Papers
MAKE: a Matrix Action Key Exchange
- public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices over Zp.
- https://eprint.iacr.org/2021/116.pdf
High-Threshold AVSS with Optimal Communication Complexity
- construct a dual-threshold AVSS protocol called Haven/ core component of Haven is a high-threshold AVSS scheme for small secrets based on polynomial commitments
- https://eprint.iacr.org/2021/118.pdf
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
- present a MPC protocol based on GC which is both actively secure and supports the free-XOR technique, and which has communication complexity O(n) per party.
- https://eprint.iacr.org/2021/120.pdf
Rabbit: Efficient Comparison for Secure Multi-Party Computation
- present a novel construction for general n- party private comparison, secure against an active adversary, in the dishonest majority setting.
- https://eprint.iacr.org/2021/119.pdf
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
- modification “BooLigero” tailors Ligero for use in Boolean circuits to achieve a significant improvement in proof size.
- https://eprint.iacr.org/2021/121.pdf
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
- first concretely efficient maliciously-secure multiparty PSI protocol.
- https://eprint.iacr.org/2021/122.pdf
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs
- transform the problem of finding the lower bound of queries into finding an optimal binary recovery tree (BRT), where the computations of the lower bounds become essentially the computations of certain Shannon entropy.
- https://eprint.iacr.org/2021/123.pdf
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
- present an efficient and fast implementation of NTT, inverse NTT (INTT) and NTT- based polynomial multiplication operations for GPU platforms.
- https://eprint.iacr.org/2021/124.pdf
Privacy Preserving and Resilient RPKI
- first distributed RPKI system, based on threshold signatures
- https://eprint.iacr.org/2021/125.pdf
Cuproof: A Novel Range Proof with Constant Size
- By combining inner-product and Lagrange’s four-square theorem, we structure a range proof scheme which is called Cuproof.The scheme of Cuproof is based on the scheme of Bulletproofs.
- https://eprint.iacr.org/2021/127.pdf
Lattice-based weak curve fault attack on ECDSA
- https://eprint.iacr.org/2021/129.pdf
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
- smartFHE framework allows users to build arbitrary decentralized applications that preserve input/output privacy for inputs belonging to the same user or even different users./ define notions for a privacy-preserving smart contract (PPSC) scheme along with its correctness and security.
- https://eprint.iacr.org/2021/133.pdf
Cryptanalysis of a code-based signature scheme without trapdoors
- implement an attack on the recent attempt by Li, Xing and Yeo to produce a code-based signature scheme using the Schnorr-Lyubashevsky approach in the Hamming metric.
- https://eprint.iacr.org/2021/134.pdf
Acyclicity Programming for Sigma-Protocols
- an alternative method for combining sigma-protocols into a single non-interactive system for a compound statement in the random oracle model. verifier complexity is linear in the size of the acyclicity program representation of P/additionally present an extension of our proof system, with verifier complexity linear in the monotone circuit size of P, in the common reference string model.
- https://eprint.iacr.org/2021/135.pdf
Classic McEliece Implementation with Low Memory Footprint
- an implementation of Classic McEliece on an ARM Cortex-M4 processor, optimized to overcome memory constraints.
- https://eprint.iacr.org/2021/138.pdf
Order-Fair Consensus in the Permissionless Setting
- initiate the investigation of order-fairness in the permissionless setting and provide two protocols that realize it.
- https://eprint.iacr.org/2021/139.pdf
Practical and Scalable Access Control Mechanism for the Internet of Things
- a new system with access control key updates and direct user revocation/ Access control is done using Ciphertext-Policy Attribute-Based Encryption where attributes represent roles of de- vices within their networks./ based on a binary tree, to append time credentials.
- https://eprint.iacr.org/2021/140.pdf
Advanced Lattice Sieving on GPUs, with Tensor Cores
- study GPU implementations of various state-of-the-art sieving algorithms for lattices (Becker-Gama-Joux 2015, Becker-Ducas-Gama-Laarhoven 2016, Herold-Kirshanova 2017) inside the General Sieve Kernel (G6K, Albrecht et al. 2019).
- https://eprint.iacr.org/2021/141.pdf
The Bitcoin Cash Backbone Protocol
- the first formal cryptographic analysis of Bitcoin Cash’s target recalculation functions against all possible adversaries./ analysis in the bounded-delay network model with dynamic participation of miners, of both ASERT and SMA
- https://eprint.iacr.org/2021/143.pdf
Posts/ Videos
| Title | Link |
|---|
| Recursive Zero-Knowledge Proofs: A Comprehensive Primer | https://www.michaelstraka.com/posts/recursivesnarks/ |
| Fast recursive arguments based on Plonk and Halo | https://mirprotocol.org/blog/Fast-recursive-arguments-based-on-Plonk-and-Halo |
| Security and Privacy for Crypto with Zero-Knowledge Proofs by Zooko Wilcox | https://a16z.com/2019/08/29/security-and-privacy-for-crypto-with-zero-knowledge-proofs/ |
| 【隐私计算笔谈】零知识证明系列专题(六):从QSP到QAP | https://mp.weixin.qq.com/s/kXXdvNhRvsdLpv1UUIACQw |
| 首个国产量子操作系统「本源司南」问世 | https://mp.weixin.qq.com/s/oAvsbE8NeGawbtDAvL1O-g |
| 如何理解平行宇宙/平行世界? | https://sspai.com/post/64855 |
Resources
- https://quantum-computing.ibm.com/
FOCS 2021: Call for Papers
- https://www.cs.yale.edu/homes/vishnoi/focs-2021-cfp.html
CFAIL 2021 : Call for Papers
- https://www.cfail.org/call-for-papers
The Sixth International Conference for Young Quantum Information Scientists (YQIS 6 or YQIS 2021) :
- https://indico.frib.msu.edu/event/31/
The 11th BIU Winter School on Cryptography: Cryptography in a Quantum World
- http://cyber.biu.ac.il/event/the-11th-biu-winter-school-on-cryptography/
往期回顾:
Kurt Pan 密码周刊 (5)
Kurt Pan 密码周刊 (4)
Kurt Pan 密码周刊 (3)
Kurt Pan 密码周刊 (2)
Kurt Pan 密码周刊 (1)
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问