Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits
Pith reviewed 2026-05-18 23:30 UTC · model grok-4.3
The pith
A new succinct oblivious tensor evaluation protocol from LWE yields adaptively secure laconic function evaluation with communication linear in input size plus depth.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors construct succinct oblivious tensor evaluation from LWE so that two parties exchange two simultaneous messages whose total length is independent of the dimension of the input vectors and obtain an additive secret sharing of their tensor product. The same construction yields the first adaptively secure laconic function evaluation scheme for depth-D functions with total communication m + ℓ + D · poly(λ), a trapdoor hash function for all circuits, optimally succinct homomorphic secret sharing for all functions, and a rate-1/2 laconic oblivious transfer protocol for batch messages, all from standard LWE.
What carries the argument
Succinct oblivious tensor evaluation, the two-message protocol that produces an additive secret sharing of x ⊗ y with communication and CRS size independent of dim(x).
If this is right
- Adaptively secure laconic function evaluation for depth-D functions with communication m + ℓ + D · poly(λ).
- Trapdoor hash functions that work for arbitrary circuits.
- Optimally succinct homomorphic secret sharing for all functions.
- Rate-1/2 laconic oblivious transfer for batches of messages.
Where Pith is reading between the lines
- The dimension-independent communication may allow the same techniques to scale to very large vectors in secure two-party computation without a corresponding increase in bandwidth.
- Because all listed primitives rest on the same LWE-based encodings, they can be composed directly to build larger protocols such as secure multiparty computation for circuits of moderate depth.
- The adaptive security property removes the need for non-adaptive assumptions in applications where the adversary can choose inputs after seeing the public parameters.
Load-bearing premise
The new adaptive lattice encodings must simultaneously be correct and satisfy the required simulation and indistinguishability properties under the LWE assumption.
What would settle it
An efficient algorithm that distinguishes the two messages of the OTE protocol from uniform random strings (or that breaks the adaptive security of the derived laconic function evaluation) when the underlying LWE instance is hard would falsify the central claims.
read the original abstract
We propose the notion of succinct oblivious tensor evaluation (OTE), where two parties compute an additive secret sharing of a tensor product of two vectors $\mathbf{x} \otimes \mathbf{y}$, exchanging two simultaneous messages. Crucially, the size of both messages and of the CRS is independent of the dimension of $\mathbf{x}$. We present a construction of OTE with optimal complexity from the standard learning with errors (LWE) problem. Then we show how this new technical tool enables a host of cryptographic primitives, all with security reducible to LWE, such as: * Adaptively secure laconic function evaluation for depth-$D$ functions $f:\{0, 1\}^m\rightarrow\{0, 1\}^\ell$ with communication $m+\ell+D\cdot \mathrm{poly}(\lambda)$. * A trapdoor hash function for all functions. * An (optimally) succinct homomorphic secret sharing for all functions. * A rate-$1/2$ laconic oblivious transfer for batch messages, which is best possible. In particular, we obtain the first laconic function evaluation scheme that is adaptively secure from the standard LWE assumption, improving upon Quach, Wee, and Wichs (FOCS 2018). As a key technical ingredient, we introduce a new notion of \emph{adaptive lattice encodings}, which may be of independent interest.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript introduces succinct oblivious tensor evaluation (OTE), a two-message protocol in which parties obtain an additive secret sharing of the tensor product x ⊗ y with message and CRS sizes independent of dim(x). It constructs such an OTE from standard LWE via a new primitive called adaptive lattice encodings, then uses it to obtain adaptively secure laconic function evaluation for depth-D functions with communication m + ℓ + D·poly(λ), trapdoor hashing for all functions, succinct homomorphic secret sharing for all functions, and rate-1/2 laconic OT for batch messages, all with security reducible to LWE. This yields the first adaptively secure LFE from standard LWE, improving on Quach-Wee-Wichs (FOCS 2018).
Significance. If the reductions are correct, the work supplies the first adaptively secure LFE from plain LWE together with several other laconic primitives achieving optimal or near-optimal rates under the same assumption. The new adaptive lattice encodings primitive is presented as potentially reusable and the paper supplies explicit communication bounds and black-box compositions, which are concrete strengths.
major comments (2)
- [§3] §3 (Adaptive Lattice Encodings): The security reduction for the adaptive simulation property must be checked in full; the adversary selects the function or circuit after seeing the CRS and the first encoding message, and it is not immediately clear whether the reduction to standard LWE preserves polynomial modulus and noise without additional assumptions or loss of adaptivity.
- [§5.1] §5.1 (LFE construction): The claimed communication m + ℓ + D·poly(λ) for depth-D functions relies on the succinct OTE being plugged into the laconic evaluation; verify that the depth dependence does not introduce hidden super-polynomial factors in the security reduction or in the concrete parameter setting.
minor comments (2)
- [Abstract] Abstract and §1: the phrase 'optimal complexity' for OTE should be accompanied by a precise asymptotic statement (e.g., O(λ) or O(λ + log n)) rather than left implicit.
- [§2] Notation: the tensor-product notation x ⊗ y is used without an explicit definition of the underlying ring or vector spaces in the preliminaries; add a short paragraph clarifying the ambient module.
Simulated Author's Rebuttal
Thank you for the opportunity to respond to the referee's report. We address each major comment below with clarifications on the security reductions and constructions.
read point-by-point responses
-
Referee: [§3] §3 (Adaptive Lattice Encodings): The security reduction for the adaptive simulation property must be checked in full; the adversary selects the function or circuit after seeing the CRS and the first encoding message, and it is not immediately clear whether the reduction to standard LWE preserves polynomial modulus and noise without additional assumptions or loss of adaptivity.
Authors: In the proof of Theorem 3.1 (Section 3.3), the adaptive simulation is shown via a hybrid argument that replaces the adaptive lattice encodings with LWE samples. The CRS and first encoding message are generated independently of the function (which is chosen adaptively afterward), allowing the reduction to embed the LWE challenge directly into these components without knowledge of the function. The modulus and noise parameters are identical to the underlying LWE instance, with only a standard polynomial security loss from the hybrids and no additional assumptions required. We are happy to include an expanded remark or lemma statement in the revision to make this explicit. revision: partial
-
Referee: [§5.1] §5.1 (LFE construction): The claimed communication m + ℓ + D·poly(λ) for depth-D functions relies on the succinct OTE being plugged into the laconic evaluation; verify that the depth dependence does not introduce hidden super-polynomial factors in the security reduction or in the concrete parameter setting.
Authors: Section 5.1 constructs the LFE by applying the succinct OTE iteratively across the D layers of the circuit. Each layer contributes a poly(λ) communication overhead from the OTE, yielding the stated bound. The security reduction consists of a sequence of D hybrids, each invoking the OTE security; the total loss is therefore D · poly(λ), which remains polynomial for polynomial-depth circuits. Concrete parameters are set by scaling the LWE dimension and modulus polynomially in D (while keeping noise sub-exponential in λ) to ensure both correctness and security, as already outlined in the parameter discussion following Theorem 5.1. No super-polynomial factors appear in either the reduction or the parameter choice. revision: no
Circularity Check
No circularity: all security claims reduce to external standard LWE assumption
full rationale
The paper constructs succinct OTE from the standard LWE problem using a new adaptive lattice encodings primitive, then obtains applications (adaptively secure depth-D LFE, trapdoor hashing, etc.) via black-box composition with security reductions to the same external LWE assumption. No self-definitional steps, fitted inputs renamed as predictions, or load-bearing self-citations appear in the provided abstract or description; the central primitive is defined and its correctness/simulation properties are claimed to be proven from LWE without reducing back to the target results by construction. The derivation chain is therefore self-contained against the external benchmark.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Hardness of the Learning With Errors (LWE) problem
invented entities (1)
-
Adaptive lattice encodings
no independent evidence
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We present a construction of OTE with optimal complexity from the standard learning with errors (LWE) problem... As a key technical ingredient, we introduce a new notion of adaptive lattice encodings
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
the encoding of x is now c = s⊺ · A + r⊺ · (x⊺ ⊗ G) + e⊺ ... we are able to perform multiplications between (s, r)-encodings and (r, t)-encodings
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.