本周ePrint上文章可谓是异彩纷呈,从这个时间点看,绝大部分上传的高质量有意思文章应该都是Asiacrypt 2021的录用文章。
Post-Quantum Signal Key Agreement with SIDH
Interhead Hydra Two Heads are Better than One
Simple Constructions from (Almost) Regular One-Way Functions
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing
()-indistinguishable Mixing for Cryptocurrencies
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
The irreducible vectors of a lattice: Some theory and applications
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
Efficient Perfectly Secure Computation with Optimal Resilience
Non-Malleable Vector Commitments via Local Equivocability
On Actively-Secure Elementary MPC Reductions
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness
Elliptic Curve Fast Fourier Transform (ECFFT) Part I: Fast Polynomial Algorithms over all Finite Fields
Algebraic Adversaries in the Universal Composability Framework
Towards Tight Adaptive Security of Non-Interactive Key Exchange
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
Simple, Fast Malicious Multiparty Private Set Intersection
Fault-enabled chosen-ciphertext attacks on Kyber
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Trojan-Resilience without Cryptography
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Direct Product Hardness Amplification
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Blockchains Enable Non-Interactive MPC
Policy-Compliant Signatures
Hierarchical Integrated Signature and Encryption
Quantum Linearization Attacks
Count Me In! Extendability for Threshold Ring Signatures
Shuffling Public Keys (A Peer-to-peer Voting Algorithm)
Non-Interactive Differentially Anonymous Router
Syndrome Decoding Estimator
Astrolabous: A Universally Composable Time-Lock Encryption Scheme
A Geometric Approach to Linear Cryptanalysis
Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
Efficient NIZKs for Algebraic Sets
EasyPQC: Verifying Post-Quantum Cryptography
Vector and Functional Commitments from Lattices
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Oblivious Messsage Retrieval
Bit Security as Computational Cost for Winning Games with High Probability
Parallel Repetition of -Special-Sound Multi-Round Interactive Proofs
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Reverse Firewalls for Adaptively Secure MPC without Setup
Transparency Dictionaries with Succinct Proofs of Correct Operation
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Special Soundness in the Random Oracle Model
Tight Quantum Indifferentiability of a Rate-1/3 Compression Function
Simulation-Based Bi-Selective Opening Security for Public Key Encryption
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Efficient CCA Timed Commitments in Class Groups
A note on a Claim of Eldar & Hallgren: LLL already solves it
https://www.sac2021.ca/home
| Posts |
|---|
| Infinity Category Theory Offers a Bird’s-Eye View of Mathematics |
| 被黑 6.1 亿美金的 Poly Network 事件分析与疑难问答 |
| 安全多方计算学习路线 |
| 西电网信院陈晓峰教授团队研究成果被亚密会ASIACRYPT 2021录用 |
| 安全多方计算开源框架梳理 |
| 安全多方计算:理论、实践与应用 |
| 上海交通大学2021教书育人奖候选人展示-龙环 |
| 初识安全多方计算 |
| What does the work "An Efficient Quantum Algorithm for Lattice Problems Achieving Subexponential Approximation Factor" mean? |
| 格理论进阶之格困难问题 |
| 深入探索比特币的安全模型(上) |
| 深入探索比特币的安全模型(下) |
| GPSW06 KP-ABE 简介 |
| Videos |
|---|
| Donald Knuth: Programming, Algorithms, Hard Problems & the Game of Life |
| Post-Quantum Designated-Verifier zkSNARKs from Lattices |
| Elliptic Curve Fast Fourier Transform (ECFFT) |
| An Efficient Quantum Algorithm for Lattice Problems Achieving Subexponential Approximation Factor |
| Panel on Lattice Algorithms and Cryptography |
https://github.com/adria0/plonk-by-fingers
https://github.com/taurusgroup/multi-party-sig
https://github.com/data61/MP-SPDZ
SAC 2021 Summer School
SAC 2021

it looks like the special problem the authors address is classically easy to solve using known techniques (no quantum needed). Moreover, their core new quantum step can instead be implemented classically (and much more simply and effectively) as well. So, the work doesn’t show any quantum advantage versus what we already knew how to do classically, nor anything new about what we can do classically.
-- Chris Peikert
往期周刊回顾:
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问