exploits the freedom to choose the error distributions in the pre and post conditions. Our attack crucially relies on the error in the pre-condition being larger than the error in the post-condition.
- The recent work by Agrawal, Kumari and Yamada [AKY24a] constructed the first functional encryption scheme for pseudorandom functionalities (
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- LatticesEvasive LWEFunctional Encryption
- Contact author(s)
-
shweta @ cse iitm ac in
anujamodi97 @ gmail com
anshu yadav06 @ gmail com
yamada-shota @ aist go jp - History
- 2025-03-04: approved
- 2025-02-27: received
- See all versions
- Short URL
- https://ia.cr/2025/375
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/375, author = {Shweta Agrawal and Anuja Modi and Anshu Yadav and Shota Yamada}, title = {Evasive {LWE}: Attacks, Variants & Obfustopia}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/375}, year = {2025}, url = {https://eprint.iacr.org/2025/375} }