cover_image

Kurt Pan 密码周刊 (48)

Kurt Pan XPTY
2021年12月03日 00:00

1Posts & Books

2Videos & Podcasts

  • What is the square root of two? | The Fundamental Theorem of Galois Theory
  • The Guy Who Figured Out How Snowflakes Work
  • Radia Perlman's Keynote "My Career Journey and Lessons Learned Along the Way" at ACM CCS iMentor '21
  • ZK HACK #6 - Aleo Workshop Part 2 - Leo the circuit compiler: the why and the what
  • A Theory of DeFi? (Keynote talk at the 2021 ACM CCS Workshop on Decentralized Finance and Security)

3Projects & Docs

  • Pathfinder: A StarkNet full node written in Rust.
  • gitcoin
  • Mirror: Create anything from a web3 blog

4Papers & Conferences

  • The Acrobatics of BQP
  • Disentangling Decentralized Finance (DeFi) Compositions
  • Information Dispersal with Provable Retrievability for Rollups
  • Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint
  • SoK: Plausibly Deniable Storage
  • Just how hard are rotations of ? Algorithms and cryptography with the simplest lattice
  • Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
  • Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability
  • Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems
  • Facial Template Protection via Lattice-based Fuzzy Extractors
  • Quantum Time/Memory/Data Tradeoff Attacks
  • Concurrently Composable Non-Interactive Secure Computation
  • Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
  • Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
  • Can Round-Optimal Lattice-Based Blind Signatures be Practical?
  • Towards Using Blockchain Technology to Prevent Diploma Fraud

ACISP 2021

  • Practical Lattice-Based Zero-Knowledge Proofs and Applications by Ron Steinfeld
  • Resource Based Multiparty Protocols - Decentralizing Information Technology by Aggelos Kiayias
  • A Trustless GQ Multi-Signature Scheme with Identifiable Abort
  • Transparency or Anonymity Leak : Monero Mining Pools Data Publication
  • Concise Mercurial Subvector Commitments: Definitions and Constructions
  • Redactable Transactions in Consortium Blockchain: Controlled by Multi-Authority CP-ABE
  • Efficient Unique Ring Signature for Blockchain Privacy Protection
  • A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
  • Anonymous Lattice Identity-Based Encryption with Traceable Identities
  • Forward-Secure Group Encryptions from Lattices
  • Puncturable Identity-based Encryption from Lattices
  • CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
  • Security Analysis of End-to-End Encryption for Zoom Meetings
  • An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
  • Broadcast Authenticated Encryption with Keyword Search
  • Small Superset and Big Subset Obfuscation
  • Updatable Trapdoor SPHFs
  • Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
  • Leakage Resilient Cheating Detectable Secret Sharing Schemes

Asiacrypt 2021

  • Probabilistic Reasoning in Cryptography and Machine Learning by Andrew Yao
  • Learning Parity with Noise: Constructions, Reductions, and Analyses by Yu Yu
  • On the hardness of the NTRU problem
  • Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
  • Gladius: LWR based efficient hybrid public key encryption with distributed decryption
  • Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
  • Shorter Lattice-Based Group Signatures via  ''Almost Free'' Encryption and Other Optimizations
  • Séta: Supersingular Encryption from Torsion Attacks
  • SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
  • Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials
  • Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH
  • Bit Security as Computational Cost for Winning Games with High Probability
  • Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
  • How to Build a Trapdoor Function from an Encryption Scheme
  • Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
  • Batching Base Oblivious Transfers
  • Algebraic Adversaries in the Universal Composability Framework
  • Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
  • Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
  • Public Key Encryption with Flexible Pattern Matching
  • Bounded Collusion ABE for TMs from IBE
  • Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
  • (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
  • Boosting the Security of Blind Signature Schemes
  • On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
  • Redeeming Reset Indifferentiability and Applications to Post-Quantum Security
  • Franchised Quantum Money
  • Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
  • Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
  • Tight adaptive reprogramming in the QROM
  • On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups
  • Astrolabous: A Universally Composable Time Lock Encryption Scheme
  • Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
  • Simulation-Based Bi-Selective Opening Security for Public Key Encryption
  • Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness
  • Hierarchical Integrated Signature and Encryption
  • Revisiting Homomorphic Encryption Schemes for Finite Fields
  • Transciphering Framework for Approximate Homomorphic Encryption
  • Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
  • Gentry-Wichs Is Tight: A Falsifiable Non-Adaptively Sound SNARG
  • Proofs for Inner Pairing Products and Applications
  • Snarky Ceremonies
  • Efficient NIZKs for Algebraic Sets
  • PrORAM: Fast O(log n) Authenticated Shares ZK ORAM
  • Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
  • Promise -protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
  • The One-More Discrete Logarithm Assumption in the Generic Group Model
  • Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
  • Chain Reductions for Multi-Signatures and the HBMS Scheme
  • NTRU Fatigue: How Stretched is Overstretched?
  • Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS
  • Lattice sieving via quantum random walks
  • A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
  • Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions
  • Onion Routing with Replies
  • Private Join and Compute from PIR with Default
  • Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures
  • ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
  • Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite

5Upcoming Events

  • ZK Jobs Fair #5 (with ZK Hack Party) Fri, December 3, 2021 2:00 AM – 5:00 AM CST
  • 2021第十四届中国密码学会年会(ChinaCrypt 2021) 12月4日—5日
  • Asiacrypt 2021 December 6-10
  • The 12th BIU Winter School on Cryptography: Advances in Secure Computation January 23-26, 2022
  • StarkNet Ecosystem Summit 2022 Thu, Jan 27, 2022, 9:00 AM – Fri, Jan 28, 2022, 6:00 PM PST
  • PRIVACY-ENHANCING TECHNOLOGY SUMMIT EUROPE ZURICH, SWITZERLAND 4-6 APRIL, 2022



往期周刊回顾:

Kurt Pan 密码周刊 (47)

Kurt Pan 密码周刊 (46)

Kurt Pan 密码周刊 (45)

Kurt Pan 密码周刊 (44)

Kurt Pan 密码周刊 (43)

Kurt Pan 密码周刊 (42)

Kurt Pan 密码周刊 (41)

Kurt Pan 密码周刊往期回顾 (31-40)

Kurt Pan 密码周刊往期回顾 (20-30)

Kurt Pan 密码周刊往期回顾(11-20)

Kurt Pan 密码周刊往期回顾 (1-10)



为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。

点击【阅读原文】👇可访问