Papers
Topics
Authors
Recent
Search
2000 character limit reached

SelfTargetMSIS in Lattice Cryptography

Updated 13 April 2026
  • SelfTargetMSIS is a self-targeting variant of MSIS that serves as a core security assumption for CRYSTALS-Dilithium by extending classical lattice problems with quantum-resistant features.
  • The reduction from MLWE to SelfTargetMSIS employs measure-and-reprogram and quantum rewinding techniques, transforming a forger into an MLWE adversary under the QROM.
  • Optimized parameter choices in SelfTargetMSIS enable native NTT performance and provable post-quantum security, though at the cost of increased key and signature sizes.

SelfTargetMSIS is a computational problem within module lattice-based cryptography, introduced as a central security assumption in the analysis of CRYSTALS-Dilithium digital signatures. It extends the traditional Module Short Integer Solution (MSIS) problem to a “self-targeting” variant, forming the basis for the first quantum reduction from Module Learning With Errors (MLWE) to Dilithium’s signature security in the Quantum Random Oracle Model (QROM). This problem and its reduction underpin the provable post-quantum security of Dilithium instantiated in rings with moduli q ≡ 1 mod 2n, enabling practical use of the fastest Number Theoretic Transform (NTT) algorithms in implementation (Jackson et al., 2023).

1. Definition and Formalization

Let qq be an odd prime, nn a power of 2, and Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1). Consider integer parameters m,k,γ,τm, k, \gamma, \tau and a hash function H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau, where BτRqB_\tau \subset R_q is the set of ring elements with exactly τ\tau nonzero coefficients, each in {±1}\{\pm1\}. A quantum adversary A\mathcal{A} is given quantum query access to HH and a random nn0.

Success in SelfTargetMSISnn1 is defined as the adversary producing a pair nn2 such that

nn3

where nn4 is the canonical matrix–vector product over nn5, nn6 is the nn7 identity, and nn8 selects the last coordinate of nn9. Formally,

Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)0

This formulation captures the challenge of finding a "self-targeted" preimage Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)1 whose last component matches the hash output, even when Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)2 is accessible only as a quantum random oracle (Jackson et al., 2023).

2. Relationship to Classical MSIS and MLWE

SelfTargetMSIS is a structural extension of the MSIS problem. In MSISRq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)3, the adversary, given Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)4, finds nonzero Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)5 such that Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)6 and Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)7.

Connections:

  • MSIS ≤ROM SelfTargetMSIS: Classically, given two distinct SelfTargetMSIS solutions for the same Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)8 but different Rq=Zq[X]/(Xn+1)R_q = \mathbb{Z}_q[X]/(X^n+1)9, their difference is a short MSIS solution.
  • MLWE to SelfTargetMSIS (quantum): The sEUF security reduction chain for Dilithium in the QROM decomposes a forger into three parts: one attacking MLWE, one for SelfTargetMSIS, and one for MSIS. Therefore, demonstrating the quantum hardness of SelfTargetMSIS underpins the security of Dilithium in the QROM (Jackson et al., 2023).

3. Quantum Reduction: MLWE to SelfTargetMSIS

The key technical contribution is a quantum reduction from MLWEm,k,γ,τm, k, \gamma, \tau0 to SelfTargetMSISm,k,γ,τm, k, \gamma, \tau1. The reduction follows four main steps:

  • Plain→SelfTargetMSIS: Ensures the input matrix m,k,γ,τm, k, \gamma, \tau2 is in row-echelon form (specifically m,k,γ,τm, k, \gamma, \tau3), so a solver for the "Plain" problem yields a SelfTargetMSIS solver, modulo negligible loss.
  • Plain→CCB (Chosen-Coordinate Binding): Applies the Liu–Zhandry "measure-and-reprogram" lemma, converting any m,k,γ,τm, k, \gamma, \tau4-query SelfTargetMSIS adversary into a query-free solver for a CCB experiment—with a quadratic degradation to m,k,γ,τm, k, \gamma, \tau5 in advantage.
  • CCB→Collapse (Collapsing Test): Utilizes quantum rewinding techniques (Unruh), showing that a successful CCB adversary gives a solution to the collapsing test experiment, with success probability squared (minus statistical offset).
  • Collapse→MLWE: Uses identity-vs-measurement distinguishing (following Liu–Montgomery–Zhandry) to show any successful Collapse adversary can be turned into an MLWE distinguisher, given appropriate parameter constraints (m,k,γ,τm, k, \gamma, \tau6 and m,k,γ,τm, k, \gamma, \tau7).

The result is that, under these conditions, any quantum adversary with non-negligible advantage m,k,γ,τm, k, \gamma, \tau8 against SelfTargetMSIS can be converted into an MLWE adversary with comparable runtime and advantage m,k,γ,τm, k, \gamma, \tau9 (Jackson et al., 2023).

4. Collapsing Hash Functions and Security in the QROM

The analysis requires that the MSIS-derived hash function H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau0 is collapsing in the sense of Unruh. This property ensures that, in the QROM, hash outputs appear classical to any quantum adversary, enabling the Fiat–Shamir with aborts paradigm for signature security to go through with negligible loss.

The collapsing property is established through a sequence of projection-based arguments connecting the ability to win the Chosen-Coordinate Binding game to violating the collapsing condition. Specifically, if an adversary can produce two distinct valid preimages with different last coordinates, then the hash cannot be collapsing. This property is critical for extending the sEUF–CMA (strong Existential Unforgeability under Chosen Message Attack) proof for Dilithium from the classical ROM to the QROM (Jackson et al., 2023).

5. Integration in Dilithium Security Proofs

With these reductions and hash function properties, security proofs for CRYSTALS-Dilithium under the native condition H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau1 in the QROM are achieved under standard Module LWE and MSIS assumptions. Specifically, for any forger making H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau2 queries, the existential unforgeability advantage is bounded by:

H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau3

Given the reduction H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau4, every Dilithium forger yields a nonnegligible MLWE or MSIS solver (Jackson et al., 2023).

6. Parameter Choices and Practical Implications

The quantum reduction introduces a H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau5-factor loss, requiring larger parameters for concrete instantiations. For NIST Level 3 security (target 128-bit quantum SVP cost), Jackson et al. propose:

  • H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau6, H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau7, H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau8, H ⁣:{0,1}BτH\colon \{0,1\}^* \to B_\tau9, BτRqB_\tau \subset R_q0, BτRqB_\tau \subset R_q1, BτRqB_\tau \subset R_q2, BτRqB_\tau \subset R_q3, BτRqB_\tau \subset R_q4
  • Public key size: BτRqB_\tau \subset R_q5 bytes
  • Signature size: BτRqB_\tau \subset R_q6 bytes

Compared to standard Dilithium (BτRqB_\tau \subset R_q7 B public key, BτRqB_\tau \subset R_q8 B signature), these settings are BτRqB_\tau \subset R_q9 larger in signature and τ\tau0 larger in public key size at Level 3. However, they are the first settings for which sEUF in QROM is provably reduced to MLWE/MSIS, exploiting native NTT (“fast ring”) structures. Additionally, the ring arithmetic is τ\tau1–τ\tau2 faster than hybrid-NTT instantiations previously needed to avoid the τ\tau3 case (Jackson et al., 2023).

Security Level MLWE (bits) SelfTargetMSIS (bits) Public Key Size (B) Signature Size (B)
Level 3 (128Q) τ\tau4400 τ\tau5100 18,592 13,490

7. Significance and Ongoing Research

SelfTargetMSIS enables the first quantum-sound security proof for CRYSTALS-Dilithium in its natural parameter regime, without requiring restrictive modulus choices or inefficient hybrid structures. The quantum reduction and collapsing hash analysis close prior gaps in the QROM, providing a solid foundation for Dilithium as a post-quantum standard with native NTT performance. A plausible implication is ongoing optimization of parameter sizes and better bounds for SelfTargetMSIS hardness, as this directly impacts key and signature efficiency in practice (Jackson et al., 2023).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to SelfTargetMSIS.