Hint-LPN Assumption in Cryptography
- Hint-LPN is a computational hardness assumption that generalizes the standard LPN by incorporating correlated hint noise, crucial for modeling adversarial leakage.
- It is defined through parameters including a prime q, secret dimension k, sample dimension n, and distinct noise rates, enabling a formal reduction from standard LPN.
- Its application in KAHE-based secure aggregation demonstrates its role in ensuring post-quantum security and tight reductions even under adversarial collusion.
The Hint-LPN assumption is a code-based computational hardness assumption generalizing the well-known Learning Parity with Noise (LPN) assumption, introduced to model adversarial indistinguishability in cryptographic constructions where additional “hint” information is correlated with the LPN noise. It formalizes the infeasibility of distinguishing samples containing both standard LPN structure and a noisy “hint,” and is central to the security analysis of code-based homomorphic encryption schemes for secure aggregation. The equivalence of Hint-LPN and standard LPN for suitable parameters plays a critical role in post-quantum secure aggregation, enabling tight reductions and facilitating security proofs even under extensive adversarial leakage of secret keys (Bitzer et al., 19 Jan 2026).
1. Formal Definition and Parameterization
The Hint-LPN assumption is parameterized by a prime , secret dimension , sample dimension , LPN noise rate , and hint noise rate . The product noise distribution, Bern on , is defined by flipping each coordinate to a uniformly random nonzero element of with probability ; otherwise, the output is $0$. The challenge samples in the Hint-LPN problem are described as follows:
The Hint-LPN assumption posits that no efficient adversary (PPT) can distinguish samples of from samples , where is uniformly random and , except with negligible advantage [(Bitzer et al., 19 Jan 2026), Def. 7].
2. Equivalence to Standard LPN: Reductions and Statistical Analysis
The equivalence between Hint-LPN and standard LPN is established through carefully constructed reductions, exploiting noise parameter manipulation. For , define
The statistical preimage lemma (Lemma 2) shows there exists a distribution on (explicitly determined by , ) such that the joint distribution for , , matches exactly the joint distribution for .
Theorem 3 (LPN Hint-LPN) formalizes the reduction: for and as above, an efficient algorithm can map LPN samples (where ) or uniform samples to triples such that
- In the LPN case:
- In the uniform case: uniform in
Thus, distinguishing Hint-LPN samples is at least as hard as distinguishing standard LPN for the derived parameter [(Bitzer et al., 19 Jan 2026), Lemma 2, Thm. 3].
3. Application in KAHE-Based Secure Aggregation
The key-and-message additive homomorphic encryption (KAHE) is central to the protocol for secure aggregation. In KAHE, encryption is defined as:
where security under leakage of all but one secret key is analyzed. The proof leverages a hybrid argument to transition real ciphertexts to random supplemented with a correlated hint, matching the Hint-LPN distribution. By the established reduction, this variant is as hard as LPN distinguishing, allowing for semantic security proofs under leakage [(Bitzer et al., 19 Jan 2026), Sec. IV, Def. 5, 6].
4. Collusion, Noise Amplification, and Tightness of Reduction
Security of the aggregation scheme under user collusion is tightly characterized. When up to users collude, the "effective" LPN noise increases, with explicit formula:
where for users. Notably, for , and , giving a tight reduction: security under collusion is provably as hard as standard LPN. For smaller , the effective noise always increases, further strengthening the reduction for modest collusion [(Bitzer et al., 19 Jan 2026), Thm. 2].
5. Role in Post-Quantum Cryptographic Protocols
The Hint-LPN assumption is motivated by the need for post-quantum secure aggregation protocols that avoid lattice-based hardness, relying instead on code-based complexity. Its formulation enables the practical instantiation of secure aggregation algorithms with committee-based decryption and CRT-based communication optimizations. The tight parameter reduction to LPN ensures that code-based homomorphic encryption schemes can robustly withstand adversarial leakage and collusion, preserving semantic security under concrete choices of as inherited from LPN hardness (Bitzer et al., 19 Jan 2026).
6. Implications and Generalizations
The equivalence to standard LPN for suitable noise parameters suggests that protocols analyzed under Hint-LPN inherit the well-established post-quantum security guarantees of code-based LPN constructions. A plausible implication is that similar "hint" generalizations may support security proofs in other cryptographic primitives, for scenarios involving partial exposure or correlated noise. The Hint-LPN approach formalizes adversarial uncertainty in the presence of auxiliary hints, offering avenues for finely quantified reductions and analysis in future post-quantum cryptography research (Bitzer et al., 19 Jan 2026).