cover_image

【论文速递】S&P 2024 (安全多方计算、零知识证明、门限签名、ORAM、PIR)

Kurt Pan XPTY
2024年05月24日 11:24

https://sp2024.ieee-security.org/program.html

MAY 20-23, 2024


  • SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
    Jelle Vos (Delft University of Technology), Mauro Conti (University of Padua), Zekeriya Erkin (Delft University of Technology)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a079/1RjEaO9q2ZO

  • GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
    Xingyu Xie (Tsinghua University; RealAI), Yifei Li (Tsinghua University), Wei Zhang (Tsinghua University), Tuowei Wang (Tsinghua University), Shizhen Xu (RealAI), Jun Zhu (Tsinghua University; RealAI), Yifan Song (Tsinghua University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a131/1Ub23P5FxFC

  • Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater
    Andreas Brüggemann (Technical University of Darmstadt, Germany), Oliver Schick (Technical University of Darmstadt, Germany), Thomas Schneider (Technical University of Darmstadt, Germany), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Hossein Yalame (Technical University of Darmstadt, Germany)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a164/1Ub24EZ8L2U

  • Scalable Mixed-Mode MPC
    Radhika (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a106/1Ub23erqzra

  • Asterisk: Super-fast MPC with a Friend
    Banashri Karmakar (Indian Institute of Science, Bangalore), Nishat Koti (Indian Institute of Science, Bangalore), Arpita Patra (Indian Institute of Science, Bangalore), Sikhar Patranabis (IBM Research - India), Protik Paul (Indian Institute of Science, Bangalore), Divya Ravi (Aarhus University), Sikhar Patranabis (IBM Research India)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a128/1Ub23LgEu3K

  • Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
    Wenhao Zhang (Northwestern University), Xiaojie Guo (Nankai University, State Key Laboratory of Cryptology), Kang Yang (State Key Laboratory of Cryptology), Ruiyu Zhu (No Affiliation), Yu Yu (Shanghai Jiao Tong University, Shanghai Qi Zhi Institute), Xiao Wang (Northwestern University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a192/1WPcYkyTGH6

  • MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
    Weihao Bai (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Long Chen (Institute of Software, Chinese Academy of Sciences), Qianwen Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Zhenfeng Zhang (Institute of Software, Chinese Academy of Sciences)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a157/1Ub24hrQXle

  • Orca: FSS-based Secure Training and Inference with GPUs
    Neha Jawalkar (Indian Institute of Science), Kanav Gupta (Microsoft Research), Arkaprava Basu (Indian Institute of Science), Nishanth Chandran (Microsoft Research), Divya Gupta (Microsoft Research), Rahul Sharma (Microsoft Research)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a063/1RjEaAAmAAE


  • Certifying Zero-Knowledge Circuits with Refinement Types
    Junrui Liu (University of California, Santa Barbara), Ian Kretz (The University of Texas at Austin), Hanzhi Liu (University of California, Santa Barbara / Veridise Inc.), Bryan Tan (Veridise Inc.), Jonathan Wang (Axiom), Yi Sun (Axiom), Luke Pearson (Polychain Capital), Anders Miltner (Simon Fraser University), Işıl Dillig (The University of Texas at Austin / Veridise Inc.), Yu Feng (University of California, Santa Barbara / Veridise Inc.)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a078/1RjEaNkBQIg

  • Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs. Post-Quantum ZK-SNARKs on a Browser
    Carmit Hazay (Ligero Inc.), Muthuramakrishnan Venkitasubramaniam (Ligero Inc.), Ruihan Wang (Ligero Inc.)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a086/1RjEaU3iZEY

  • Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
    Tianyi Liu (University of Illinois Urbana-Champaign), Tiancheng Xie (UC Berkeley), Jiaheng Zhang (UC Berkeley), Dawn Song (UC Berkeley), Yupeng Zhang (University of Illinois Urbana-Champaign), Tianyi Liu (Texas A&M University), Yupeng Zhang (Texas A&M University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a035/1RjEaaM09eU

  • Scalable Verification of Zero-Knowledge Protocols
    Miguel Isabel (Universidad Complutense de Madrid), Clara Rodrà­guez-Nàºñez (Universidad Complutense de Madrid), Albert Rubio (Universidad Complutense de Madrid)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a133/1Ub23QzVaWA

  • Efficient Zero-Knowledge Arguments For Paillier Cryptosystem
    Borui Gong (The Hong Kong Polytechnic University), Wang Fat Lau (The Hong Kong Polytechnic University), Man Ho Au (The Hong Kong Polytechnic University), Rupeng Yang (University of Wollongong), Haiyang Xue (The Hong Kong Polytechnic University), Lichun Li (Ant Group)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a093/1Ub231Cm86s

  • SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More
    Nan Wang (Australian National University and CSIRO's Data61), Sid Chi-Kin Chau (Australian National University and CSIRO's Data61), DongXi Liu (CSIRO's Data61), Nan Wang (Australian National University), Sid Chi-Kin Chau (Australian National University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a054/1RjEatoqLfi


  • hinTS: Threshold Signatures with Silent Setup
    Sanjam Garg (UC Berkeley and NTT Research), Abhishek Jain (JHU and NTT Research), Pratyay Mukherjee (Supra Research), Rohit Sinha (Swirlds Labs), Mingyuan Wang (UC Berkeley), Yinuo Zhang (UC Berkeley)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a057/1RjEavMBn8Y

  • Threshold ECDSA in Three Rounds
    Jack Doerner (Technion), Yashvanth Kondi (Aarhus University), abhi shelat (Northeastern University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a174/1V5U7ejLG6I

  • Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs
    Mayank Rathee (UC Berkeley), Yuwen Zhang (UC Berkeley), Henry Corrigan-Gibbs (MIT), Raluca Ada Popa (UC Berkeley)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a194/1WPcYm20VrO

  • Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference
    Sarabjeet Singh (University of Utah), Shreyas Singh (University of Utah), Sumanth Gudaparthi (University of Utah), Xiong Fan (Rutgers University), Rajeev Balasubramonian (University of Utah)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a107/1Ub23ff6ncs

  • Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption
    Xiaoguo LI (School of Computing and Information Systems, Singapore Management University, Singapore), Guomin Yang (School of Computing and Information Systems, Singapore Management University, Singapore), Tao Xiang (College of Computer Science, Chongqing University), Shengmin Xu (College of Computer and Cyber Security, Fujian Normal University), Bowen Zhao (Guangzhou Institute of Technology, Xidian University), HweeHwa Pang (School of Computing and Information Systems, Singapore Management University, Singapore), Robert H. Deng (School of Computing and Information Systems, Singapore Management University, Singapore)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a100/1Ub237QXNgk

  • SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
    Jean Paul Degabriele (Technology Innovation Institute), Jan Gilcher (ETH Zurich), Jérôme Govinden (Technical University of Darmstadt), Kenneth G. Paterson (ETH Zurich)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a132/1Ub23PQMXgk

  • Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length
    Jianning Zhang (College of Computer Science & Cyber Science, Nankai University), Ming Su (College of Computer Science & Cyber Science, Nankai University), Xiaoguang Liu (College of Computer Science & Cyber Science, Nankai University), Gang Wang (College of Computer Science & Cyber Science, Nankai University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a067/1RjEaDExPJS

  • CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
    Simon Jeanteur (TU Wien), Laura Kovács (TU Wien), Matteo Maffei (TU Wien), Michael Rawson (TU Wien)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a259/1WPcZjyX3MI


  • BULKOR: Enabling Bulk Loading for Path ORAM
    Xiang Li (Tsinghua University), Yunqian Luo (Tsinghua University), Mingyu Gao (Tsinghua University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a103/1Ub23aTrrDa

  • Distributed & Scalable Oblivious Sorting and Shuffling
    Nicholas Ngai (University of California, Berkeley), Ioannis Demertzis (University of California, Santa Cruz), Javad Ghareh Chamani (Hong Kong University of Science and Technology), Dimitrios Papadopoulos (The Hong Kong University of Science and Technology)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a153/1Ub24bi4tos

  • PIANO: Extremely Simple, Single-Server PIR with Sublinear Server Computation
    Mingxun Zhou (Carnegie Mellon University), Andrew Park (Carnegie Mellon University), Elaine Shi (Carnegie Mellon University), Wenting Zheng (Carnegie Mellon University

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a055/1RjEaufvKzm

  • PIRANA: Faster Multi-query PIR via Constant-weight Codes
    Jian Liu (Zhejiang University), Jingyu Li (Zhejiang University), Di Wu (Zhejiang University), Kui Ren (Zhejiang University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a039/1RjEae1OWIM

  • Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage
    Andrew Park (Carnegie Mellon University), Trevor Leong (Carnegie Mellon University), Francisco Maturana (Carnegie Mellon University), Wenting Zheng (Carnegie Mellon University), Rashmi Vinayak (Carnegie Mellon University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a168/1Ub24IZvLRm

  • More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR
    Tiantian Gong (Purdue University), Ryan Henry (University of Calgary), Alexandros Psomas (Purdue University), Aniket Kate (Purdue University / Supra Research)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a095/1Ub233fGVxu

  • Group Oblivious Message Retrieval
    Zeyu Liu (Yale University), Eran Tromer (Boston University), Yunhao Wang (Columbia University)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a115/1Ub23ocBmKI

  • PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
    Daniel Schadt (Karlsruhe Institute of Technology), Christoph Coijanovic (Karlsruhe Institute of Technology), Christiane Weis (NEC Labs Europe), Thorsten Strufe (Karlsruhe Institute of Technology)

https://www.computer.org/csdl/proceedings-article/sp/2024/313000a044/1RjEaiu0Ehy