Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors pp. 149-164 by Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi https://www.computer.org/csdl/proceedings-article/sp/2025/223600a070/21B7Re2GxzO
Groundhog: A Restart-based Systems Framework for Increasing Availability in Threshold Cryptosystems pp. 165-183 by Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri https://www.computer.org/csdl/proceedings-article/sp/2025/223600a056/21B7R2Aua8o
Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More pp. 184-202 by The Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau https://www.computer.org/csdl/proceedings-article/sp/2025/223600a184/26hiTyJTFjG
Robust Threshold ECDSA with Online-Friendly Design in Three Rounds pp. 203-221 by Guofeng Tang, Haiyang Xue https://www.computer.org/csdl/proceedings-article/sp/2025/223600a203/26hiTzqtuPm
Security Attacks Abusing Pulse-level Quantum Circuits pp. 222-239 by Chuanqi Xu, Jakub Szefer https://www.computer.org/csdl/proceedings-article/sp/2025/223600a083/21B7Rp53qbm
Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES pp. 240-258 by Changchang Ding, Yan Huang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a055/21B7R1Oem1q
Gold OPRF: Post-Quantum Oblivious Power-Residue PRF pp. 259-278 by Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin https://www.computer.org/csdl/proceedings-article/sp/2025/223600a259/26hiTBFyWyY
Benchmarking Attacks on Learning with Errors pp. 279-297 by Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter https://www.computer.org/csdl/proceedings-article/sp/2025/223600a058/21B7R4wyu9G
Zero Knowledge
Efficient Proofs of Possession for Legacy Signaturespp by Anna Pui Yung Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs https://www.computer.org/csdl/proceedings-article/sp/2025/223600a080/21B7RmZTW00
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofspp. 3309-3327 by Alex Ozdemir, Evan Laufer, Dan Boneh https://www.computer.org/csdl/proceedings-article/sp/2025/223600a054/21B7R0YQXtK
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluationspp. 3328-3346 by Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen https://www.computer.org/csdl/proceedings-article/sp/2025/223600d087/26hiVj5yzCw
CoBBl: Dynamic constraint generation for SNARKspp. 3347-3363 by Kunming Jiang, Fraser Brown, Riad Wahby https://www.computer.org/csdl/proceedings-article/sp/2025/223600d106/26hiVjK9ddK
ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofspp. 3364-3382 by Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs https://www.computer.org/csdl/proceedings-article/sp/2025/223600d123/26hiVkpj356
HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Costpp. 3383-3401 by Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600d142/26hiVl2c5TW
JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Fieldpp. 3402-3420 by Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au https://www.computer.org/csdl/proceedings-article/sp/2025/223600d161/26hiVlCOlGg
HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users)pp. 3421-3439 by Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou https://www.computer.org/csdl/proceedings-article/sp/2025/223600d180/26hiVmh7o9q
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKspp. 3440-3459 by Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst https://www.computer.org/csdl/proceedings-article/sp/2025/223600a057/21B7R3HsGK4
FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledgepp. 3460-3478 by Tianyu Zhang, Shen Dong, O. Deniz Kose, Yanning Shen, Yupeng Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600d219/26hiVnyjtrq
VerITAS: Verifying Image Transformations at Scale by Trisha Datta, Binyi Chen, Dan Boneh https://www.computer.org/csdl/proceedings-article/sp/2025/223600a097/22K50u66Ge4
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop by Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini https://www.computer.org/csdl/proceedings-article/sp/2025/223600a014/21B7Q66yaAg
Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos by Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic https://www.computer.org/csdl/proceedings-article/sp/2025/223600e257/26hiWcyIvAc
Keys and Passwords
Post-quantum Cryptographic Analysis of SSH pp. 595-613 by Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa https://www.computer.org/csdl/proceedings-article/sp/2025/223600a558/26hiTNscrn2
SoK: Dlog-based Distributed Key Generation pp. 614-632 by Renas Bacho, Alireza Kavousi https://www.computer.org/csdl/proceedings-article/sp/2025/223600a577/26hiTO93S0M
Verifiable Secret Sharing Simplified pp. 633-651 by Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren https://www.computer.org/csdl/proceedings-article/sp/2025/223600a046/21B7QyuIMak
Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice pp. 652-663 by John Schanck https://www.computer.org/csdl/proceedings-article/sp/2025/223600a615/26hiTPD1U9G
AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators pp. 664-681 by Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a627/26hiTQkK8bC
RankGuess: Password Guessing Using Adversarial Ranking pp. 682-700 by Tao Yang, Ding Wang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a040/21B7Qt9Kuv6
Security Analysis of Master-Password-Protected Password Management Protocols pp. 701-719 by Yihe Duan, Ding Wang, Yanduo Fu https://www.computer.org/csdl/proceedings-article/sp/2025/223600a050/21B7QXQpJny
Open Sesame! On the Security and Memorability of Verbal Passwords pp. 720-739 by Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim https://www.computer.org/csdl/proceedings-article/sp/2025/223600a683/26hiTSjmQnu
Blockchain
P2C2T: Preserving the Privacy of Cross-Chain Transfer pp. 1474-1492 by Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino https://www.computer.org/csdl/proceedings-article/sp/2025/223600a051/21B7QYE5x8Q
Liquefaction: Privately Liquefying Blockchain Assets pp. 1493-1511 by James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu, Ari Juels https://www.computer.org/csdl/proceedings-article/sp/2025/223600b437/26hiUjFXiP6
Decentralization of Ethereum's Builder Market pp. 1512-1530 by Sen Yang, Kartik Nayak, Fan Zhang https://www.computer.org/csdl/proceedings-article/sp/2025/223600b456/26hiUkhZyfK
A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms pp. 1531-1546 by Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet Arora, Mohsen Minaei https://www.computer.org/csdl/proceedings-article/sp/2025/223600b475/26hiUkWiAIU
Signature-Free Atomic Broadcast with Optimal Messages and Expected Time pp. 1547-1565 by Xiao Sui, Xin Wang, Sisi Duan https://www.computer.org/csdl/proceedings-article/sp/2025/223600b547/26EkFF9L4Qw
Warning! The Timeout T Cannot Protect You From Losing Coins PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps pp. 1566-1583 by Peifang Ni, Anqi Tian, Jing Xu https://www.computer.org/csdl/proceedings-article/sp/2025/223600b566/26EkFFS2v8A
Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs pp. 1584-1602 by Wanning Ding, Yuzhe Tang, Yibo Wang https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk
Papercraft: Lattice-based Verifiable Delay Function Implemented pp. 1603-1621 by Michał Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta https://www.computer.org/csdl/proceedings-article/sp/2025/223600b510/26hiUmjaECc
Constant latency and finality for dynamically available DAG pp. 1910-1927 by Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu https://www.computer.org/csdl/proceedings-article/sp/2025/223600b910/26EkFUoHIRi
Sailfish: Towards Improving the Latency of DAG-based BFT pp. 1928-1946 by Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak https://www.computer.org/csdl/proceedings-article/sp/2025/223600a021/21B7QcFAX6M
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains pp. 1947-1963 by Zhongtang Luo, Yanxue Jia, Alejandra Gracia, Aniket Kate https://www.computer.org/csdl/proceedings-article/sp/2025/223600b947/26EkFVQ7mPC
MicroNova: Folding-based arguments with efficient (on-chain) verification pp. 1964-1982 by Jiaxing Zhao, Srinath Setty, Weidong Cui, Greg Zaverucha https://www.computer.org/csdl/proceedings-article/sp/2025/223600b835/26hiUz9nuta
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups) pp. 1983-2001 by Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang https://www.computer.org/csdl/proceedings-article/sp/2025/223600b983/26EkFXhOBW0
An Attack on TON’s ADNL Secure Channel Protocol pp. 2002-2017 by Aviv Frenkel, Dmitry Kogan https://www.computer.org/csdl/proceedings-article/sp/2025/223600b854/26hiUzMy8q4
VITARIT: Paying for Threshold Services on Bitcoin and Friends pp. 2018-2036 by Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee https://www.computer.org/csdl/proceedings-article/sp/2025/223600b870/26hiUAx6lKE
"Check-Before-you-Solve": Verifiable Time-lock Puzzles pp. 2037-2056 by Jiajun Xin, Dimitrios Papadopoulos https://www.computer.org/csdl/proceedings-article/sp/2025/223600a053/21B7R0jYIKs
Kurt Pan: 即日起提供有偿「密码学论文代码实现和 benchmarking 服务」,语言侧重Rust / Python / C++,密码学侧重零知识证明系统和格密码方案。欢迎有需要的老师同学以及对密码学感兴趣的朋友联系我,邮箱kurtpan666 at pm dot me 或微信 cryptokurt,也可关注公众号后留言。