cover_image

【论文速递】S&P'25 (门限后量子密码学、零知识证明、密钥和口令、区块链)

Kurt Pan XPTY
2025年05月19日 08:00

MAY 12-15, 2025

SAN FRANCISCO, CA

https://sp2025.ieee-security.org/program.html

Threshold and Post-Quantum Cryptography

  • Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors pp. 149-164 by Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi https://www.computer.org/csdl/proceedings-article/sp/2025/223600a070/21B7Re2GxzO
  • Groundhog: A Restart-based Systems Framework for Increasing Availability in Threshold Cryptosystems pp. 165-183 by Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri https://www.computer.org/csdl/proceedings-article/sp/2025/223600a056/21B7R2Aua8o
  • Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More pp. 184-202 by The Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau https://www.computer.org/csdl/proceedings-article/sp/2025/223600a184/26hiTyJTFjG
  • Robust Threshold ECDSA with Online-Friendly Design in Three Rounds pp. 203-221 by Guofeng Tang, Haiyang Xue https://www.computer.org/csdl/proceedings-article/sp/2025/223600a203/26hiTzqtuPm
  • Security Attacks Abusing Pulse-level Quantum Circuits pp. 222-239 by Chuanqi Xu, Jakub Szefer https://www.computer.org/csdl/proceedings-article/sp/2025/223600a083/21B7Rp53qbm
  • Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES pp. 240-258 by Changchang Ding, Yan Huang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a055/21B7R1Oem1q
  • Gold OPRF: Post-Quantum Oblivious Power-Residue PRF pp. 259-278 by Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin https://www.computer.org/csdl/proceedings-article/sp/2025/223600a259/26hiTBFyWyY
  • Benchmarking Attacks on Learning with Errors pp. 279-297 by Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter https://www.computer.org/csdl/proceedings-article/sp/2025/223600a058/21B7R4wyu9G

Zero Knowledge

  • Efficient Proofs of Possession for Legacy Signaturespp by Anna Pui Yung Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs https://www.computer.org/csdl/proceedings-article/sp/2025/223600a080/21B7RmZTW00
  • Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofspp. 3309-3327 by Alex Ozdemir, Evan Laufer, Dan Boneh https://www.computer.org/csdl/proceedings-article/sp/2025/223600a054/21B7R0YQXtK
  • ZHE: Efficient Zero-Knowledge Proofs for HE Evaluationspp. 3328-3346 by Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen https://www.computer.org/csdl/proceedings-article/sp/2025/223600d087/26hiVj5yzCw
  • CoBBl: Dynamic constraint generation for SNARKspp. 3347-3363 by Kunming Jiang, Fraser Brown, Riad Wahby https://www.computer.org/csdl/proceedings-article/sp/2025/223600d106/26hiVjK9ddK
  • ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofspp. 3364-3382 by Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs https://www.computer.org/csdl/proceedings-article/sp/2025/223600d123/26hiVkpj356
  • HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Costpp. 3383-3401 by Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600d142/26hiVl2c5TW
  • JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Fieldpp. 3402-3420 by Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au https://www.computer.org/csdl/proceedings-article/sp/2025/223600d161/26hiVlCOlGg
  • HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users)pp. 3421-3439 by Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou https://www.computer.org/csdl/proceedings-article/sp/2025/223600d180/26hiVmh7o9q
  • Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKspp. 3440-3459 by Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst https://www.computer.org/csdl/proceedings-article/sp/2025/223600a057/21B7R3HsGK4
  • FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledgepp. 3460-3478 by Tianyu Zhang, Shen Dong, O. Deniz Kose, Yanning Shen, Yupeng Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600d219/26hiVnyjtrq
  • VerITAS: Verifying Image Transformations at Scale by Trisha Datta, Binyi Chen, Dan Boneh https://www.computer.org/csdl/proceedings-article/sp/2025/223600a097/22K50u66Ge4
  • Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop by Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini https://www.computer.org/csdl/proceedings-article/sp/2025/223600a014/21B7Q66yaAg
  • Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos by Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic https://www.computer.org/csdl/proceedings-article/sp/2025/223600e257/26hiWcyIvAc

Keys and Passwords

  • Post-quantum Cryptographic Analysis of SSH pp. 595-613 by Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa https://www.computer.org/csdl/proceedings-article/sp/2025/223600a558/26hiTNscrn2
  • SoK: Dlog-based Distributed Key Generation pp. 614-632 by Renas Bacho, Alireza Kavousi https://www.computer.org/csdl/proceedings-article/sp/2025/223600a577/26hiTO93S0M
  • Verifiable Secret Sharing Simplified pp. 633-651 by Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren https://www.computer.org/csdl/proceedings-article/sp/2025/223600a046/21B7QyuIMak
  • Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice pp. 652-663 by John Schanck https://www.computer.org/csdl/proceedings-article/sp/2025/223600a615/26hiTPD1U9G
  • AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators pp. 664-681 by Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a627/26hiTQkK8bC
  • RankGuess: Password Guessing Using Adversarial Ranking pp. 682-700 by Tao Yang, Ding Wang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a040/21B7Qt9Kuv6
  • Security Analysis of Master-Password-Protected Password Management Protocols pp. 701-719 by Yihe Duan, Ding Wang, Yanduo Fu https://www.computer.org/csdl/proceedings-article/sp/2025/223600a050/21B7QXQpJny
  • Open Sesame! On the Security and Memorability of Verbal Passwords pp. 720-739 by Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim https://www.computer.org/csdl/proceedings-article/sp/2025/223600a683/26hiTSjmQnu

Blockchain

  • P2C2T: Preserving the Privacy of Cross-Chain Transfer pp. 1474-1492 by Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino https://www.computer.org/csdl/proceedings-article/sp/2025/223600a051/21B7QYE5x8Q
  • Liquefaction: Privately Liquefying Blockchain Assets pp. 1493-1511 by James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu, Ari Juels https://www.computer.org/csdl/proceedings-article/sp/2025/223600b437/26hiUjFXiP6
  • Decentralization of Ethereum's Builder Market pp. 1512-1530 by Sen Yang, Kartik Nayak, Fan Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600b456/26hiUkhZyfK
  • A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms pp. 1531-1546 by Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet Arora, Mohsen Minaei https://www.computer.org/csdl/proceedings-article/sp/2025/223600b475/26hiUkWiAIU
  • Signature-Free Atomic Broadcast with Optimal  Messages and  Expected Time pp. 1547-1565 by Xiao Sui, Xin Wang, Sisi Duan https://www.computer.org/csdl/proceedings-article/sp/2025/223600b547/26EkFF9L4Qw
  • Warning! The Timeout T Cannot Protect You From Losing Coins PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps pp. 1566-1583 by Peifang Ni, Anqi Tian, Jing Xu https://www.computer.org/csdl/proceedings-article/sp/2025/223600b566/26EkFFS2v8A
  • Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs pp. 1584-1602 by Wanning Ding, Yuzhe Tang, Yibo Wang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk
  • Papercraft: Lattice-based Verifiable Delay Function Implemented pp. 1603-1621 by Michał Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta https://www.computer.org/csdl/proceedings-article/sp/2025/223600b510/26hiUmjaECc
  • Constant latency and finality for dynamically available DAG pp. 1910-1927 by Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu https://www.computer.org/csdl/proceedings-article/sp/2025/223600b910/26EkFUoHIRi
  • Sailfish: Towards Improving the Latency of DAG-based BFT pp. 1928-1946 by Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak https://www.computer.org/csdl/proceedings-article/sp/2025/223600a021/21B7QcFAX6M
  • Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains pp. 1947-1963 by Zhongtang Luo, Yanxue Jia, Alejandra Gracia, Aniket Kate https://www.computer.org/csdl/proceedings-article/sp/2025/223600b947/26EkFVQ7mPC
  • MicroNova: Folding-based arguments with efficient (on-chain) verification pp. 1964-1982 by Jiaxing Zhao, Srinath Setty, Weidong Cui, Greg Zaverucha https://www.computer.org/csdl/proceedings-article/sp/2025/223600b835/26hiUz9nuta
  • Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups) pp. 1983-2001 by Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang https://www.computer.org/csdl/proceedings-article/sp/2025/223600b983/26EkFXhOBW0
  • An Attack on TON’s ADNL Secure Channel Protocol pp. 2002-2017 by Aviv Frenkel, Dmitry Kogan https://www.computer.org/csdl/proceedings-article/sp/2025/223600b854/26hiUzMy8q4
  • VITARIT: Paying for Threshold Services on Bitcoin and Friends pp. 2018-2036 by Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee https://www.computer.org/csdl/proceedings-article/sp/2025/223600b870/26hiUAx6lKE
  • "Check-Before-you-Solve": Verifiable Time-lock Puzzles pp. 2037-2056 by Jiajun Xin, Dimitrios Papadopoulos https://www.computer.org/csdl/proceedings-article/sp/2025/223600a053/21B7R0jYIKs


Kurt Pan: 即日起提供有偿「密码学论文代码实现和 benchmarking 服务」,语言侧重Rust / Python / C++,密码学侧重零知识证明系统格密码方案。欢迎有需要的老师同学以及对密码学感兴趣的朋友联系我,邮箱kurtpan666 at pm dot me 或微信 cryptokurt,也可关注公众号后留言。