cover_image

【論文速遞】Eurocrypt'25(公鑰密碼學、密鑰協商、高級方案、證明和零知識、理論基礎、真實世界密碼學)

Kurt Pan XPTY
2025年05月04日 07:13

https://eurocrypt.iacr.org/2025/

May 4-8, 2025-- Madrid, Spain

Public-Key Cryptography and Key-Exchange

  • Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN https://link.springer.com/chapter/10.1007/978-3-031-91124-8_1 Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Tauman Kalai, Vinod Vaikuntanathan
  • Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-Type Encryption https://link.springer.com/chapter/10.1007/978-3-031-91124-8_2 Benoît Libert
  • Post-quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich’s LPN https://link.springer.com/chapter/10.1007/978-3-031-91124-8_3 Riddhi Ghosal, Aayush Jain, Paul Lou, Amit Sahai, Neekon Vafa
  • POKÉ: A Compact and Efficient PKE from Higher-Dimensional Isogenies https://link.springer.com/chapter/10.1007/978-3-031-91124-8_4 Andrea Basso, Luciano Maino
  • Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions https://link.springer.com/chapter/10.1007/978-3-031-91124-8_5 Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Gang Tang, Yanbin Pan et al.
  • A Reduction from Hawk to the Principal Ideal Problem in a Quaternion Algebra https://link.springer.com/chapter/10.1007/978-3-031-91124-8_6 Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet
  • Cryptanalysis of Rank-2 Module-LIP: A Single Real Embedding Is All It Takes https://link.springer.com/chapter/10.1007/978-3-031-91124-8_7 Bill Allombert, Alice Pellet-Mary, Wessel van Woerden
  • Do Not Disturb a Sleeping Falcon https://link.springer.com/chapter/10.1007/978-3-031-91124-8_8 Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
  • (Un)breakable Curses - Re-encryption in the Fujisaki-Okamoto Transform https://link.springer.com/chapter/10.1007/978-3-031-91124-8_9 Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni
  • Generic Anamorphic Encryption, Revisited: New Limitations and Constructions https://link.springer.com/chapter/10.1007/978-3-031-91124-8_10 Dario Catalano, Emanuele Giunta, Francesco Migliaro
  • Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security https://link.springer.com/chapter/10.1007/978-3-031-91124-8_11 Renas Bacho, Sourav Das, Julian Loss, Ling Ren
  • Stronger Security for Threshold Blind Signatures https://link.springer.com/chapter/10.1007/978-3-031-91124-8_12 Anja Lehmann, Phillip Nazarian, Cavit Özbay
  • Non-interactive Blind Signatures from RSA Assumption and More https://link.springer.com/chapter/10.1007/978-3-031-91124-8_13 Lucjan Hanzlik, Eugenio Paracucchi, Riccardo Zanotto
  • PAKE Combiners and Efficient Post-quantum Instantiations https://link.springer.com/chapter/10.1007/978-3-031-91124-8_14 Julia Hesse, Michael Rosenberg
  • Hybrid Password Authentication Key Exchange in the UC Framework https://link.springer.com/chapter/10.1007/978-3-031-91124-8_15 You Lyu, Shengli Liu
  • Under What Conditions Is Encrypted Key Exchange Actually Secure? https://link.springer.com/chapter/10.1007/978-3-031-91124-8_16 Jake Januzelli, Lawrence Roy, Jiayu Xu

Advanced Cryptographic Schemes

  • Multi-authority Registered Attribute-Based Encryption https://link.springer.com/chapter/10.1007/978-3-031-91131-6_1 George Lu, Brent Waters, David J. Wu
  • Almost Optimal KP and CP-ABE for Circuits from Succinct LWE https://link.springer.com/chapter/10.1007/978-3-031-91131-6_2 Hoeteck Wee
  • Universal Computational Extractors and Multi-Bit AIPO from Lattice Assumptions https://link.springer.com/chapter/10.1007/978-3-031-91131-6_3 Yilei Chen, Xinyu Mao
  • Faster ABE for Turing Machines from Circular Evasive LWE https://link.springer.com/chapter/10.1007/978-3-031-91131-6_4 Valerio Cini, Hoeteck Wee
  • Snake-Eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption https://link.springer.com/chapter/10.1007/978-3-031-91131-6_5 Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang
  • Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications https://link.springer.com/chapter/10.1007/978-3-031-91131-6_6 Yaohua Ma, Chenxin Dai, Elaine Shi
  • On Quantum Money and Evasive Obfuscation https://link.springer.com/chapter/10.1007/978-3-031-91131-6_7 Mark Zhandry
  • A Simple Framework for Secure Key Leasing https://link.springer.com/chapter/10.1007/978-3-031-91131-6_8 Fuyuki Kitagawa, Tomoyuki Morimae, Takashi Yamakawa
  • Quantum Key Leasing for PKE and FHE with a Classical Lessor https://link.springer.com/chapter/10.1007/978-3-031-91131-6_9 Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu
  • Secret Sharing with Publicly Verifiable Deletion https://link.springer.com/chapter/10.1007/978-3-031-91131-6_10 Jonathan Katz, Ben Sela
  • Optimal Traitor Tracing from Pairings https://link.springer.com/chapter/10.1007/978-3-031-91131-6_11 Mark Zhandry
  • A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model https://link.springer.com/chapter/10.1007/978-3-031-91131-6_12 Yao-Ching Hsieh, Brent Waters, David J. Wu
  • Fully Homomorphic Encryption for Cyclotomic Prime Moduli https://link.springer.com/chapter/10.1007/978-3-031-91131-6_13 Robin Geelen, Frederik Vercauteren
  • SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm https://link.springer.com/chapter/10.1007/978-3-031-91131-6_14 Jung Hee Cheon, Guillaume Hanrot, Jongmin Kim, Damien Stehlé
  • Anamorphism Beyond One-to-One Messaging: Public-Key with Anamorphic Broadcast Mode https://link.springer.com/chapter/10.1007/978-3-031-91131-6_15 Xuan Thanh Do, Giuseppe Persiano, Duong Hieu Phan, Moti Yung

(Non-)Interactive Proofs and Zero-Knowledge

  • New Techniques for Preimage Sampling: Improved NIZKs and More from LWE https://link.springer.com/chapter/10.1007/978-3-031-91134-7_1 Brent Waters, Hoeteck Wee, David J. Wu
  • Unique NIZKs and Steganography Detection https://link.springer.com/chapter/10.1007/978-3-031-91134-7_2 Willy Quach, LaKyah Tyner, Daniel Wichs
  • Black-Box Non-interactive Zero Knowledge from Vector Trapdoor Hash https://link.springer.com/chapter/10.1007/978-3-031-91134-7_3 Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, Akshayaram Srinivasan
  • Succinct Arguments over Towers of Binary Fields https://link.springer.com/chapter/10.1007/978-3-031-91134-7_4 Benjamin E. Diamond, Jim Posen
  • Blaze: Fast SNARKs from Interleaved RAA Codes https://link.springer.com/chapter/10.1007/978-3-031-91134-7_5 Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, Hadas Zeilberger
  • SNARKs for Virtual Machines Are Non-malleable https://link.springer.com/chapter/10.1007/978-3-031-91134-7_6 Matteo Campanelli, Antonio Faonio, Luigi Russo
  • Malleable SNARKs and Their Applications https://link.springer.com/chapter/10.1007/978-3-031-91134-7_7 Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi
  • WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification https://link.springer.com/chapter/10.1007/978-3-031-91134-7_8 Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
  • Instance Compression, Revisited https://link.springer.com/chapter/10.1007/978-3-031-91134-7_9 Gal Arnon, Shany Ben-David, Eylon Yogev
  • (Inefficient Prover) ZAPs from Hard-to-Invert Functions https://link.springer.com/chapter/10.1007/978-3-031-91134-7_10 Marshall Ball, Dana Dachman-Soled
  • Polocolo: A ZK-Friendly Hash Function Based on S-Boxes Using Power Residues https://link.springer.com/chapter/10.1007/978-3-031-91134-7_11 Jincheol Ha, Seongha Hwang, Jooyoung Lee, Seungmin Park, Mincheol Son
  • Query-Reusable Proof Systems https://link.springer.com/chapter/10.1007/978-3-031-91134-7_12 Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Rafail Ostrovsky, Akash Shah
  • Zero-Knowledge RAM: Doubly Efficient and Black-Box https://link.springer.com/chapter/10.1007/978-3-031-91134-7_13 Yuval Ishai, Rafail Ostrovsky, Akash Shah
  • Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs https://link.springer.com/chapter/10.1007/978-3-031-91134-7_14 Amit Agarwal, Carsten Baum, Lennart Braun, Peter Scholl
  • Relaxed Vector Commitment for Shorter Signatures https://link.springer.com/chapter/10.1007/978-3-031-91134-7_15 Seongkwang Kim, Byeonghak Lee, Mincheol Son

Theoretical Foundations

  • Oracle Separation Between Quantum Commitments and Quantum One-Wayness https://link.springer.com/chapter/10.1007/978-3-031-91098-2_1 John Bostanci, Boyang Chen, Barak Nehoran
  • A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID https://link.springer.com/chapter/10.1007/978-3-031-91098-2_2 Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, Takashi Yamakawa
  • Hard Quantum Extrapolations in Quantum Cryptography https://link.springer.com/chapter/10.1007/978-3-031-91098-2_3 Luowen Qian, Justin Raizes, Mark Zhandry
  • A Meta-complexity Characterization of Quantum Cryptography https://link.springer.com/chapter/10.1007/978-3-031-91098-2_4 Bruno P. Cavalar, Eli Goldin, Matthew Gray, Peter Hall
  • The Power of a Single Haar Random State: Constructing and Separating Quantum Pseudorandomness https://link.springer.com/chapter/10.1007/978-3-031-91098-2_5 Boyang Chen, Andrea Coladangelo, Or Sattath
  • Pseudorandomness in the (Inverseless) Haar Random Oracle Model https://link.springer.com/chapter/10.1007/978-3-031-91098-2_6 Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
  • Verifiable Random Function from the Deuring Correspondence and Higher Dimensional Isogenies https://link.springer.com/chapter/10.1007/978-3-031-91098-2_7 Antonin Leroux
  • Exponent-VRFs and Their Applications https://link.springer.com/chapter/10.1007/978-3-031-91098-2_8 Dan Boneh, Iftach Haitner, Yehuda Lindell, Gil Segev
  • Good Things Come to Those Who Wait https://link.springer.com/chapter/10.1007/978-3-031-91098-2_9 Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron
  • Leap: A Fast, Lattice-Based OPRF with Application to Private Set Intersection https://link.springer.com/chapter/10.1007/978-3-031-91098-2_10 Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger
  • Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval https://link.springer.com/chapter/10.1007/978-3-031-91098-2_11 Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng
  • Distributed Randomness Using Weighted VUFs https://link.springer.com/chapter/10.1007/978-3-031-91098-2_12 Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang
  • A New Approach to Generic Lower Bounds https://link.springer.com/chapter/10.1007/978-3-031-91098-2_13 Minki Hhan
  • Fine-Grained Complexity in a World Without Cryptography https://link.springer.com/chapter/10.1007/978-3-031-91098-2_14 Josh Alman, Yizhi Huang, Kevin Yeo
  • Succinct Randomized Encodings from Laconic Function Evaluation, Faster and Simpler https://link.springer.com/chapter/10.1007/978-3-031-91098-2_15 Nir Bitansky, Rachit Garg
  • BitGC: Garbled Circuits with 1 Bit per Gate https://link.springer.com/chapter/10.1007/978-3-031-91098-2_16 Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu

Real-World Cryptography

  • A Generic Framework for Side-Channel Attacks Against LWE-Based Cryptosystems https://link.springer.com/chapter/10.1007/978-3-031-91101-9_1 Julius Hermelink, Silvan Streit, Erik Mårtensson, Richard Petri
  • INDIANA - Verifying (Random) Probing Security Through Indistinguishability Analysis https://link.springer.com/chapter/10.1007/978-3-031-91101-9_2 Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann et al.
  • Physical-Bit Leakage Resilience of Linear Code-Based Secret Sharing https://link.springer.com/chapter/10.1007/978-3-031-91101-9_3 Hai H. Nguyen
  • New Techniques for Random Probing Security and Application to Raccoon Signature Scheme https://link.springer.com/chapter/10.1007/978-3-031-91101-9_4 Sonia Belaïd, Matthieu Rivain, Mélissa Rossi
  • Tighter Security Notions for a Modular Approach to Private Circuits https://link.springer.com/chapter/10.1007/978-3-031-91101-9_5 Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
  • Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices https://link.springer.com/chapter/10.1007/978-3-031-91101-9_6 Jai Hyun Park
  • Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes https://link.springer.com/chapter/10.1007/978-3-031-91101-9_7 Olivier Bernard, Marc Joye, Nigel P. Smart, Michael Walter
  • Analysis of the Telegram Key Exchange https://link.springer.com/chapter/10.1007/978-3-031-91101-9_8 Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs
  • Formal Analysis of Multi-device Group Messaging in WhatsApp https://link.springer.com/chapter/10.1007/978-3-031-91101-9_9 Martin R. Albrecht, Benjamin Dowling, Daniel Jones
  • Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix https://link.springer.com/chapter/10.1007/978-3-031-91101-9_10 Joseph Jaeger, Akshaya Kumar
  • Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol https://link.springer.com/chapter/10.1007/978-3-031-91101-9_11 Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt
  • The 2Hash OPRF Framework and Efficient Post-quantum Instantiations https://link.springer.com/chapter/10.1007/978-3-031-91101-9_12 Ward Beullens, Lucas Dodgson, Sebastian Faller, Julia Hesse
  • Hollow LWE: A New Spin https://link.springer.com/chapter/10.1007/978-3-031-91101-9_13 Martin R. Albrecht, Benjamin Benčina, Russell W. F. Lai
  • Key Derivation Functions Without a Grain of Salt https://link.springer.com/chapter/10.1007/978-3-031-91101-9_14 Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther