Short Integer Solution (SIS) Overview
- Short Integer Solution (SIS) is a core lattice problem defined by finding a short nonzero vector in the kernel of an integer matrix modulo q, serving as the security basis for many post-quantum schemes.
- Variants like SIS∞ and MultiSIS adjust norm constraints and problem structure, enabling their use in diverse cryptographic protocols including signature schemes and commitment designs.
- Recent algorithmic improvements, such as combinatorial halving techniques and k-partition methods, refine hardness assumptions and inform secure parameter selection in cryptographic applications.
The Short Integer Solution (SIS) problem is a foundational lattice problem with direct cryptographic significance, worst-to-average-case equivalence, and serves as the security basis for diverse post-quantum schemes. Given an integer matrix modulo , SIS asks for a nontrivial short integral vector (with norm bounded by parameter or ), lying in the kernel modulo . Variants include imposing infinity norm (SIS), demanding multiple solutions (MultiSIS), or requiring the solution vector to be in a specific structured set.
1. Formal Definitions and Variants
The standard SIS problem, denoted , is defined as follows. For integers , and a norm bound , given sampled uniformly at random, the goal is to find such that and , with typically the Euclidean norm (Blömer et al., 12 Sep 2025, Semaev, 2020).
The SIS (-SIS) variant, central to recent advances, demands for some (Kothari et al., 8 Oct 2025, Ducas et al., 29 Mar 2025). The standard setting for post-quantum cryptography uses parameters , , .
SIS also generalizes to A-Constrained Integer Solution (A-CIS), MultiSIS, and inhomogeneous SIS (target , requiring ).
2. Parameter Regimes and Worst-to-Average-Case Reductions
SIS’s cryptographic relevance derives from its tight worst-to-average-case reductions. Ajtai’s seminal construction and later Micciancio–Regev establish that solving average-case SIS (random ) with and is as hard as approximating the Shortest Independent Vector Problem (SIVP) or Shortest Vector Problem (SVP) on arbitrary lattices in dimensions to within polynomial factors (Blömer et al., 12 Sep 2025).
For SIS, cryptographic parameters select , or smaller, and polynomial . In this regime, no known polynomial-time algorithm (classical or quantum) exists (Kothari et al., 8 Oct 2025). Quantum algorithmic separations were recently studied in wider parameter spaces (large , looser ) for SIS.
| SIS Variant | Norm Bound | Typical | Regime of Interest |
|---|---|---|---|
| SIS (Euclidean) | Cryptographic hardness | ||
| SIS | to | Parameter separations | |
| MultiSIS | Several solutions | as above | Signature schemes, SV |
3. Classical and Quantum Algorithms for SIS
Early algorithms for SIS, including exhaustive search and lattice basis reduction (e.g. BKZ), have exponential time complexity in or (Semaev, 2020). Notably, Semaev introduced a sorting-based combinatorial method for SIS and MultiSIS with sub-exponential complexity for a broad parameter range, specifically for , greatly improving over the cost of previous methods (Semaev, 2020). The approach recursively combines “short vector” solutions by pairwise matching and does not rely on basis reduction.
For SIS, Wagner’s generalized birthday algorithm, adapted with discrete Gaussian techniques, achieves sub-exponential time for width parameters , with an explicit, provable algorithmic analysis (Ducas et al., 29 Mar 2025). This methodology underpins the security of NIST PQC schemes such as Dilithium. However, while the asymptotic runtime is subexponential, concrete attacks remain infeasible for recommended parameters due to prohibitive list sizes (e.g., for level 2 Dilithium) (Ducas et al., 29 Mar 2025).
Recently, a claimed quantum exponential speedup for average-case SIS by Chen–Liu–Zhandry (CLZ) was refuted: classical deterministic algorithms based on combinatorial halving tricks and interval partitioning now efficiently solve these cases in polytime for , entirely eliminating the previously observed quantum-classical gap (Kothari et al., 8 Oct 2025).
4. Algorithmic Frameworks for SIS: Recent Developments
The main algorithmic advances for SIS (Kothari et al., 8 Oct 2025) center on two frameworks:
- Halving Trick: Given “large-norm” zero-sums in the kernel, one recursively reduces the problem to smaller bounds by pairing solutions, at the cost of increasing the sample size quadratically per step. After iterations, one solves SIS with using samples and runtime .
- -Partition Forest: The solution interval is partitioned into intervals, and a recursive multilevel construction combines solutions to directly reach a solution with minimal target bound. This method achieves with and similar runtime.
Additionally, reductions handle average-case subset-sum () and general A-CIS subclasses by translation/dilation, supporting arbitrary “almost full” sets .
Summary Table: Recent SIS Algorithmic Results (Kothari et al., 8 Oct 2025, Ducas et al., 29 Mar 2025)
| Method | Regime | Running Time | Main Bound |
|---|---|---|---|
| Halving Trick | Poly(, ) | ||
| -Partition | Poly(, ) | ||
| Wagner/BKW |
These classical results now fully subsume previously known quantum speedups in SIS regimes.
5. Cryptographic Implications
SIS and SIS are pillars of post-quantum cryptography, serving as the security backbone for hash functions, commitment schemes, authentication protocols, and signature schemes, notably including CRYSTALS-Dilithium. The hardness of SIS for suitable parameters is directly reducible to worst-case hard lattice problems such as SIVP and SVP (Blömer et al., 12 Sep 2025), upholding its suitability for cryptographic use.
However, recent algorithmic breakthroughs have sharply delineated the secure parameter envelope. For SIS and related A-CIS problems with , polynomial-time classical algorithms now exist (Kothari et al., 8 Oct 2025), precluding cryptographic constructions relying on the hardness of SIS in these parameter ranges. The concrete security of recommended cryptographic parameters (e.g., , for signatures) remains strong, as no polynomial or subexponential algorithms are known in these regimes (Ducas et al., 29 Mar 2025, Kothari et al., 8 Oct 2025). Some schemes must, however, scrutinize their parameter settings to avoid being inadvertently positioned in classically tractable domains.
6. Structured SIS, Lattice Constructions, and Applications in Coding
Beyond foundational cryptographic use, SIS lattices and their ring/module extensions (R-SIS, M-SIS) yield concise, efficient constructions in other areas. Notably, explicit randomized constructions of symplectic lattices from SIS or R-SIS matrices enable the design of Gottesman–Kitaev–Preskill (GKP) quantum codes (Blömer et al., 12 Sep 2025). These codes achieve nearly optimal minimum distance with efficient randomized decoding algorithms, running in time (SIS), (R-SIS), or (M-SIS for rank ). Unlike earlier approaches that relied on trapdoor constructions, these codes are trapdoor-free and perform comparably to, or even outperform, NTRU-based codes for certain parameters.
7. Perspectives and Open Problems
While worst-case/average-case equivalence, abundant applications, and robust security reductions position SIS as a cryptographic cornerstone, numerous research directions remain. Open problems include rigorous security reductions for newly proposed combinatorial algorithms (Semaev, 2020), precise numerical analyses for moderate-size instances, parameter selection for cryptographic deployment resilient to current and future algorithms, and further study of highly structured variants and their reductions to classic SIS/LWE problems. Recent “dequantizations” of SIS, quantum linear-system solvers, and recommendation-system speedups emphasize the need for dynamic re-examination of quantum-classical separations across computational lattice problems (Kothari et al., 8 Oct 2025).