cover_image

Kurt Pan 密码周刊 (7)

Kurt Pan XPTY
2021年02月19日 00:00

Papers

  • A Security Framework for Distributed Ledgers

    • proposing the first framework for defining and analyzing the security of general distributed ledgers, with an ideal distributed ledger functionality, called F_ledger/ F_ledger is capable of precisely modeling also non-blockchain distributed ledgers by performing the first formal security analysis of such a distributed ledger, namely the prominent Corda protocol.
    • https://eprint.iacr.org/2021/145.pdf
  • Boolean Functions from Affine Functionals

    • the problem of evaluating boolean functions through affine-linear arithmetic functionals. show that each subset of the discrete unit cube admits an exact covering by affine hyperplanes/study the concrete construction of compact coverings, and provide new geometric algo- rithms.
    • https://eprint.iacr.org/2021/146.pdf
  • IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols

    • framework, Interactive Probabilistic Dependency Logic (IPDL), for reasoning about a certain well-behaved subset of cryptographic protocols.
    • https://eprint.iacr.org/2021/147.pdf
    • https://github.com/ipdl/ipdl
  • On methods of shortening ElGamal-type signatures

    • propose three methods of shortening signatures (for any ElGamal-type schemes such as ECDSA, GOST and SM2) and analyze how applying these methods affects the security
    • https://eprint.iacr.org/2021/148.pdf
  • Quantum Security of the Legendre PRF

    • study the security of the Legendre PRF against quantum attackers, given classical queries only, and without quantum random-access memories. We give two algorithms that recover the key of a shifted Legendre symbol with unknown shift, with a complexity smaller than exhaustive search of the key.
    • https://eprint.iacr.org/2021/149.pdf
  • Two-Party Adaptor Signatures From Identification Schemes

    • show that signature schemes that are con- structed from identification (ID) schemes, which additionally satisfy certain homomorphic properties, can generically be transformed into adaptor signature schemes./ provide an impossibility result which proves that unique signature schemes (e.g., the BLS scheme) cannot be transformed into an adaptor signature scheme./ define two-party adaptor signature schemes with aggregatable public keys and show how to instantiate them via a generic transformation from ID-based signature schemes./ give instantiations of our generic transformations for the Schnorr, Katz-Wang and Guillou-Quisquater signature schemes.
    • https://eprint.iacr.org/2021/150.pdf
  • On Sufficient Oracles for Secure Computation with Identifiable Abort

    • show that for t ≤ n − 2 corruptions, oracles that return output to n − 1 parties are sufficient to obtain information-theoretically secure computation with identifiable abort./ introduce a new kind of secret sharing scheme which we call unanimously identifiable secret sharing with public and private shares (UISSwPPS)
    • https://eprint.iacr.org/2021/151.pdf
  • Hybrid Dual Attack on LWE with Arbitrary Secrets

    • study the hybrid dual attack over LWE problems for any secret distribution./shows that a hybrid dual attack can outperform a standalone dual attack, regardless of the secret distribution.
    • https://eprint.iacr.org/2021/152.pdf
  • On the Isogeny Problem with Torsion Point Information

    • present a more general reduction algorithm that generalises to all SIDH-type schemes. The main idea of our algorithm is to exploit available torsion point images together with the KLPT algorithm to obtain a linear system of equations over a certain residue class ring. Lifting the solution of this linear system yields the secret isogeny.
    • https://eprint.iacr.org/2021/153.pdf
  • Closed Timelike Curves Make Quantum and Classical Computing Equivalent

    • show that if CTCs existed, then quantum computers would be no more powerful than classical computers: both would have the (extremely large) power of the complexity class PSPACE
    • https://arxiv.org/pdf/0808.2669.pdf
  • Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware

    • proposes optimized designs for FrodoKEM, concentrating on high throughput by parallelising the matrix multiplication operations/ use of Trivium
    • https://eprint.iacr.org/2021/155.pdf
  • Mechanized Proofs of Adversarial Complexity and Application to Universal Composability

    • enhance the EasyCrypt proof assistant to reason about computational complexity of adversaries/ key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations/ present a new formalization of Universal Composability (UC)
    • https://eprint.iacr.org/2021/156.pdf
  • hbACSS: How to Robustly Share Many Secrets

    • a suite of optimal-resilience asynchronous complete secret sharing protocols that are (quasi)linear in both computation and communication overhead.
    • https://eprint.iacr.org/2021/159.pdf
  • Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance

    • An adaptively-secure variant of the efficient, selectively-secure LWE-based IBE scheme of Agrawal, Boneh, and Boyen (EUROCRYPT 2010). /Adaptively-secure variants of two efficient selectively-secure pairing-based IBEs of Boneh and Boyen (EUROCRYPT 2004). /A very efficient adaptively-secure verifiable random function
    • https://eprint.iacr.org/2021/160.pdf
  • Generic Adaptor Signature

    • propose the first generic construction of adaptor sig- natures which is compatible with different signature schemes
    • https://eprint.iacr.org/2021/161.pdf
  • Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity

    • VCBF can be viewed as a “space” analog of a verifiable delay function./ propose the first VCBF construction relying on evaluating a degree-d polynomial f from Fp[x] at a random point.
    • https://eprint.iacr.org/2021/162.pdf
  • CNF-FSS and its Applications

    • Function Secret Sharing (FSS)/ CNF-FSS, where the scheme uses the CNF version of secret sharing (rather than additive sharing) to share each value f(x)
    • https://eprint.iacr.org/2021/163.pdf
  • Composition with Knowledge Assumptions

    • present a formal model allowing the composition of knowledge assumptions./ providing the first instance of a simultaneously succinct and composable zk-SNARK
    • https://eprint.iacr.org/2021/165.pdf
  • Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS

    • propose a full key mismatch attack on NTRU- HRSS
    • https://eprint.iacr.org/2021/168.pdf
  • Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials

    • Isomorphism of polynomials with two secrets (IP2S) problem/ block isomorphism of polynomials with circulant matrices (BIPC) problem
    • https://eprint.iacr.org/2021/169.pdf
  • Fully Anonymous Group Signature with Verifier-Local Revocation

    • VLR-GS/ show the construction of a fully anonymous VLR-GS scheme from a digital signature scheme, a key-private public key encryption scheme, and a non-interactive zero-knowledge proof system
    • https://eprint.iacr.org/2021/170.pdf
  • Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI

    • two important variants of mPSI - circuit PSI (that allows the parties to compute a function over the intersection set without revealing the intersection itself) and quorum PSI (that allows P1 to learn all the elements in his/her set that are present in at least k other sets)
    • https://eprint.iacr.org/2021/172.pdf

Posts & Videos

TitleLink
On BDD with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problemhttps://martinralbrecht.wordpress.com/2020/12/10/on-bdd-with-predicate-breaking-the-lattice-barrier-for-the-hidden-number-problem/
PQShield's Quantum Threat White Paper Serieshttps://pqshield.com/quantum-threat/
Unifying Compiler Infrastructure for SNARKs, SMTs, & Morehttps://www.youtube.com/watch?v=MzWHml9hRn4
Halo Infinitehttps://www.youtube.com/watch?v=TydI5xJlhqQ&t=3s
Real World Cryptographers Podcast : Yuval Ishaihttps://www.buzzsprout.com/1393207/7860298

Resources & Events

  • Lecture Slides of Guo Fuchun's book Introduction to Security Reduction: https://documents.uow.edu.au/~fuchun/book.html

  • 卧村密码学报

    • https://documents.uow.edu.au/~fuchun/jow.html
  • THE CAIRO GAMES

    • https://www.cairo-lang.org/the-cairo-games/
    • Vol 1.0 Coming Feb 18th
  • USENIX Security '22 Preliminary Call for Papers

    • https://www.usenix.org/conference/usenixsecurity22/call-for-papers
  • Diversity in Quantum Computing Conference

    • https://www.qubitbyqubit.org/conference
    • February 27,2021
  • Quantum Software and Optimisation online workshop

    • https://www.chalmers.se/en/centres/wacqt/calendar/Pages/ttp-qs.aspx
    • 8th April
  • Third PQC Standardization Conference

    • https://www.nist.gov/news-events/events/third-pqc-standardization-conference
    • Conference Dates:  June 7-9, 2021

The 11th BIU Winter School on Cryptography: Cryptography in a Quantum World

http://cyber.biu.ac.il/event/the-11th-biu-winter-school-on-cryptography/

  • Nir Bitansky & Zvika Brakerski: School Overview
  • Henry Yuen: Crash Course in Quantum Computing
  • Rotem Arnon-Friedman: Quantum Key-Distribution
  • Mark Zhandry: Security Reductions
  • Thomas Vidick: Delegation of Quantum Computations
  • Mark Zhandry: Quantum Random Oracle
  • Alex Grilo: Quantum ZK + MPC




往期周刊回顾:

Kurt Pan 密码周刊 (6)

Kurt Pan 密码周刊 (5)

Kurt Pan 密码周刊 (4)

Kurt Pan 密码周刊 (3)

Kurt Pan 密码周刊 (2)

Kurt Pan 密码周刊 (1)



为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。

点击【阅读原文】👇可访问