cover_image

Kurt Pan 密码周刊 (8)

Kurt Pan XPTY
2021年02月26日 00:00

Papers

  • Tensor Crypto

    • employed tensor core to accelerate NTRU/ The proposed tensor core based polynomial convolution technique was applied to NTRU public key scheme (TensorTRU)/ extended the implementation to other lattice-based cryptosystems that have a small modulus (LAC and two variant parameter sets in FrodoKEM)
    • https://eprint.iacr.org/2021/173.pdf
  • Smart Contracts for Incentivized Outsourcing of Computation

    • design an incentive mechanism that uses two lightweight response-checking protocols, and employ mone- tary reward, fine, and bounty to incentivize correct computation./ use game theory to model and analyze our mechanism, and prove that it has a single Nash equilibrium, corresponding to the contractors’ strategy of correctly computing the result.
    • https://eprint.iacr.org/2021/174.pdf
  • Attribute-Based Access Control for Inner Product Functional Encryption from LWE

    • designing the first construction for an attribute-based FE scheme in key-policy setting for inner products from well-studied Learning With Errors (LWE) assumption.
    • https://eprint.iacr.org/2021/178.pdf
  • Group Signatures with User-Controlled and Sequential Linkability

    • propose a new variant of group signatures that provides linkability in a flexible and user-centric manner.
    • https://eprint.iacr.org/2021/181.pdf
  • The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications

    • show that key-recovery attacks against the Legendre PRF are equivalent to solving a specific family of multivariate quadratic (MQ) equation system over a finite prime field.
    • https://eprint.iacr.org/2021/182.pdf
  • Efficient State Management in Distributed Ledgers

    • propose novel transaction optimization techniques to be followed by wallets, so as to create transactions that reduce the shared state cost
    • https://eprint.iacr.org/2021/183.pdf
  • Tight Security Bounds for Micali’s SNARGs

    • present a new analysis that achieves tight security bounds
    • https://eprint.iacr.org/2021/188.pdf
  • Does Fiat-Shamir Require a Cryptographic Hash Function?

    • https://eprint.iacr.org/2020/915.pdf
  • PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution

    • The security of QKD relies on the difficulty of the quantum state discrimination problem. / discover that the recent developments in PT symmetry can be used to expedite the quantum state discrimina- tion problem and therefore to attack the BB84 QKD scheme.
    • https://eprint.iacr.org/2021/191.pdf
  • Multitarget decryption failure attacks and their application to Saber and Kyber

    • improve the state-of-the-art multitarget failure boosting attacks. / then improve the cost calculation of failure boosting and extend the applicability of these calculations to permit cost calculations of real-world schemes.
    • https://eprint.iacr.org/2021/193.pdf
  • Compilation of Function Representations for Secure Computing Paradigms

    • introduces M-Circuits, a program representation which generalizes arithmetic and binary circuits./ show how this representation also allows one to construct zero knowledge proof (ZKP) systems based on the MPC-in-the-head paradigm.
    • https://eprint.iacr.org/2021/195.pdf
  • QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model

    • give a tighter security reduction for the transformation KC that turns OW-CPA secure deter- ministic PKEs into modified DS secure PKEs in the QROM./ use the Measure-Rewind-Measure One-Way to Hiding Lemma recently in- troduced by Kuchta et al. (EUROCRYPT 2020) to avoid the square-root advantage loss.
    • https://eprint.iacr.org/2021/196.pdf
  • Generic, Efficient and Isochronous Gaussian Sampling over the Integers

    • propose a secure, efficient exponential Bernoulli sampling algorithm. It can be applied to Gaussian samplers based on rejection samplings./develop a new Gaussian sampler based on rejection sam- pling./ improve the efficiency of the COSAC sampler (PQC’20).
    • https://eprint.iacr.org/2021/199.pdf
  • Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols

    • propose a novel MPC framework, Manticore, in the multiparty setting, with full threshold and semi-honest security model, supporting a combination of real number arithmetic (arithmetic shares), Boolean arithmetic (Boolean shares) and garbled circuits (Yao shares)./ introduce a novel highly efficient modular lifting/truncation method that stays in the arithmetic domain.
    • https://eprint.iacr.org/2021/200.pdf
  • Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP

    • study the binding property of the quantum string commitment scheme obtained by composing a generic quantum computationally-binding bit commitment scheme in parallel/ show that the resulting scheme satisfies a stronger quantum computational binding property than the trivial honest-binding, which we call predicate-binding.
    • https://eprint.iacr.org/2020/1510.pdf
  • A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

    • https://eprint.iacr.org/2020/1044.pdf

Posts & Videos

TitleLink
周小川:数字时代的中国支付体系现代化——DC/EP与数字人民币https://www.chaindd.com/3498726.html
What's a Tensor?https://www.youtube.com/watch?v=f5liqUk0ZTw
What is the tensor product, anyway?https://www.youtube.com/watch?v=q9bzrCKgax0
Elliptic Curves and Modular Formshttps://www.youtube.com/watch?v=grzFM5XciAY&t=365s
The Insolvability of the Quintichttps://www.youtube.com/watch?v=9aUsTlBjspE
安全归约入门之攻击的分类https://documents.uow.edu.au/~fuchun/jow/031-QKDYENZJS.pdf
安全归约入门之困难问题设计失误实例https://documents.uow.edu.au/~fuchun/jow/032-JKJKJKJK.pdf
安全归约入门之模拟的不可区分性https://documents.uow.edu.au/~fuchun/jow/033-OLKWUSWNS.pdf
Zcash halo2 背后技术衍化介绍https://blog.csdn.net/mutourend/article/details/114059130
zkSync and Redshift: Matter Labs updatehttps://www.zeroknowledge.fm/116
zkStudyClub: PCD without zkSNARKhttps://www.youtube.com/watch?v=TRyep--q6jU
IBM’s Roadmap For Scaling Quantum Technologyhttps://www.ibm.com/blogs/research/2020/09/ibm-quantum-roadmap/
IBM’s roadmap for building an open quantum software ecosystemhttps://www.ibm.com/blogs/research/2021/02/quantum-development-roadmap/
Double-Odd Elliptic Curveshttps://doubleodd.group/#double-odd-elliptic-curves
Cryptographic Wear-Out for Symmetric Encryptionhttps://soatok.blog/2020/12/24/cryptographic-wear-out-for-symmetric-encryption/

Resources & Events

  • arkworks: An ecosystem for developing and programming with zkSNARKs

    • https://github.com/arkworks-rs
  • Fundamental Research Vol 1 Issue 1: https://www.sciencedirect.com/journal/fundamental-research/vol/1/issue/1

  • Henry Yuen: Introduction to Quantum Computing

    • http://www.henryyuen.net/classes/spring2021/
  • Ph/CS 219A Quantum Computation

    • https://www.youtube.com/watch?v=w08pSFsAZvE&list=PL0ojjrEqIyPy-1RRD8cTD_lF1hflo89Iu



往期周刊回顾:

Kurt Pan 密码周刊 (7)

Kurt Pan 密码周刊 (6)

Kurt Pan 密码周刊 (5)

Kurt Pan 密码周刊 (4)

Kurt Pan 密码周刊 (3)

Kurt Pan 密码周刊 (2)

Kurt Pan 密码周刊 (1)



为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。

点击【阅读原文】👇可访问