Alternating Moduli

The alternating moduli assumption (also called Crypto Dark Matter1 after BIP+18) posits that mixing linear operations over different moduli — specifically (XOR) and (mod-3 addition) — yields candidate PRF constructions that are computationally indistinguishable from random, under assumptions not known to reduce to standard assumptions like LWE or LPN.

Assumption

The main candidates from BIP+18 use a two-layer structure: a secret linear map over followed by a public linear map over . Given , the function is defined by

where is the secret key and is public. The weak PRF version assumes hardness for uniformly random inputs; the strong PRF version assumes hardness for adversarially chosen inputs.

Weak alternating moduli (random-input) assumption

\begin{algorithm}
\algname{Game}
\caption{$\Game^{\text{weak-am}}_{\calA}(\secpar)$}
\begin{algorithmic}
\State $A \getsr \ZZ_2^{m \times n}$; $B \getsr \ZZ_3^{\ell \times m}$
\State $b \getsr \{0,1\}$
\State $\calO_0() := (x \getsr \bits^n;\; (x,\; B \cdot (A \cdot x \bmod 2) \bmod 3))$
\State $\calO_1() := (x \getsr \bits^n;\; y \getsr \ZZ_3^\ell;\; (x, y))$
\State $b' \gets \calA^{\calO_b}(1^\secpar)$
\Return $[b' = b]$
\end{algorithmic}
\end{algorithm}

Weak-AM is hard if for all efficient ,

is negligible.

Strong alternating moduli (chosen-input) assumption

\begin{algorithm}
\algname{Game}
\caption{$\Game^{\mathrm{am}}_{\calA}(\secpar)$}
\begin{algorithmic}
\State $A \getsr \ZZ_2^{m \times n}$; $B \getsr \ZZ_3^{\ell \times m}$
\State $b \getsr \{0,1\}$
\State $R \getsr \Funcs(\bits^n, \ZZ_3^\ell)$
\Comment{Can be sampled lazily}
\State $\calO_0(x) := B \cdot (A \cdot x \bmod 2) \bmod 3$
\State $\calO_1(x) := R(x)$
\State $b' \gets \calA^{\calO_b}(1^\secpar)$
\Return $[b' = b]$
\end{algorithmic}
\end{algorithm}

AM is hard if for all efficient ,

is negligible. AM hardness implies Weak-AM hardness (the strong assumption implies the weak one).

Known Results

  • Low-complexity PRF candidates (in / ) based on mixed-moduli assumptions — BIP+18
  • Mixed-moduli PRFs → applications in MPC with low-communication preprocessing, leakage-resilient PRFs, and more — BIP+18
  • Low-complexity PRG in is required by the iO construction from well-founded assumptions — JLS21
  • The assumption is not known to follow from or imply standard lattice assumptions

Variations

Low-complexity PRFs (in / )

Separate from the alternating moduli assumption, there is interest in PRFs computable by low-complexity circuits. A PRF in (constant depth, threshold gates) would have strong implications for MPC efficiency.

Pseudorandom correlation generators (PCG)

A related paradigm where short seeds expand to long correlated randomness useful in MPC; alternating-moduli-style assumptions can ground efficient PCG constructions.

Attacks

  • Ongoing cryptanalytic attention; several early candidates have been partially broken or weakened
  • Algebraic attacks exploiting the mixed-moduli structure (Gröbner basis methods, linearization) remain the primary avenue

Footnotes

  1. The name “Crypto Dark Matter” reflects the idea that large regions of the cryptographic assumption landscape remain unexplored.