🦜 IACR News
@www.iacr.org.news@rss-parrot.net
I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline!
Brought to you by the RSS Parrot.
---
Your feed and you don't want it here? Just
e-mail the birb.
Ph.D. Position on Post-Quantum Crypto-Biometrics with Hardware Security for Digital Identity Wallets
https://iacr.org/news/item/24134
Published: October 10, 2024 10:18
Job Posting: Ph.D. Position on Post-Quantum Crypto-Biometrics with Hardware Security for Digital Identity Wallets
University of Seville (Microelectronics Institute of Seville), Spain
…
PhD Student in 5G and Next Generation Communication Security
https://iacr.org/news/item/24133
Published: October 10, 2024 10:00
Job Posting: PhD Student in 5G and Next Generation Communication Security
NUS-Singapore and the University of Sheffield, UK
We are offering fully funded Ph.D opportunities at…
Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge
https://iacr.org/news/item/24128
Published: October 9, 2024 11:06
ePrint Report: Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge
Jiaqi Cheng, Rishab Goyal
We design a generic compiler to boost any non-trivial succinct…
Cryptography and Collective Power
https://iacr.org/news/item/24127
Published: October 9, 2024 11:06
ePrint Report: Cryptography and Collective Power
Leah Namisa Rosenbloom
This paper extends the dialogue of "The Moral Character of Cryptographic Work" (Rogaway, 2015) and "Crypto…
Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model
https://iacr.org/news/item/24132
Published: October 9, 2024 11:06
ePrint Report: Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model
Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, Wei Peng
In this work, we provide…
Nebula: Efficient read-write memory and switchboard circuits for folding schemes
https://iacr.org/news/item/24130
Published: October 9, 2024 11:06
ePrint Report: Nebula: Efficient read-write memory and switchboard circuits for folding schemes
Arasu Arun, Srinath Setty
Folding schemes enable prover-efficient incrementally…
NeutronNova: Folding everything that reduces to zero-check
https://iacr.org/news/item/24131
Published: October 9, 2024 11:06
ePrint Report: NeutronNova: Folding everything that reduces to zero-check
Abhiram Kothapalli, Srinath Setty
We introduce NeutronNova, a new folding scheme for the zero-check…
Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
https://iacr.org/news/item/24126
Published: October 9, 2024 11:06
ePrint Report: Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
Daniel Collins, Yuval Efron, Jovan Komatovic
It is well known that a trusted setup allows one to solve…
Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes
https://iacr.org/news/item/24124
Published: October 9, 2024 11:06
ePrint Report: Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes
Bar Alon, Amos Beimel, Or Lasri
We consider 3 related cryptographic primitives, private…
Predicting truncated multiple matrix congruential generators with unknown parameters
https://iacr.org/news/item/24129
Published: October 9, 2024 11:06
ePrint Report: Predicting truncated multiple matrix congruential generators with unknown parameters
Changcun Wang, Zhaopeng Dai
Multiple Matrix congruential generators is an…
Pacmann: Efficient Private Approximate Nearest Neighbor Search
https://iacr.org/news/item/24125
Published: October 9, 2024 11:06
ePrint Report: Pacmann: Efficient Private Approximate Nearest Neighbor Search
Mingxun Zhou, Elaine Shi, Giulia Fanti
We propose a new private Approximate Nearest Neighbor (ANN)…
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs
https://iacr.org/news/item/24120
Published: October 9, 2024 11:00
ePrint Report: DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs
Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, Jiaheng Zhang …
Secret Sharing with Publicly Verifiable Deletion
https://iacr.org/news/item/24121
Published: October 9, 2024 11:00
ePrint Report: Secret Sharing with Publicly Verifiable Deletion
Jonathan Katz, Ben Sela
Certified deletion, an inherently quantum capability, allows a party holding a quantum…
On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
https://iacr.org/news/item/24123
Published: October 9, 2024 11:00
ePrint Report: On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
Sulaiman Alhussaini, Serge˘ı Sergeev
Recently, a…
An undetectable watermark for generative image models
https://iacr.org/news/item/24122
Published: October 9, 2024 11:00
ePrint Report: An undetectable watermark for generative image models
Sam Gunn, Xuandong Zhao, Dawn Song
We present the first undetectable watermarking scheme for generative image…
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
https://iacr.org/news/item/24116
Published: October 9, 2024 10:54
ePrint Report: MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang
The…
DART: Distributed argument of knowledge for rough terrains
https://iacr.org/news/item/24117
Published: October 9, 2024 10:54
ePrint Report: DART: Distributed argument of knowledge for rough terrains
Steve Thakur
We describe a fully distributed KZG-based Snark instantiable with any pairing-friendly…
Stateful Communication with Malicious Parties
https://iacr.org/news/item/24118
Published: October 9, 2024 10:54
ePrint Report: Stateful Communication with Malicious Parties
Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito
Cryptography's most common use is secure communication---e.g.…
Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
https://iacr.org/news/item/24119
Published: October 9, 2024 10:54
ePrint Report: Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
Ximing Fu, Mo Li, Shihan Lyu, Chuanyi Liu
We introduce a powerful attack, termed the…
A Systematic Study of Sparse LWE
https://iacr.org/news/item/24114
Published: October 8, 2024 07:24
ePrint Report: A Systematic Study of Sparse LWE
Aayush Jain, Huijia Lin, Sagnik Saha
In this work, we introduce the sparse LWE assumption, an assumption that draws inspiration…
Matching radar signals and fingerprints with MPC
https://iacr.org/news/item/24115
Published: October 8, 2024 07:24
ePrint Report: Matching radar signals and fingerprints with MPC
Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand
Vessels can be recognised by their navigation…
Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols
https://iacr.org/news/item/24108
Published: October 8, 2024 07:18
ePrint Report: Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols
Keykhosro Khosravani, Taraneh Eghlidos, Mohammad reza Aref
Oblivious Transfer (OT) is one…
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
https://iacr.org/news/item/24104
Published: October 8, 2024 07:18
ePrint Report: Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
Francesca Falzon, Evangelia Anna Markatou
We revisit the…
Halving differential additions on Kummer lines
https://iacr.org/news/item/24107
Published: October 8, 2024 07:18
ePrint Report: Halving differential additions on Kummer lines
Damien Robert, Nicolas Sarkis
We study differential additions formulas on Kummer lines that factorize through a…
Fully Homomorphic Encryption for Cyclotomic Prime Moduli
https://iacr.org/news/item/24112
Published: October 8, 2024 07:18
ePrint Report: Fully Homomorphic Encryption for Cyclotomic Prime Moduli
Robin Geelen, Frederik Vercauteren
This paper presents a Generalized BFV (GBFV) fully homomorphic…
Quantum Money from Class Group Actions on Elliptic Curves
https://iacr.org/news/item/24110
Published: October 8, 2024 07:18
ePrint Report: Quantum Money from Class Group Actions on Elliptic Curves
Hart Montgomery, Shahed Sharif
We construct a quantum money/quantum lightning scheme from class group…
Block Ciphers in Idealized Models: Automated Proofs and New Security Results
https://iacr.org/news/item/24109
Published: October 8, 2024 07:18
ePrint Report: Block Ciphers in Idealized Models: Automated Proofs and New Security Results
Miguel Ambrona, Pooya Farshim, Patrick Harasser
We develop and implement AlgoROM, a…
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
https://iacr.org/news/item/24111
Published: October 8, 2024 07:18
ePrint Report: WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
We introduce WHIR, a new IOP of…
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
https://iacr.org/news/item/24105
Published: October 8, 2024 07:18
ePrint Report: Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco RodrÃguez-HenrÃquez, Adi Shamir
…
$\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security
https://iacr.org/news/item/24106
Published: October 8, 2024 07:18
ePrint Report: $\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security
Emanuele Di Giandomenico, Yong Li, Sven Schäge
We present $\mathsf{Protoss}$, a new balanced PAKE…
A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
https://iacr.org/news/item/24113
Published: October 8, 2024 07:18
ePrint Report: A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
Zhengjun Cao, Lihua Liu
We show that the outsourcing…
Solving Multivariate Coppersmith Problems with Known Moduli
https://iacr.org/news/item/24102
Published: October 8, 2024 07:12
ePrint Report: Solving Multivariate Coppersmith Problems with Known Moduli
Keegan Ryan
We examine the problem of finding small solutions to systems of modular multivariate…
Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model
https://iacr.org/news/item/24099
Published: October 8, 2024 07:12
ePrint Report: Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model
Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu
In…
Efficiently-Thresholdizable Selective Batched Identity Based Encryption, with Applications
https://iacr.org/news/item/24100
Published: October 8, 2024 07:12
ePrint Report: Efficiently-Thresholdizable Selective Batched Identity Based Encryption, with Applications
Amit Agarwal, Rex Fernando, Benny Pinkas
We propose a new cryptographic…
OML: Open, Monetizable, and Loyal AI
https://iacr.org/news/item/24098
Published: October 8, 2024 07:12
ePrint Report: OML: Open, Monetizable, and Loyal AI
Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod…
Verifiable Value Added Tax
https://iacr.org/news/item/24101
Published: October 8, 2024 07:12
ePrint Report: Verifiable Value Added Tax
Victor Sint Nicolaas, Sascha Jafari
Value Added Tax (VAT) is a cornerstone of government rev-
enue systems worldwide, yet its…
Quantum Group Actions
https://iacr.org/news/item/24103
Published: October 8, 2024 07:12
ePrint Report: Quantum Group Actions
Tomoyuki Morimae, Keita Xagawa
In quantum cryptography, there could be a new world, Microcrypt, where
cryptography is possible but one-way…
Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
https://iacr.org/news/item/24095
Published: October 8, 2024 07:06
ePrint Report: Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
Kota Yoshida, Sengim Karayalcin, Stjepan Picek
Recently, deep learning-based…
Bounded Collusion-Resistant Registered Functional Encryption for Circuits
https://iacr.org/news/item/24097
Published: October 8, 2024 07:06
ePrint Report: Bounded Collusion-Resistant Registered Functional Encryption for Circuits
Yijian Zhang, Jie Chen, Debiao He, Yuqing Zhang
As an emerging primitive, Registered…
Basefold in the List Decoding Regime
https://iacr.org/news/item/24096
Published: October 8, 2024 07:06
ePrint Report: Basefold in the List Decoding Regime
Ulrich Haböck
In this writeup we discuss the soundness of the Basefold multilinear polynomial commitment scheme [Zeilberger,…
IACR Communications in Cryptology - Editorial Board 2025 Nominations
https://iacr.org/news/item/24094
Published: October 7, 2024 12:32
Announcement: IACR Communications in Cryptology - Editorial Board 2025 Nominations
After the successful launch of the IACR Communications in Cryptology in 2024, the…
LEAD AI MSCA postdoctoral research fellow position within Cryptography and Security of AI
https://iacr.org/news/item/24093
Published: October 7, 2024 12:30
Job Posting: LEAD AI MSCA postdoctoral research fellow position within Cryptography and Security of AI
University of Bergen
At the Department of Informatics, there is a vacancy…
Oracle Separation Between Quantum Commitments and Quantum One-wayness
https://iacr.org/news/item/24091
Published: October 5, 2024 06:18
ePrint Report: Oracle Separation Between Quantum Commitments and Quantum One-wayness
John Bostanci, Boyang Chen, Barak Nehoran
We show that there exists a unitary quantum oracle…
Fiat-Shamir in the Wild
https://iacr.org/news/item/24088
Published: October 5, 2024 06:18
ePrint Report: Fiat-Shamir in the Wild
Hieu Nguyen, Uyen Ho, Alex Biryukov
The Fiat-Shamir transformation is a key technique for removing interactivity from cryptographic proof…
A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID
https://iacr.org/news/item/24090
Published: October 5, 2024 06:18
ePrint Report: A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID
Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, Takashi Yamakawa
…
A Simple Framework for Secure Key Leasing
https://iacr.org/news/item/24087
Published: October 5, 2024 06:18
ePrint Report: A Simple Framework for Secure Key Leasing
Fuyuki Kitagawa, Tomoyuki Morimae, Takashi Yamakawa
Secure key leasing (a.k.a. key-revocable cryptography) enables us to…
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
https://iacr.org/news/item/24086
Published: October 5, 2024 06:18
ePrint Report: Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-MartÃnez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn…
Dynamic zk-SNARKs
https://iacr.org/news/item/24089
Published: October 5, 2024 06:18
ePrint Report: Dynamic zk-SNARKs
Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
In this work, we put forth the notion of dynamic zk-SNARKs. A…
The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions
https://iacr.org/news/item/24092
Published: October 5, 2024 06:18
ePrint Report: The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions
Maher Mamah
In this paper we study several computational problems related…
Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
https://iacr.org/news/item/24082
Published: October 5, 2024 06:12
ePrint Report: Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari
This…
Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets
https://iacr.org/news/item/24085
Published: October 5, 2024 06:12
ePrint Report: Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets
Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, Erik Takke
…
Revisiting Shuffle-Based Private Set Unions with Reduced Communication
https://iacr.org/news/item/24083
Published: October 5, 2024 06:12
ePrint Report: Revisiting Shuffle-Based Private Set Unions with Reduced Communication
Jiseung Kim, Hyung Tae Lee, Yongha Son
A Private Set Union (PSU) allows two parties having…
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation
https://iacr.org/news/item/24084
Published: October 5, 2024 06:12
ePrint Report: FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation
Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame
In modern business…
The module action for isogeny based cryptography
https://iacr.org/news/item/24079
Published: October 5, 2024 06:06
ePrint Report: The module action for isogeny based cryptography
Damien Robert
We extend the usual ideal action on oriented elliptic curves to a (Hermitian) module action on…
Tightly Secure Threshold Signatures over Pairing-Free Groups
https://iacr.org/news/item/24080
Published: October 5, 2024 06:06
ePrint Report: Tightly Secure Threshold Signatures over Pairing-Free Groups
Renas Bacho, Benedikt Wagner
Threshold signatures have been drawing lots of attention in recent years.…
Understanding Leakage in Searchable Encryption: a Quantitative Approach
https://iacr.org/news/item/24081
Published: October 5, 2024 06:06
ePrint Report: Understanding Leakage in Searchable Encryption: a Quantitative Approach
Alexandra Boldyreva, Zichen Gui, Bogdan Warinschi
Searchable encryption, or more generally,…
Private Laconic Oblivious Transfer with Preprocessing
https://iacr.org/news/item/24078
Published: October 5, 2024 06:06
ePrint Report: Private Laconic Oblivious Transfer with Preprocessing
Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin
Laconic cryptography studies two-message…
SNARKs for Virtual Machines are Non-Malleable
https://iacr.org/news/item/24074
Published: October 4, 2024 08:54
ePrint Report: SNARKs for Virtual Machines are Non-Malleable
Matteo Campanelli, Antonio Faonio, Luigi Russo
Cryptographic proof systems have a plethora of applications: from…
Revisiting Keyed-Verification Anonymous Credentials
https://iacr.org/news/item/24075
Published: October 4, 2024 08:54
ePrint Report: Revisiting Keyed-Verification Anonymous Credentials
Michele Orrù
Keyed-verification anonymous credentials are widely recognized as among the most efficient tools…
Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
https://iacr.org/news/item/24077
Published: October 4, 2024 08:54
ePrint Report: Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
Amit Singh Bhati, Michiel Verbauwhede, Elena Andreeva
Tweakable enciphering modes…
STARK-based Signatures from the RPO Permutation
https://iacr.org/news/item/24076
Published: October 4, 2024 08:54
ePrint Report: STARK-based Signatures from the RPO Permutation
Shahla Atapoor, Cyprien Delpech de Saint Guilhem, Al Kindi
This work describes a digital signature scheme…
MAYO Key Recovery by Fixing Vinegar Seeds
https://iacr.org/news/item/24073
Published: October 4, 2024 08:54
ePrint Report: MAYO Key Recovery by Fixing Vinegar Seeds
Sönke Jendral, Elena Dubrova
As the industry prepares for the transition to post-quantum secure public key cryptographic…
Robust AE With Committing Security
https://iacr.org/news/item/24065
Published: October 4, 2024 08:48
ePrint Report: Robust AE With Committing Security
Viet Tung Hoang, Sanketh Menda
There has been a recent interest to develop and standardize Robust Authenticated Encryption…
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
https://iacr.org/news/item/24069
Published: October 4, 2024 08:48
ePrint Report: Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
John Gaspoz, Siemen Dhooghe
Masking is a sound countermeasure to protect against differential…
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process
https://iacr.org/news/item/24063
Published: October 4, 2024 08:48
ePrint Report: Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Küsters, Tim Würtele
FAPI 2.0 is…
HHL for tensor-decomposable matrices
https://iacr.org/news/item/24070
Published: October 4, 2024 08:48
ePrint Report: HHL for tensor-decomposable matrices
Cezary Pilaszewicz, Marian Margraf
We use the HHL algorithm to retrieve a quantum state holding the algebraic normal formal of…
HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0
https://iacr.org/news/item/24066
Published: October 4, 2024 08:48
ePrint Report: HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0
Ali Şah Özcan, Erkay Savaş
HEonGPU is a high-performance library designed to optimize Fully…
Findex: A Concurrent and Database-Independent Searchable Encryption Scheme
https://iacr.org/news/item/24064
Published: October 4, 2024 08:48
ePrint Report: Findex: A Concurrent and Database-Independent Searchable Encryption Scheme
Théophile Brézot, Chloé Hébant
State-of-the-art database implementations offer a wide…
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
https://iacr.org/news/item/24072
Published: October 4, 2024 08:48
ePrint Report: Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, Luisa Siniscalchi
…
Fully Composable Homomorphic Encryption
https://iacr.org/news/item/24068
Published: October 4, 2024 08:48
ePrint Report: Fully Composable Homomorphic Encryption
Daniele Micciancio
The traditional definition of fully homomorphic encryption (FHE) is not composable, i.e., it does not …
PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks
https://iacr.org/news/item/24067
Published: October 4, 2024 08:48
ePrint Report: PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks
Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, Xue Liu
…
Fully-Succinct Arguments over the Integers from First Principles
https://iacr.org/news/item/24071
Published: October 4, 2024 08:48
ePrint Report: Fully-Succinct Arguments over the Integers from First Principles
Matteo Campanelli, Mathias Hall-Andersen
Succinct arguments of knowledge allow an untrusted prover…
More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead
https://iacr.org/news/item/24057
Published: October 4, 2024 08:42
ePrint Report: More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead
Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, Yongsoo Song
…
Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts
https://iacr.org/news/item/24055
Published: October 4, 2024 08:42
ePrint Report: Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts
Fei Xu, Honggang Hu, Changhong Xu
At Eurocrypt 2015, Zahur, Rosulek,…
VOLE-in-the-head signatures from Subfield Bilinear Collisions
https://iacr.org/news/item/24060
Published: October 4, 2024 08:42
ePrint Report: VOLE-in-the-head signatures from Subfield Bilinear Collisions
Janik Huth, Antoine Joux
In this paper, we introduce a new method to construct a signature scheme…
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention
https://iacr.org/news/item/24056
Published: October 4, 2024 08:42
ePrint Report: BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention
Jan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu
In decentralized finance…
Cryptographic Characterization of Quantum Advantage
https://iacr.org/news/item/24059
Published: October 4, 2024 08:42
ePrint Report: Cryptographic Characterization of Quantum Advantage
Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
Quantum computational advantage refers to an existence of…
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs
https://iacr.org/news/item/24058
Published: October 4, 2024 08:42
ePrint Report: Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs
Xingye Lu, Jingjing Fan, Man Ho AU
In this paper, we introduce the notion…
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
https://iacr.org/news/item/24061
Published: October 4, 2024 08:42
ePrint Report: Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang …
Quantum Cryptography from Meta-Complexity
https://iacr.org/news/item/24062
Published: October 4, 2024 08:42
ePrint Report: Quantum Cryptography from Meta-Complexity
Taiga Hiroka, Tomoyuki Morimae
In classical cryptography, one-way functions (OWFs) are the minimal assumption, while…
Challenges in Timed Cryptography: A Position Paper
https://iacr.org/news/item/24052
Published: October 4, 2024 08:36
ePrint Report: Challenges in Timed Cryptography: A Position Paper
Karim Eldefrawy, Benjamin Terner, Moti Yung
Time-lock puzzles are unique cryptographic primitives that use…
Folding Schemes with Privacy Preserving Selective Verification
https://iacr.org/news/item/24053
Published: October 4, 2024 08:36
ePrint Report: Folding Schemes with Privacy Preserving Selective Verification
Joan Boyar, Simon Erfurth
Folding schemes are an exciting new primitive, transforming the task of…
FLI: Folding Lookup Instances
https://iacr.org/news/item/24054
Published: October 4, 2024 08:36
ePrint Report: FLI: Folding Lookup Instances
Albert Garreta, Ignacio Manzur
We introduce two folding schemes for lookup instances: FLI and FLI+SOS. Both use a PIOP to check that…