Abstract
Although they have been studied for a long time, distributed signature protocols have garnered renewed interest in recent years in view of novel applications to topics like blockchains. Most recent works have focused on distributed versions of ECDSA or variants of Schnorr signatures; however, and in particular, little attention has been given to constructions based on post-quantum secure assumptions like the hardness of lattice problems. A few lattice-based threshold signature and multi-signature schemes have been proposed in the literature, but they either rely on hash-and-sign lattice signatures (which tend to be comparatively inefficient), use expensive generic transformations, or only come with incomplete security proofs. In this paper, we construct several lattice-based distributed signing protocols with low round complexity following the Fiat–Shamir with Aborts (FSwA) paradigm of Lyubashevsky (Asiacrypt 2009). Our protocols can be seen as distributed variants of the fast Dilithium-G signature scheme and the full security proof can be made assuming the hardness of module SIS and LWE problems. A key step to achieving security (unexplained in some earlier papers) is to prevent the leakage that can occur when parties abort after their first message—which can inevitably happen in the Fiat–Shamir with Aborts setting. We manage to do so using homomorphic commitments. Exploiting the similarities between FSwA and Schnorr-style signatures, our approach makes the most of observations from recent advancements in the discrete log setting, such as Drijvers et al.’s seminal work on two-round multi-signatures (S&P 2019). In particular, we observe that the use of commitment not only resolves the subtle issue with aborts, but also makes it possible to realize secure two-round n-out-of-n distributed signing and multi-signature in the plain public key model, by equipping the commitment with a trapdoor feature. The construction of suitable trapdoor commitment from lattices is a side contribution of this paper.

















Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Notes
It is still an open question whether the aborts issue can instead be resolved by careful parameter choice, allowing to simulate the rejected transcripts without any additional assumptions. But we are aware of on-going work in this direction. If the question is answered in the affirmative our three-round protocol could be proven secure even without a commitment. However, the use of homomorphic commitment is crucial for constructing our new two-round protocols, which is our main contribution.
We include this for completeness since, while the three-round protocol itself is not novel, to the best of our knowledge there has been no publicly available complete security proof solely relying on Module-LWE.
We remark that the “commitments” generated by \({\mathsf {H}}_1\) and \({\mathsf {H}}_2\) in Fig. 6 are not randomized, and therefore they are not hiding. In our protocol, however, all committed values have high min-entropy and this is indeed sufficient for the security proof to hold. Alternatively, one could cheaply turn them into full-fledged secure and extractable commitments by additionally hashing random strings that are to be sent out during the opening phase [80].
To be more precise, since the verification bound scales as \(n^{3/2}\), one should also increase q by the same bound to avoid arithmetic overflow. This makes the \(\mathsf {MSIS}_{}\) problem harder, but the \(\mathsf {MLWE}_{}\) easier if the dimension is kept unchanged. To keep the same security level, one should therefore also increase N by a factor of \(1+O(\frac{\log n}{\log q_0})\) where \(q_0\) is the value of q in the single-user setting. Therefore, one could in principle argue that signature size actually scales as \(O(\log ^2 n)\). However, one typically chooses \(q_0 > 2^{20}\), and therefore even in settings with billions of parties, \(\frac{\log n}{\log q_0} < 2\). Thus, one can effectively regard N as independent of n.
This condition could be actually relaxed somewhat by applying the result due to Nguyen [76]
References
H.K. Alper, J. Burdges, Two-round trip schnorr multi-signatures via delinearized witnesses. in CRYPTO 2021, Part I, vol. 12825 of LNCS, Virtual Event, (Springer, Heidelberg, 2021), pp. 157–188
M. Abe, S. Fehr, Adaptively secure feldman VSS and applications to universally-composable threshold cryptography. in CRYPTO 2004, vol. 3152 of LNCS, (Springer, Heidelberg, 2004), pp. 317–334
M. Abdalla, P.-A. Fouque, V. Lyubashevsky, M. Tibouchi, Tightly secure signatures from lossy identification schemes. Journal of Cryptology, 29(3), 597–631, (2016)
N. Bindel, S. Akleylek, E. Alkim, P.S.L.M. Barreto, J. Buchmann, E. Eaton, G. Gutoski, J. Kramer, P. Longa, H. Polat, J. E. Ricardini, G. Zanon, qTESLA. Technical report, National Institute of Standards and Technology, 2019. available at https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
G. Barthe, S. Belaïd, T. Espitau, P.-A. Fouque, B. Grégoire, M. Rossi, M. Tibouchi, Masking the GLP lattice-based signature scheme at any order. in EUROCRYPT 2018, Part II, vol. 10821 of LNCS, (Springer, Heidelberg, 2018), pp. 354–384
G. Barthe, S. Belaïd, T. Espitau, P.-A. Fouque, M. Rossi, and M. Tibouchi, GALACTICS: Gaussian sampling for lattice-based constant- time implementation of cryptographic signatures, revisited. in ACM CCS 2019, (ACM Press, 2019), pp. 2147–2164
A. Bagherzandi, J.H. Cheon, S. Jarecki, Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. in ACM CCS 2008, (ACM Press, 2008), pp. 449–458
F. Benhamouda, J. Camenisch, S. Krenn, V. Lyubashevsky, G. Neven, Better zero-knowledge proofs for lattice encryption and their application to group signatures. in ASIACRYPT 2014, Part I, vol. 8873 of LNCS, (Springer, Heidelberg, 2014), pp. 551–572
M. Bellare, W. Dai, Chain reductions for multi-signatures and the HBMS scheme. in Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV, vol. 13093 of Lecture Notes in Computer Science, (Springer, 2021), pp. 650–678
M. Bellare, H. Davis, F. Günther. Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability. in EUROCRYPT 2020, Part II, vol. 12106 of LNCS, (Springer, Heidelberg, 2020), pp. 3–32
C. Baum, I. Damgård, V. Lyubashevsky, S. Oechsner, C. Peikert, More efficient commitments from structured lattice assumptions. in SCN 18, vol. 11035 of LNCS, (Springer, Heidelberg, 2018), pp. 368–385
D. Boneh, R. Gennaro, S. Goldfeder, A. Jain, S. Kim, P. M. R. Rasmussen, A. Sahai, Threshold cryptosystems from threshold fully homomorphic encryption. in CRYPTO 2018, Part I, vol. 10991 of LNCS, (Springer, Heidelberg, 2018), pp. 565–596
F. Benhamouda, S. Krenn, V. Lyubashevsky, K. Pietrzak, Efficient zero-knowledge proofs for commitments from learning with errors over rings. In ESORICS 2015, Part I, vol. 9326 of LNCS, (Springer, Heidelberg, 2015), pp. 305–325
R. Bendlin, S. Krehbiel, C. Peikert, How to share a lattice trapdoor: Threshold protocols for signatures and (H)IBE. in ACNS 13, vol. 7954 of LNCS, (Springer, Heidelberg, 2013), pp. 218–236
J. Bootle, V. Lyubashevsky, G. Seiler, Algebraic techniques for short(er) exact lattice-based zero-knowledge proofs. in CRYPTO 2019, Part I, vol. 11692 of LNCS, (Springer, Heidelberg, 2019), pp. 176–202
M. Bellare, G. Neven, Multi-signatures in the plain public-key model and a general forking lemma. in ACM CCS 2006, (ACM Press, 2006), pp. 390–399
K. Boudgoust, A. Roux-Langlois, Compressed linear aggregate signatures based on module lattices. IACR Cryptol. ePrint Arch., p. 263, 2021
S. Bettaieb, J. Schrek, Improved lattice-based threshold ring signature scheme. in Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, (Springer, Heidelberg, 2013), pp. 34–51
G. Castagnos, D. Catalano, F. Laguillaumie, F. Savasta, I. Tucker. Two-party ECDSA from hash proof systems and efficient instantiations. in CRYPTO 2019, Part III, vol. 11694 of LNCS, (Springer, Heidelberg, 2019), pp. 191–221
G. Castagnos, D. Catalano, F. Laguillaumie, F. Savasta, I. Tucker. Bandwidth-efficient threshold EC-DSA. in PKC 2020, Part II, vol. 12111 of LNCS, (Springer, Heidelberg, 2020), pp. 266–296
R. Canetti, R. Gennaro, S. Goldfeder, N. Makriyannis, U. Peled, UC non-interactive, proactive, threshold ECDSA with identifiable aborts. In ACM CCS 2020, (ACM Press, 2020), pp. 1769–1787
D. Cash, D. Hofheinz, E. Kiltz, C. Peikert, Bonsai trees, or how to delegate a lattice basis. in EUROCRYPT 2010, vol. 6110 of LNCS, (Springer, Heidelberg, 2010), pp. 523–552
R. Choi, K. Kim, Lattice-based multi-signature with linear homomorphism. in 2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016
P. Cayrel, R. Lindner, M. Rückert, R. Silva, A lattice-based threshold ring signature scheme. in LATINCRYPT 2010, vol. 6212 of LNCS, (Springer, 2010), pp. 255–272
M. Ciampi, R. Ostrovsky, L. Siniscalchi, I. Visconti, Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds. in TCC 2017, Part I, vol. 10677 of LNCS, (Springer, Heidelberg, 2017), pp. 711–742
M. Ciampi, R. Ostrovsky, L. Siniscalchi, I. Visconti, Four-round concurrent non-malleable commitments from one-way functions. in CRYPTO 2017, Part II, vol. 10402 of LNCS, (Springer, Heidelberg, 2017), pp. 127–157
M. Ciampi, G. Persiano, A. Scafuro, L. Siniscalchi, I. Visconti, Improved OR-composition of sigma-protocols. in TCC 2016-A, Part II, vol. 9563 of LNCS, (Springer, Heidelberg, 2016), pp. 112–141
D. Cozzo, N. P. Smart, Sharing the LUOV: Threshold post-quantum signatures. in 17th IMA International Conference on Cryptography and Coding, vol. 11929 of LNCS, (Springer, Heidelberg, 2019), pp. 128–153
I. Damgård, Efficient concurrent zero-knowledge in the auxiliary string model. in EUROCRYPT 2000, vol. 1807 of LNCS, (Springer, Heidelberg, 2000), pp. 418–430
L. Ducas, A. Durmus, T. Lepoint, V. Lyubashevsky, Lattice signatures and bimodal Gaussians. in CRYPTO 2013, Part I, vol. 8042 of LNCS, (Springer, Heidelberg, 2013), pp. 40–56
M. Drijvers, K. Edalatnejad, B. Ford, E. Kiltz, J. Loss, G. Neven, I. Stepanovs. On the security of two-round multi-signatures. in 2019 IEEE Symposium on Security and Privacy, (IEEE Computer Society Press, 2019), pp. 1084–1101
Y. Doröz, J. Hoffstein, J.H. Silverman, B. Sunar, Mmsat: A scheme for multimessage multiuser signature aggregation. Cryptology ePrint Archive, Report 2020/520, 2020. https://eprint.iacr.org/2020/520
I. Damgård, T.P. Jakobsen, J.B. Nielsen, J.I. Pagter, M.B. Østergaard, Fast threshold ECDSA with honest majority. In SCN 20, vol. 12238 of LNCS, (Springer, Heidelberg, 2020), pp. 382–400
J. Doerner, Y. Kondi, E. Lee, a. shelat. Secure two-party threshold ECDSA from ECDSA assumptions. in 2018 IEEE Symposium on Security and Privacy, (IEEE Computer Society Press, 2018), pp. 980–997
J. Doerner, Y. Kondi, E. Lee, a. shelat, Threshold ECDSA from ECDSA assumptions: The multiparty case. in 2019 IEEE Symposium on Security and Privacy, (IEEE Computer Society Press, 2019), pp. 1051–1066
L. Ducas, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, D. Stehlé. Crystals–dilithium: Digital signatures from module lattices. 2018, https://repository.ubn.ru.nl/bitstream/handle/2066/191703/191703.pdf
R. del Pino, V. Lyubashevsky, G. Seiler. Lattice-based group signatures and zero-knowledge proofs of automorphism stability. In ACM CCS 2018, (ACM Press, 2018), pp. 574–591
L. Ducas, D. Micciancio, Improved short lattice signatures in the standard model. in CRYPTO 2014, Part I, vol. 8616 of LNCS, (Springer, Heidelberg, 2014), pp. 335–352
A.P.K. Dalskov, C. Orlandi, M. Keller, K. Shrishak, H. Shulman, Securing DNSSEC keys via threshold ECDSA from generic MPC. in ESORICS 2020, Part II, vol. 12309 of LNCS, (Springer, Heidelberg, 2020), pp. 654–673
M.F. Esgin, O. Ersoy, Z. Erkin, Post-quantum adaptor signatures and payment channel networks. in ESORICS 2020, Part II, vol. 12309 of LNCS, (Springer, Heidelberg, 2020), pp. 378–397
R. El Bansarkhani, J. Sturm, An efficient lattice-based multisignature scheme with applications to bitcoins. in CANS 16, vol. 10052 of LNCS, (Springer, Heidelberg, 2016), pp. 140–155
M.F. Esgin, R. Steinfeld, J.K. Liu, D. Liu, Lattice-based zero-knowledge proofs: New techniques for shorter and faster constructions and applications. in CRYPTO 2019, Part I, vol. 11692 of LNCS, (Springer, Heidelberg, 2019), pp. 115–146
M. F. Esgin, R. Steinfeld, A. Sakzad, J. K. Liu, D. Liu, Short lattice-based one-out-of-many proofs and applications to ring signatures. In ACNS 19, vol. 11464 of LNCS, (Springer, Heidelberg, 2019), pp. 67–88
M. Fukumitsu, S. Hasegawa. A tightly-secure lattice-based multisignature. in APKC@AsiaCCS 2019, (ACM, 2019), pp. 3–11
M. Fukumitsu, S. Hasegawa, A lattice-based provably secure multisignature scheme in quantum random oracle model. in ProvSec 2020, vol. 12505 of LNCS, (Springer, Heidelberg, 2020), pp. 45–64
R. Gennaro, S. Goldfeder, Fast multiparty threshold ECDSA with fast trustless setup. in ACM CCS 2018, (ACM Press, 2018), pp. 1179–1194
R. Gennaro, S. Goldfeder, One round threshold ecdsa with identifiable abort. Cryptology ePrint Archive, Report 2020/540, 2020. https://eprint.iacr.org/2020/540
R. Gennaro, S. Goldfeder, A. Narayanan, Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. in ACNS 16, vol. 9696 of LNCS, (Springer, Heidelberg, 2016), pp. 156–174
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology, 20(1), 51–83, (2007).
A. Gagol, J. Kula, D. Straszak, M. Swietek, Threshold ecdsa for decentralized asset custody. Cryptology ePrint Archive, Report 2020/498, (2020). https://eprint.iacr.org/2020/498
T. Güneysu, V. Lyubashevsky, T. Pöppelmann, Practical lattice-based cryptography: A signature scheme for embedded systems. in CHES 2012, vol. 7428 of LNCS, (Springer, Heidelberg, 2012), pp. 530–547
N. Genise, D. Micciancio, Faster Gaussian sampling for trapdoor lattices with arbitrary modulus. in EUROCRYPT 2018, Part I, vol. 10820 of LNCS, (Springer, Heidelberg, 2018), pp. 174–203
C. Gentry, C. Peikert, V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions. in 40th ACM STOC, (ACM Press, 2008), pp. 197–206
C. Gentry, A. Sahai, B. Waters, Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. in CRYPTO 2013, Part I, vol. 8042 of LNCS, (Springer, Heidelberg, 2013), pp. 75–92
S. Gorbunov, V. Vaikuntanathan, D. Wichs, Leveled fully homomorphic signatures from standard lattices. in 47th ACM STOC, (ACM Press, 2015), pp. 469–477
N. Howgrave-Graham, A. Joux, New generic algorithms for hard knapsacks. in EUROCRYPT 2010, vol. 6110 of LNCS, (Springer, Heidelberg, 2010), pp. 235–256
M. Kansal, R. Dutta, Round optimal secure multisignature schemes from lattice with public key aggregation and signature compression. In AFRICACRYPT 20, vol. 12174 of LNCS, (Springer, Heidelberg, 2020), pp. 281–300
C. Komlo, I. Goldberg, FROST: flexible round-optimized schnorr threshold signatures. in Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers, vol. 12804 of Lecture Notes in Computer Science, (Springer, 2020), pp. 34–65
E. Kiltz, V. Lyubashevsky, C. Schaffner, A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. in EUROCRYPT 2018, Part III, vol. 10822 of LNCS, (Springer, Heidelberg, 2018), pp. 552–586
V. Lyubashevsky, L. Ducas, E. Kiltz, T. Lepoint, P. Schwabe, G. Seiler, D. Stehlé, CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology, 2019. available at https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions.
Y. Lindell, Fast secure two-party ECDSA signing. in CRYPTO 2017, Part II, vol. 10402 of LNCS, (Springer, Heidelberg, 2017), pp. 613–644
Y. Lindell, A. Nof, Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. in ACM CCS 2018, (ACM Press, 2018), pp. 1837–1854
B. Libert, K. Nguyen, B.H.M. Tan, H. Wang, Zero-knowledge elementary databases with more expressive queries. in PKC 2019, Part I, vol. 11442 of LNCS, (Springer, Heidelberg, 2019), pp. 255–285
V. Lyubashevsky, C. Peikert, O. Regev, A toolkit for ring-LWE cryptography. in EUROCRYPT 2013, vol. 7881 of LNCS, (Springer, Heidelberg, 2013), pp. 35–54
V. Lyubashevsky, G. Seiler, Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs. in EUROCRYPT 2018, Part I, vol. 10820 of LNCS, (Springer, Heidelberg, 2018), pp. 204–224
Z.-Y. Liu, Y.-F. Tseng, R. Tso, Cryptanalysis of a round optimal lattice-based multisignature scheme. Cryptology ePrint Archive, Report 2020/1172, 2020. https://eprint.iacr.org/2020/1172
V. Lyubashevsky, Fiat-Shamir with aborts: Applications to lattice and factoring-based signatures. in ASIACRYPT 2009, vol. 5912 of LNCS, (Springer, Heidelberg, 2009), pp. 598–616
V. Lyubashevsky, Lattice signatures without trapdoors. in EUROCRYPT 2012, vol. 7237 of LNCS, (Springer, Heidelberg, 2012), pp. 738–755
V. Lyubashevsky, Lattice-based zero-knowledge and applications. CIS 2019, 2019. https://crypto.sjtu.edu.cn/cis2019/slides/Vadim.pdf
C. Ma, M. Jiang, Practical lattice-based multisignature schemes for blockchains. IEEE Access, 7, 179765–179778, (2019)
S. Micali, K. Ohta, L. Reyzin, Accountable-subgroup multisignatures: Extended abstract. in ACM CCS 2001, (ACM Press, 2001), pp. 245–254
D. Micciancio, C. Peikert, Trapdoors for lattices: Simpler, tighter, faster, smaller. in EUROCRYPT 2012, vol. 7237 of LNCS, (Springer, Heidelberg, 2012), pp. 700–718
D. Micciancio, C. Peikert, Hardness of SIS and LWE with small parameters. in CRYPTO 2013, Part I, vol. 8042 of LNCS, (Springer, Heidelberg, 2013), pp. 21–39
G. Maxwell, A. Poelstra, Y. Seurin, P. Wuille, Simple schnorr multi-signatures with applications to bitcoin. Des. Codes Cryptogr., 87(9), 2139–2164, (2019)
C. Ma, J. Weng, Y. Li, R.H. Deng, Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr., 54(2), 121–133, (2010)
N.K. Nguyen, On the non-existence of short vectors in random module lattices. in ASIACRYPT 2019, Part II, vol. 11922 of LNCS, (Springer, Heidelberg, 2019), pp. 121–150
A. Nicolosi, M.N. Krohn, Y. Dodis, D. Mazières, Proactive two-party signatures for user authentication. in NDSS 2003. (The Internet Society, 2003)
J. Nick, T. Ruffing, Y. Seurin, MuSig2: Simple two-round Schnorr multi-signatures. in CRYPTO 2021, Part I, vol. 12825 of LNCS, (Virtual Event, 2021. Springer, Heidelberg), pp. 189–221
J. Nick, T. Ruffing, Y. Seurin, P. Wuille, MuSig-DN: Schnorr multi-signatures with verifiably deterministic nonces. in ACM CCS 2020, (ACM Press, 2020), pp. 1717–1731
R. Pass, On deniability in the common reference string and random oracle model. in CRYPTO 2003, vol. 2729 of LNCS, (Springer, Heidelberg, 2003), pp. 316–337
T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing. in CRYPTO’91, vol. 576 of LNCS, (Springer, Heidelberg, 1992), pp. 129–140
C. Peikert, An efficient and parallel Gaussian sampler for lattices. in CRYPTO 2010, vol. 6223 of LNCS, (Springer, Heidelberg, 2010), pp. 80–97
D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396, (2000)
C.-P. Schnorr, Efficient identification and signatures for smart cards. in CRYPTO’89, vol. 435 of LNCS, (Springer, Heidelberg, 1990), pp. 239–252
D.R. Stinson, R. Strobl, Provably secure distributed Schnorr signatures and a \((t, n)\) threshold scheme for implicit certificates. in ACISP 01, vol. 2119 of LNCS, (Springer, Heidelberg, 2001), pp. 417–434
E. Syta, I. Tamas, D. Visher, D.I. Wolinsky, P. Jovanovic, L. Gasser, N. Gailly, I. Khoffi, B. Ford, Keeping authorities “honest or bust” with decentralized witness cosigning. in 2016 IEEE Symposium on Security and Privacy, (IEEE Computer Society Press, 2016), pp. 526–545
R. Toluee, T. Eghlidos, An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice. Cryptology ePrint Archive, Report 2019/1031, 2019. https://eprint.iacr.org/2019/1031
R. Tso, Z. Liu, Y. Tseng, Identity-based blind multisignature from lattices. IEEE Access, 7, 182916–182923, (2019)
W.A. Torres, R. Steinfeld, A. Sakzad, V. Kuchta, Post-quantum linkable ring signature enabling distributed authorised ring confidential transactions in blockchain. Cryptology ePrint Archive, Report 2020/1121, 2020. https://eprint.iacr.org/2020/1121
D. Wagner, A generalized birthday problem. in CRYPTO 2002, vol. 2442 of LNCS, (Springer, Heidelberg, 2002), pp. 288–303
R. Yang, M. H. Au, Z. Zhang, Q. Xu, Z. Yu, W. Whyte, Efficient lattice-based zero-knowledge arguments with standard soundness: Construction and applications. in CRYPTO 2019, Part I, vol. 11692 of LNCS, (Springer, Heidelberg, 2019), pp. 147–175
Acknowledgements
We thank Carsten Baum, Cecilia Boschini and Shuichi Katsumata for their insightful comments and discussions. We are grateful for helpful suggestions by anonymous reviewers of PKC 2021 and Journal of Cryptology. This research was supported by: the Concordium Blockchain Research Center, Aarhus University, Denmark; the Carlsberg Foundation under the Semper Ardens Research Project CF18-112 (BCM); the European Research Council (ERC) under the European Unions’s Horizon 2020 research and innovation programme under grant agreement No 803096 (SPEC); the Danish Independent Research Council under Grant-ID DFF-6108-00169 (FoCC).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Damien Stehlé
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
An extended abstract appeared at PKC 2021. This is the full paper.
Appendices
Potential Wagner-like Attack on Naïve Two-round Protocols
Below we sketch a variant of the concurrent attack originally described by Drijvers et al. [31]. The original attack was against two-round discrete log-based multi-signatures including \(\mathsf {CoSi}\) [86] and \(\mathsf {BCJ}\) [7], but due to the very similar structure of FSwA lattice signatures an attack would become feasible against naïve two-round instantiations (albeit with sub-exponential computational costs due to reliance on a K-list sum algorithm). Since such naïve FSwA-based constructions do not exist in the literature, we do not go into details of the efficiency analysis of the concurrent attack. The attack sketched here should be treated as a motivating discussion about why our two-round protocols rely on a message-dependent commitment key in Figs. 6 and 13.
Attack on a naïve construction from Sect. 1.2. For simplicity we consider the attack on two-party signing, but the same strategy also works similarly in a general n-party setting. Let \(\tilde{\mathbf {s}}_1\) and \(\mathbf {s}_2\) be the key shares of adversary and honest party, respectively, and let \(\mathbf {t} = {\bar{\mathbf {A}}} (\tilde{\mathbf {s}}_1+\mathbf {s}_2)\) be the combined public key. The adversary initiates \(K-1\) concurrent signing sessions on the same message \(\mu \). Then for each session \(i\in [K-1]\), the honest party submits \(\mathbf {w}_2^{(i)} = {\bar{\mathbf {A}}} \mathbf {y}_2^{(i)}\). Here the adversary does not immediately send back its own commitment share. Instead, by only interacting with the random oracle \({\mathsf {H}}_0\) the adversary tries to find a message \(\mu ^*\) and \(\tilde{\mathbf {w}}_1^{(1)},\ldots ,\tilde{\mathbf {w}}_1^{(K-1)}\in R_q^{k}\) such that the following holds.
where the adversary defines \(\mathbf {w}^* {:}{=}\mathbf {w}_2^{(1)} + \ldots + \mathbf {w}_2^{(K-1)}\). Because the random oracle outputs consist of \(C=\{c\in \mathbb {Z}^N: \Vert c\Vert _1 = \kappa \wedge \Vert c\Vert _\infty = 1\}\), finding such inputs amounts to solving a variant of Wagner’s generalized birthday problem (GBP) [56, 90] instantiated over \((C, +)\), when K is chosen to be a power of two. (Note that in the discrete log setting GBP is instantiated over a group \((\mathbb {Z}_q, +)\).) Then the adversary resumes the pending sessions by sending back such \(\tilde{\mathbf {w}}_1^{(i)}\) for \(i\in [K-1]\). The honest signer for each session returns its signature share
where \(c^{(i)} = {\mathsf {H}}_0 (\tilde{\mathbf {w}}_1^{(i)} + \mathbf {w}_2^{(i)}, \mu , pk ) \). Finally the adversary outputs
as a forgery on \(\mu ^*\) together with \(\mathbf {w}^*\). Now let us check that \((\mathbf {w}^*, \mathbf {z}^*)\) satisfies the verification condition. Thanks to the collision found by a GBP solver, and by construction of \(\mathbf {w}^*\) and \(\mathbf {z}^*\), it holds that \(\bar{\mathbf {A}}\mathbf {z}^* - c^*\mathbf {t} = \mathbf {w}^*\). Note that the adversary should take extra care of the norm of \(\mathbf {z}^*\) by bounding the number of sessions \(K-1\); the small \(\Vert \mathbf {z}^*\Vert \) is part of the verification condition, while \(\Vert \mathbf {z}^*\Vert \) grows for large K. For this reason there should be some trade-offs for K, since the larger the K is, the lower the complexity of GBP algorithm becomes. This means that, since the norm bound in verification has to be increased according to n (see Sect. 3.2), the attack also becomes efficient in an n-party setting, which allows to choose larger K when \(n-1\) parties are corrupt.
We also remark that the attack can be completed only when the honest party passes the rejection sampling simultaneously in all \(K-1\) concurrent sessions, because otherwise the attacker does not receive all \(\mathbf {z}_2^{(i)}\) values required for forgery. Hence, there is another trade-off here: If the success rate of rejection sampling is set low then the protocol has more round complexity, while it mitigates the concurrent attack, and vice versa.
Attack on a variant of \(\mathsf {DS}_2\) with fixed commitment key. When a single commitment key \( ck \) is reused for all signing attempts in \(\mathsf {DS}_2\) (Fig. 6) then a similar concurrent attack becomes applicable. This time for each session \(i\in [K-1]\), the honest party submits \( com _2^{(i)} = \mathsf {Commit}_ ck (\mathbf {w}_2^{(i)}; r_2^{(i)})\) where \(\mathbf {w}_2^{(i)} = {\bar{\mathbf {A}}} \mathbf {y}_2^{(i)}\). Then the adversary interacts with the random oracle \({\mathsf {H}}_0\) to find a message \(\mu ^*\) and \({\tilde{ com }}_1^{(1)},\ldots ,{\tilde{ com }}_1^{(K-1)}\in S_ com \) such that the following holds (with a GBP solver).
where the adversary defines \( com ^* {:}{=} com _2^{(1)} + \ldots + com _2^{(K-1)}\).
Then the adversary resumes the pending sessions by sending back such \({\tilde{ com }}_1^{(i)}\) for \(i\in [K-1]\). The honest signer for each session returns its signature share together with commitment opening \(r_2^{(i)}\)
where \(c^{(i)} = {\mathsf {H}}_0 ({\tilde{ com }}_1^{(i)} + com _2^{(i)}, \mu , pk ) \). Finally the adversary outputs
as a forgery on \(\mu ^*\) together with \( com ^*\). Thanks to the collision found by a GBP solver and due to the additive homomorphism of commitment, it holds that \(\mathsf {Open}_ ck ( com ^*,r^*,\bar{\mathbf {A}}\mathbf {z}^* - c^*\mathbf {t}) =1\).
If the protocol derives a per-message commitment key via random oracle \({\mathsf {H}}_3:\){0,1}\(^*\rightarrow S_ ck \) as our protocols (as well as \(\mathsf {mBCJ}\)) do, the attack becomes nontrivial; now the tuple \(( com ^*, r^*, {\bar{\mathbf {A}}}\mathbf {z}^* - c^* \mathbf {t})\) has to be verified with respect to the message-dependent key \( ck ^*\leftarrow {\mathsf {H}}_3(\mu ^*, pk )\), which of course should not collide with \( ck \leftarrow {\mathsf {H}}_3(\mu , pk )\) thanks to the random oracle.
\(\mathsf {DS}_3\): Three-round Distributed Signature Protocol from Module-LWE
1.1 Protocol Specification and Overview
As an important stepping stone toward our main two-round constructions, we give a detailed description of provably secure three-round, n-out-of-n distributed signature protocol \(\mathsf {DS}_3=(\mathsf {Setup}, (\mathsf {Gen}_j)_{j\in [n]},(\mathsf {Sign})_{j\in [n]},\mathsf {Ver})\), formally specified in Fig. 16. Key generation and verification are identical to \(\mathsf {DS}_2\) (see Fig. 6). The protocol is built on top of additively homomorphic commitment scheme \(\mathsf {COM}=(\mathsf {CSetup},\mathsf {CGen},\mathsf {Commit},\mathsf {Open})\) with uniform keys (see Sect. 2 for the formal definition), and we describe concrete instances of \(\mathsf {COM}\) in Sect. 5.
The only difference from \(\mathsf {DS}_2\) is that the signing protocol now involves an extra round where participants exchange a hash of \( com _j\), and later check that everyone knows the correct preimage. This is a standard technique used in Bellare and Neven [16] (or its GLP-based variant [41]) The intuition behind this seemingly redundant step is analogous to the rogue key attack; without this step the adversary might be able to adaptively choose a malicious \({\widetilde{ com }}\) after seeing the honest party’s share. However, this extra round can be indeed dropped by instantiating the protocol with a trapdoor commitment scheme (see Sect. 3). We remark that generating a per-message commitment key as in 3 is not necessary for the three-round protocol and one could alternatively use a single fixed \( ck \leftarrow \mathsf {CGen}( cpp )\) generated by the trusted party. However, this step becomes crucial for the two-round protocols to be secure.
1.2 Security
We give a security proof for \(\mathsf {DS}_3\) by instantiating the protocol with an unconditionally binding commitment scheme and by setting the parameters so that the underlying SIS problem becomes vacuously hard. Here we give a sketch of our proof. First, thanks to the computational hiding of \(\mathsf {COM}\), the oracle simulator can replace the commitment share \( com _n\) of honest party \(P_n\) with a commitment to some random vector in \(R_q^k\) in case it wants to abort. For non-abort executions we can essentially invoke the special HVZK simulator of Algorithm 5 to answer the oracle queries from the adversary. Hence, we can indeed simulate the honest execution of \(P_n\).
The core idea for proving the soundness essentially follows the lossy identification technique by Abdalla et al. [3]; since the public key share of the honest signer \(\mathbf {t}_n\) is indistinguishable from the vector sampled from \(R_q^k\) uniformly at random due to the LWE assumption, the oracle simulator can replace \(\mathbf {t}_n\) with such a vector (i.e. a lossy key). Moreover, thanks to the programmability and extractability of random oracle commitments in the key generation phase, the oracle simulator can even sample the resulting combined public key \(\mathbf {t}\) from the uniform distribution in advance and set its share \(\mathbf {t}_n\) a posteriori depending on the other shares. Now, the unconditional binding of \(\mathsf {COM}\) guarantees that there cannot exist commitments having two openings except a negligible fraction on the random choice of \( ck \). (See Definition 4. Also recall that we defined a uniform key in Definition 5, so the keys given by the random oracle are perfectly indistinguishable from the ones from \(\mathsf {CGen}\).) Finally, we argue that on the random choice of joint public key \((\mathbf {A},\mathbf {t})\) there cannot exist two valid transcripts that share the first message of the underlying \(\varSigma \)-protocol (i.e. \(\mathbf {w}\in R_q^k\)) except a negligible fraction. In that case, the only way for an adversary to come up with a forgery is to luckily receive a specific challenge \(c\in C\) from the random oracle \({\mathsf {H}}_0\), which can only happen with probability 1/|C|.
The last step of the security proof essentially follows the one for Dilithium-QROM given by Kiltz, Lyubashevsky and Schaffner [59], and we impose an additional condition on the modulus q so that the polynomials of small norm are invertible in the ring \(R_q\) [65]Footnote 5. We also remark that Fukumitsu and Hasegawa [44] also attempted a tight security reduction for their Dilithium-like three-round multi-signature scheme, although the proof disregards the simulation of rejected transcripts. Since the rest of their proof seems sound, by applying an additively homomorphic commitment as we do one could patch the proof, while losing the reduction tightness due to the use of computational hiding of commitment scheme.
Theorem 4
Suppose the commitment scheme \(\mathsf {COM}\) is unconditionally binding, computationally hiding, uniform, additively homomorphic, and the output of committing algorithm \(\mathsf {Commit}\) has \(\xi \)-bit min-entropy. Assume the modulus q satisfies \(q=5\mod 8\), \(2B_n < \sqrt{q/2}\) and \(2\kappa <\sqrt{q/2}\). For any probabilistic polynomial-time adversary \(\mathcal {A}\) that initiates a single key generation protocol by querying \({\mathcal {O}}_n^{\mathsf {DS}_3}\) with \( sid = 0\), initiates \(Q_s\) signature generation protocols by querying \({\mathcal {O}}_n^{\mathsf {DS}_3}\) with \( sid \ne 0\), and makes \(Q_h\) queries to the random oracle \({\mathsf {H}}_0,{\mathsf {H}}_1,{\mathsf {H}}_2,{\mathsf {H}}_3,{\mathsf {H}}_4\), the protocol \(\mathsf {DS}_3=(\mathsf {Setup}, (\mathsf {Gen}_j)_{j\in [n]},(\mathsf {Sign})_{j\in [n]},\mathsf {Ver})\) is \(\mathsf {DS}\text {-}\mathsf {UF}\text {-}\mathsf {CMA}\) secure under \(\mathsf {MLWE}_{q,k,\ell ,\eta }\) assumption.
Proof
Suppose we are given \(\mathcal {A}\) that breaks \(\mathsf {DS}_3\) with advantage \(\mathbf {Adv}^{\mathsf {DS}\text {-}\mathsf {UF}\text {-}\mathsf {CMA}}_{\mathsf {DS}_3}(\mathcal {A})\). Without loss of generality we assume that \(P_n\) is an honest party. Our first goal is to construct an algorithm \(\mathcal {B}\) around \(\mathcal {A}\) that simulates the behaviors of \(P_n\) without using honestly generated key pairs. In Fig. 17 we present the resulting oracle simulator \(\mathsf {Sim}\mathsf {Sign}_n\) which are eventually invoked by \(\mathcal {B}\). The simulation of key generation is done just as in the proof for \(\mathsf {DS}_2\) (see Fig. 11). Below we discuss how these are derived via several intermediate hybrid games.
- \({\mathbf {G}}_{0}\):
-
Random Oracle simulation. The random oracles \({\mathsf {H}}_0:\){0,1}\(^*\rightarrow C\), \({\mathsf {H}}_1:\){0,1}\(^*\rightarrow \){0,1}\(^{l_1}\), \({\mathsf {H}}_2:\){0,1}\(^*\rightarrow \){0,1}\(^{l_2}\), \({\mathsf {H}}_3:\){0,1}\(^*\rightarrow S_ ck \) and \({\mathsf {H}}_4:\){0,1}\(^*\rightarrow \){0,1}\(^{l_4}\) are simulated as follows.
-
\({\mathsf {H}}_i(x)\) The table \(\mathrm {HT}_i\) is initially empty. When queried with x, if \(\mathrm {HT}_i[x]\) is set then return \(\mathrm {HT}_i[x]\). Otherwise sample y from \({\mathsf {H}}_i\)’s image uniformly at random and return \(\mathrm {HT}_i[x]{:}{=}y\).
Honest party oracle simulation. In this game \(\mathcal {B}\) behaves exactly like a single honest party in \(\mathsf {DS}_3\); concretely, it simulates an oracle \({\mathcal {O}}_n^{\mathsf {DS}_3}\) (Fig. 3) which internally invokes instructions of \(\mathsf {Gen}_n\) and \(\mathsf {Sign}_n\) according to Fig. 6 and Fig. 16, respectively.
Forgery. When \(\mathcal {A}\) outputs a forgery \((\mu ^*, com ,\mathbf {z},r)\) at the end \(\mathcal {B}\) first generates a commitment key \( ck \leftarrow {\mathsf {H}}_3(\mu ^*, pk )\), derives a challenge \(c\leftarrow {\mathsf {H}}_0( com ,\mu ^*, pk )\) and reconstructs \(\mathbf {w}={\bar{\mathbf {A}}}\mathbf {z}-c\mathbf {t}\). Then \(\mathcal {B}\) checks \(\mu ^*\notin Mset \) and the verification condition
If the forgery is verified then \(\mathcal {B}\) outputs 1. Otherwise \(\mathcal {B}\) outputs 0. Let \(\Pr [{\mathbf {G}}_{i}]\) denote a probability that \(\mathcal {B}\) returns 1 at the game \({\mathbf {G}}_{i}\). Then we have
- \({\mathbf {G}}_{1}\):
-
In this game we modify \(\mathcal {B}\) from the prior game so that it first picks a random challenge \(c\leftarrow _\$C\) and computes its own signature share \(\mathbf {z}_n\) without interacting with adversary. Then the oracle proceeds as in the previous game and sends out hash commitment \(h_n\). Upon receiving \(h_1, \ldots ,h_{n-1}\), the oracle searches the hash table \(\mathrm {HT}_0\) to check if there exists the corresponding preimages \( com _1,\ldots , com _{n-1}\). If it is successful, then let \( com =\sum _{j} com _j\) and program the random oracle so that \(\mathrm {HT}_0[ com ,\mu , pk ]{:}{=}c\). Otherwise simulation fails. Since \({\mathbf {G}}_{1}\) is identical to \({\mathbf {G}}_{0}\) from adversary \(\mathcal {A}\)’s point of view except at the \( bad \) events marked in Fig. 17, we have
$$\begin{aligned} |\Pr [{\mathbf {G}}_{1}] - \Pr [{\mathbf {G}}_{0}]|&\le \Pr [ bad _4] + \Pr [ bad _5] + \Pr [ bad _6] \\&\le \frac{(Q_h+nQ_s+1)^2}{2^{l_4+1}}+Q_s\left( \frac{Q_h+nQ_s}{2^\xi }+\frac{Q_h+Q_s}{2^\xi }+\frac{n}{2^{l_4}}\right) \end{aligned}$$where \(\Pr [ bad _4]\) corresponds to the probability that at least one collision occurs during at most \(Q_h+nQ_s\) queries to \({\mathsf {H}}_4\) made by \(\mathcal {A}\) or \(\mathcal {B}\); \(\Pr [ bad _5]\) is the probability that programming the random oracle \({\mathsf {H}}_0\) fails at least once during \(Q_s\) trials due to either of two cases: 1) \({\mathsf {H}}_4( com _n)\) has been asked by \(\mathcal {A}\) during at most \(Q_h+nQ_s\) queries to \({\mathsf {H}}_4\) (and therefore \(\mathcal {A}\) knows \( com \) and could query \({\mathsf {H}}_0( com ,\mu , pk )\) deliberately), which could succeed with probability at most \(1/2^\xi \) for each query, or 2) \(\mathrm {HT}_0[ com ,\mu , pk ]\) has been set by \(\mathcal {A}\) or \(\mathcal {B}\) by chance during at most \(Q_h+Q_s\) prior queries to \({\mathsf {H}}_0\), which could happen with probability at most \((Q_h+Q_s)/2^\xi \); \(\Pr [ bad _6]\) is the probability that \(\mathcal {A}\) has predicted one of the \(n-1\) outputs of random oracle \({\mathsf {H}}_4\) without making a query to it, which could only happen with probability at most \(n/2^{l_4}\) for each sign query. We remark that the above probability bound is essentially a special case of the one given by [16].
- \({\mathbf {G}}_{2}\):
-
In this game we modify \(\mathcal {B}\) from the prior game so that if \(\mathbf {z}_n\) gets rejected then it commits to some uniformly random vector \(\mathbf {w}_n\in R_q^{k}\) and sends out hash of corresponding commitment \(h_n={\mathsf {H}}_4( com _n)\), where \( com _n\leftarrow \mathsf {Commit}_ ck (\mathbf {w}_n;r_n)\) and \(r_n\leftarrow _\$D(S_r)\). Note that the adversary cannot distinguish this simulated \( com _n\) from the real one due to the hiding property of commitment. In other words, we have
$$\begin{aligned} |\Pr [{\mathbf {G}}_{2}] - \Pr [{\mathbf {G}}_{1}]| \le Q_s\cdot \epsilon _\text {hide} . \end{aligned}$$
- \({\mathbf {G}}_{3}\):
-
In this game \(\mathcal {B}\) does not honestly generate \(\mathbf {z}_n\) anymore and instead simulates the rejection sampling as follows. With probability \(1-1/M\) (i.e., simulation of rejection), it generates commitment \( com _n\) to \(\mathbf {w}_n\leftarrow _\$R_q^{k}\) as before. Otherwise it samples \(\mathbf {z}_n\) from \(D_s^{\ell +k}\) and computes \(\mathbf {w}_n={\bar{\mathbf {A}}} \mathbf {z}_n-c\mathbf {t}_n\). The signature share \(\mathbf {z}_n\) generated this way is indistinguishable from the real one because of the special HVZK property of the underlying identification scheme. In other words, we can directly apply the result of Lemmas 3 and 4. Hence, we have
$$\begin{aligned} |\Pr [{\mathbf {G}}_{3}] - \Pr [{\mathbf {G}}_{2}]| \le Q_s\cdot \frac{2e^{-t^2/2}}{M}. \end{aligned}$$At this point \(\mathcal {B}\) simulates the honest party’s behavior during signature generation by following \(\mathsf {Sim}\mathsf {Sign}_n\) in Fig. 17.
- \({\mathbf {G}}_{4}\):
-
Now notice that signing phase does not rely on the actual secret key share \(\mathbf {s}_n\) anymore. So the next step is to simulate the key generation phase without using \(\mathbf {s}_n\). This can be done just as in Fig. 11 used for the security proof of two-round protocol, and hence
$$\begin{aligned} |\Pr [{\mathbf {G}}_{4}] - \Pr [{\mathbf {G}}_{3}]|&\le \mathbf {Adv}^{}_{\mathsf {MLWE}_{q,k,\ell ,\eta }} + \frac{(Q_h+1)Q_h}{2^{l_1+1}} + \frac{Q_h}{q^{k\ell N}} + \frac{n}{2^{l_1}} \\&\quad + \frac{(Q_h+1)Q_h}{2^{l_2+1}} + \frac{Q_h}{q^{kN}} + \frac{n}{2^{l_2}}. \end{aligned}$$
Now \(\mathcal {B}\) entirely simulates the behaviors of honest party by invoking \(\mathsf {Sim}\mathsf {Gen}_n\) (Fig. 11) and \(\mathsf {Sim}\mathsf {Sign}_n\) (Fig. 17), which do not rely on the secret key share \(\mathbf {s}_n\). We would like to evaluate the upper bound of \(\Pr [{\mathbf {G}}_{4}]\). We first argue that the following probability is negligible.
Case 1: \({\bar{\mathbf {A}}}\mathbf {z}-c\mathbf {t}\ne {\bar{\mathbf {A}}}\mathbf {z}'-c'\mathbf {t}\). In this case, (2) is bounded by the probability that there exists some commitment having two openings over random choice of \( ck \), which should be bounded by negligible \(\epsilon _\text {ubind}\) if the commitment key is uniform (and hence \( ck \leftarrow _\$S_ ck \) can be regarded as if it was generated from \(\mathsf {CGen}\)) and if unconditionally binding holds (see Definition 4).
Case 2: \({\bar{\mathbf {A}}}\mathbf {z}-c\mathbf {t}={\bar{\mathbf {A}}}\mathbf {z}'-c'\mathbf {t}\). Let \(\mathbf {z}_1\in R_q^\ell ,\mathbf {z}_2\in R_q^k, \mathbf {z}_1'\in R_q^\ell , \mathbf {z}_2'\in R_q^k\) be such that \(\mathbf {z}=\begin{bmatrix}\mathbf {z}_1\\ \mathbf {z}_2\end{bmatrix}\) and \(\mathbf {z}'=\begin{bmatrix}\mathbf {z}_1'\\ \mathbf {z}_2'\end{bmatrix}\), we have
where we used the fact that \({\bar{\mathbf {A}}}=[\mathbf {A}|\mathbf {I}]\). Hence, the probability (2) in this case is bounded by
by applying Lemma 6 with \({\bar{\mathbf {z}}}=\mathbf {z}-\mathbf {z}'\), \(\bar{c}=c-c'\), \(\beta =2 B_n\), and
If the event for (2) does not occur, then it means that for given \( com \in S_ com \) there exists at most one transcript that verifies. In that case \(\mathcal {A}\) has at most a 1/|C| chance of obtaining the correct challenge for each query to \({\mathsf {H}}_0\) with input \(( com , \mu ^*, pk )\) if \(\mu ^*\notin Mset \).
Since \(\mathcal {A}\) makes at most \(Q_h\) queries to \({\mathsf {H}}_0\) and \({\mathsf {H}}_3\) in total and \(\mathcal {B}\) makes a single query to \({\mathsf {H}}_0\) and \({\mathsf {H}}_3\) at the forgery phase, we have
\(\square \)
The following lemma is a slightly modified version of Lemma 4.6 of [59]. The main difference is that we use the Euclidean norm instead of \(\infty \)-norm.
Lemma 6
Let \(\beta \) be a positive integer less than \(\sqrt{q/2}\) and \(\bar{C}\) be a set of elements in \(R\setminus \{\mathbf {0}\}\) with coefficients less than \(\sqrt{q/2}\). If \(q=5\mod 8\) then
where \({\bar{\mathbf {z}}}=\begin{bmatrix}{\bar{\mathbf {z}}}_1\\ {\bar{\mathbf {z}}}_2\end{bmatrix}\).
Proof
Case \({\bar{\mathbf {z}}}_1 = \mathbf {0}\). Since \(0\le \Vert \bar{c}\Vert _\infty \le \sqrt{q/2}\) and \(q=5 \mod 8\), Lemma 2.2 by Lyubashevsky and Seiler [65] guarantees that \(\bar{c}\) is invertible in \(R_q\). In this case the probability is upper-bounded by
Case \({\bar{\mathbf {z}}}_1 \ne \mathbf {0}\). Let \(\mathbf {a}\in R_q^k,\mathbf {A}'\in R_q^{k\times (\ell -1)}\) be such that \([\mathbf {a}|\mathbf {A}']=\mathbf {A}\) and \({\bar{z}}\in R_q,{\bar{\mathbf {z}}}_1'\in R_q^{\ell -1}\) be such that \(\begin{bmatrix}{\bar{z}}\\ {\bar{\mathbf {z}}}_1'\end{bmatrix}={\bar{\mathbf {z}}}_1\). Assuming wlog that \(\bar{z}\) is nonzero, it is guaranteed that \(\bar{z}\) is invertible in \(R_q\) since \(\Vert \bar{z}\Vert _\infty \le \Vert \bar{z}\Vert _2\le \beta \le \sqrt{q/2}\). Hence we obtain the following upper-bound.
Putting the two cases together we obtain the result. \(\square \)
Rights and permissions
About this article
Cite this article
Damgård, I., Orlandi, C., Takahashi, A. et al. Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. J Cryptol 35, 14 (2022). https://doi.org/10.1007/s00145-022-09425-3
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00145-022-09425-3