Alternating Moduli
The alternating moduli assumption (also called Crypto Dark Matter1 after BIP+18) posits that mixing linear operations over different moduli — specifically (XOR) and (mod-3 addition) — yields candidate PRF constructions that are computationally indistinguishable from random, under assumptions not known to reduce to standard assumptions like LWE or LPN.
Assumption
The main candidates from BIP+18 use a two-layer structure: a secret linear map over followed by a public linear map over . Given , the function is defined by
where is the secret key and is public. The weak PRF version assumes hardness for uniformly random inputs; the strong PRF version assumes hardness for adversarially chosen inputs.
Weak alternating moduli (random-input) assumption
\begin{algorithm}
\algname{Game}
\caption{$\Game^{\text{weak-am}}_{\calA}(\secpar)$}
\begin{algorithmic}
\State $A \getsr \ZZ_2^{m \times n}$; $B \getsr \ZZ_3^{\ell \times m}$
\State $b \getsr \{0,1\}$
\State $\calO_0() := (x \getsr \bits^n;\; (x,\; B \cdot (A \cdot x \bmod 2) \bmod 3))$
\State $\calO_1() := (x \getsr \bits^n;\; y \getsr \ZZ_3^\ell;\; (x, y))$
\State $b' \gets \calA^{\calO_b}(1^\secpar)$
\Return $[b' = b]$
\end{algorithmic}
\end{algorithm}
Weak-AM is hard if for all efficient ,
is negligible.
Strong alternating moduli (chosen-input) assumption
\begin{algorithm}
\algname{Game}
\caption{$\Game^{\mathrm{am}}_{\calA}(\secpar)$}
\begin{algorithmic}
\State $A \getsr \ZZ_2^{m \times n}$; $B \getsr \ZZ_3^{\ell \times m}$
\State $b \getsr \{0,1\}$
\State $R \getsr \Funcs(\bits^n, \ZZ_3^\ell)$
\Comment{Can be sampled lazily}
\State $\calO_0(x) := B \cdot (A \cdot x \bmod 2) \bmod 3$
\State $\calO_1(x) := R(x)$
\State $b' \gets \calA^{\calO_b}(1^\secpar)$
\Return $[b' = b]$
\end{algorithmic}
\end{algorithm}
AM is hard if for all efficient ,
is negligible. AM hardness implies Weak-AM hardness (the strong assumption implies the weak one).
Known Results
- Low-complexity PRF candidates (in / ) based on mixed-moduli assumptions — BIP+18
- Mixed-moduli PRFs → applications in MPC with low-communication preprocessing, leakage-resilient PRFs, and more — BIP+18
- Low-complexity PRG in is required by the iO construction from well-founded assumptions — JLS21
- The assumption is not known to follow from or imply standard lattice assumptions
Variations
Low-complexity PRFs (in / )
Separate from the alternating moduli assumption, there is interest in PRFs computable by low-complexity circuits. A PRF in (constant depth, threshold gates) would have strong implications for MPC efficiency.
Pseudorandom correlation generators (PCG)
A related paradigm where short seeds expand to long correlated randomness useful in MPC; alternating-moduli-style assumptions can ground efficient PCG constructions.
Attacks
- Ongoing cryptanalytic attention; several early candidates have been partially broken or weakened
- Algebraic attacks exploiting the mixed-moduli structure (Gröbner basis methods, linearization) remain the primary avenue
Footnotes
-
The name “Crypto Dark Matter” reflects the idea that large regions of the cryptographic assumption landscape remain unexplored. ↩