RSS Parrot

BETA

🦜 IACR News

@www.iacr.org.news@rss-parrot.net

I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline! Brought to you by the RSS Parrot.

---

Your feed and you don't want it here? Just e-mail the birb.

Site URL: www.iacr.org/news/

Feed URL: iacr.org/news/rss

Posts: 83

Followers: 1

Ph.D. Position on Post-Quantum Crypto-Biometrics with Hardware Security for Digital Identity Wallets

Published: October 10, 2024 10:18

Job Posting: Ph.D. Position on Post-Quantum Crypto-Biometrics with Hardware Security for Digital Identity Wallets University of Seville (Microelectronics Institute of Seville), Spain …

PhD Student in 5G and Next Generation Communication Security

Published: October 10, 2024 10:00

Job Posting: PhD Student in 5G and Next Generation Communication Security NUS-Singapore and the University of Sheffield, UK We are offering fully funded Ph.D opportunities at…

Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge

Published: October 9, 2024 11:06

ePrint Report: Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge Jiaqi Cheng, Rishab Goyal We design a generic compiler to boost any non-trivial succinct…

Cryptography and Collective Power

Published: October 9, 2024 11:06

ePrint Report: Cryptography and Collective Power Leah Namisa Rosenbloom This paper extends the dialogue of "The Moral Character of Cryptographic Work" (Rogaway, 2015) and "Crypto…

Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model

Published: October 9, 2024 11:06

ePrint Report: Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, Wei Peng In this work, we provide…

Nebula: Efficient read-write memory and switchboard circuits for folding schemes

Published: October 9, 2024 11:06

ePrint Report: Nebula: Efficient read-write memory and switchboard circuits for folding schemes Arasu Arun, Srinath Setty Folding schemes enable prover-efficient incrementally…

NeutronNova: Folding everything that reduces to zero-check

Published: October 9, 2024 11:06

ePrint Report: NeutronNova: Folding everything that reduces to zero-check Abhiram Kothapalli, Srinath Setty We introduce NeutronNova, a new folding scheme for the zero-check…

Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement

Published: October 9, 2024 11:06

ePrint Report: Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement Daniel Collins, Yuval Efron, Jovan Komatovic It is well known that a trusted setup allows one to solve…

Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes

Published: October 9, 2024 11:06

ePrint Report: Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes Bar Alon, Amos Beimel, Or Lasri We consider 3 related cryptographic primitives, private…

Predicting truncated multiple matrix congruential generators with unknown parameters

Published: October 9, 2024 11:06

ePrint Report: Predicting truncated multiple matrix congruential generators with unknown parameters Changcun Wang, Zhaopeng Dai Multiple Matrix congruential generators is an…

Pacmann: Efficient Private Approximate Nearest Neighbor Search

Published: October 9, 2024 11:06

ePrint Report: Pacmann: Efficient Private Approximate Nearest Neighbor Search Mingxun Zhou, Elaine Shi, Giulia Fanti We propose a new private Approximate Nearest Neighbor (ANN)…

DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs

Published: October 9, 2024 11:00

ePrint Report: DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, Jiaheng Zhang …

Secret Sharing with Publicly Verifiable Deletion

Published: October 9, 2024 11:00

ePrint Report: Secret Sharing with Publicly Verifiable Deletion Jonathan Katz, Ben Sela Certified deletion, an inherently quantum capability, allows a party holding a quantum…

On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices

Published: October 9, 2024 11:00

ePrint Report: On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices Sulaiman Alhussaini, Serge˘ı Sergeev Recently, a…

An undetectable watermark for generative image models

Published: October 9, 2024 11:00

ePrint Report: An undetectable watermark for generative image models Sam Gunn, Xuandong Zhao, Dawn Song We present the first undetectable watermarking scheme for generative image…

MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography

Published: October 9, 2024 10:54

ePrint Report: MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang The…

DART: Distributed argument of knowledge for rough terrains

Published: October 9, 2024 10:54

ePrint Report: DART: Distributed argument of knowledge for rough terrains Steve Thakur We describe a fully distributed KZG-based Snark instantiable with any pairing-friendly…

Stateful Communication with Malicious Parties

Published: October 9, 2024 10:54

ePrint Report: Stateful Communication with Malicious Parties Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito Cryptography's most common use is secure communication---e.g.…

Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators

Published: October 9, 2024 10:54

ePrint Report: Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators Ximing Fu, Mo Li, Shihan Lyu, Chuanyi Liu We introduce a powerful attack, termed the…

A Systematic Study of Sparse LWE

Published: October 8, 2024 07:24

ePrint Report: A Systematic Study of Sparse LWE Aayush Jain, Huijia Lin, Sagnik Saha In this work, we introduce the sparse LWE assumption, an assumption that draws inspiration…

Matching radar signals and fingerprints with MPC

Published: October 8, 2024 07:24

ePrint Report: Matching radar signals and fingerprints with MPC Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand Vessels can be recognised by their navigation…

Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols

Published: October 8, 2024 07:18

ePrint Report: Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols Keykhosro Khosravani, Taraneh Eghlidos, Mohammad reza Aref Oblivious Transfer (OT) is one…

Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols

Published: October 8, 2024 07:18

ePrint Report: Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols Francesca Falzon, Evangelia Anna Markatou We revisit the…

Halving differential additions on Kummer lines

Published: October 8, 2024 07:18

ePrint Report: Halving differential additions on Kummer lines Damien Robert, Nicolas Sarkis We study differential additions formulas on Kummer lines that factorize through a…

Fully Homomorphic Encryption for Cyclotomic Prime Moduli

Published: October 8, 2024 07:18

ePrint Report: Fully Homomorphic Encryption for Cyclotomic Prime Moduli Robin Geelen, Frederik Vercauteren This paper presents a Generalized BFV (GBFV) fully homomorphic…

Quantum Money from Class Group Actions on Elliptic Curves

Published: October 8, 2024 07:18

ePrint Report: Quantum Money from Class Group Actions on Elliptic Curves Hart Montgomery, Shahed Sharif We construct a quantum money/quantum lightning scheme from class group…

Block Ciphers in Idealized Models: Automated Proofs and New Security Results

Published: October 8, 2024 07:18

ePrint Report: Block Ciphers in Idealized Models: Automated Proofs and New Security Results Miguel Ambrona, Pooya Farshim, Patrick Harasser We develop and implement AlgoROM, a…

WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification

Published: October 8, 2024 07:18

ePrint Report: WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev We introduce WHIR, a new IOP of…

Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting

Published: October 8, 2024 07:18

ePrint Report: Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir …

$\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security

Published: October 8, 2024 07:18

ePrint Report: $\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security Emanuele Di Giandomenico, Yong Li, Sven Schäge We present $\mathsf{Protoss}$, a new balanced PAKE…

A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''

Published: October 8, 2024 07:18

ePrint Report: A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming'' Zhengjun Cao, Lihua Liu We show that the outsourcing…

Solving Multivariate Coppersmith Problems with Known Moduli

Published: October 8, 2024 07:12

ePrint Report: Solving Multivariate Coppersmith Problems with Known Moduli Keegan Ryan We examine the problem of finding small solutions to systems of modular multivariate…

Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model

Published: October 8, 2024 07:12

ePrint Report: Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu In…

Efficiently-Thresholdizable Selective Batched Identity Based Encryption, with Applications

Published: October 8, 2024 07:12

ePrint Report: Efficiently-Thresholdizable Selective Batched Identity Based Encryption, with Applications Amit Agarwal, Rex Fernando, Benny Pinkas We propose a new cryptographic…

OML: Open, Monetizable, and Loyal AI

Published: October 8, 2024 07:12

ePrint Report: OML: Open, Monetizable, and Loyal AI Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod…

Verifiable Value Added Tax

Published: October 8, 2024 07:12

ePrint Report: Verifiable Value Added Tax Victor Sint Nicolaas, Sascha Jafari Value Added Tax (VAT) is a cornerstone of government rev- enue systems worldwide, yet its…

Quantum Group Actions

Published: October 8, 2024 07:12

ePrint Report: Quantum Group Actions Tomoyuki Morimae, Keita Xagawa In quantum cryptography, there could be a new world, Microcrypt, where cryptography is possible but one-way…

Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis

Published: October 8, 2024 07:06

ePrint Report: Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis Kota Yoshida, Sengim Karayalcin, Stjepan Picek Recently, deep learning-based…

Bounded Collusion-Resistant Registered Functional Encryption for Circuits

Published: October 8, 2024 07:06

ePrint Report: Bounded Collusion-Resistant Registered Functional Encryption for Circuits Yijian Zhang, Jie Chen, Debiao He, Yuqing Zhang As an emerging primitive, Registered…

Basefold in the List Decoding Regime

Published: October 8, 2024 07:06

ePrint Report: Basefold in the List Decoding Regime Ulrich Haböck In this writeup we discuss the soundness of the Basefold multilinear polynomial commitment scheme [Zeilberger,…

IACR Communications in Cryptology - Editorial Board 2025 Nominations

Published: October 7, 2024 12:32

Announcement: IACR Communications in Cryptology - Editorial Board 2025 Nominations After the successful launch of the IACR Communications in Cryptology in 2024, the…

LEAD AI MSCA postdoctoral research fellow position within Cryptography and Security of AI

Published: October 7, 2024 12:30

Job Posting: LEAD AI MSCA postdoctoral research fellow position within Cryptography and Security of AI University of Bergen At the Department of Informatics, there is a vacancy…

Oracle Separation Between Quantum Commitments and Quantum One-wayness

Published: October 5, 2024 06:18

ePrint Report: Oracle Separation Between Quantum Commitments and Quantum One-wayness John Bostanci, Boyang Chen, Barak Nehoran We show that there exists a unitary quantum oracle…

Fiat-Shamir in the Wild

Published: October 5, 2024 06:18

ePrint Report: Fiat-Shamir in the Wild Hieu Nguyen, Uyen Ho, Alex Biryukov The Fiat-Shamir transformation is a key technique for removing interactivity from cryptographic proof…

A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID

Published: October 5, 2024 06:18

ePrint Report: A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, Takashi Yamakawa …

A Simple Framework for Secure Key Leasing

Published: October 5, 2024 06:18

ePrint Report: A Simple Framework for Secure Key Leasing Fuyuki Kitagawa, Tomoyuki Morimae, Takashi Yamakawa Secure key leasing (a.k.a. key-revocable cryptography) enables us to…

Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4

Published: October 5, 2024 06:18

ePrint Report: Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4 Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn…

Dynamic zk-SNARKs

Published: October 5, 2024 06:18

ePrint Report: Dynamic zk-SNARKs Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos In this work, we put forth the notion of dynamic zk-SNARKs. A…

The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions

Published: October 5, 2024 06:18

ePrint Report: The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions Maher Mamah In this paper we study several computational problems related…

Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI

Published: October 5, 2024 06:12

ePrint Report: Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari This…

Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets

Published: October 5, 2024 06:12

ePrint Report: Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, Erik Takke …

Revisiting Shuffle-Based Private Set Unions with Reduced Communication

Published: October 5, 2024 06:12

ePrint Report: Revisiting Shuffle-Based Private Set Unions with Reduced Communication Jiseung Kim, Hyung Tae Lee, Yongha Son A Private Set Union (PSU) allows two parties having…

FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation

Published: October 5, 2024 06:12

ePrint Report: FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame In modern business…

The module action for isogeny based cryptography

Published: October 5, 2024 06:06

ePrint Report: The module action for isogeny based cryptography Damien Robert We extend the usual ideal action on oriented elliptic curves to a (Hermitian) module action on…

Tightly Secure Threshold Signatures over Pairing-Free Groups

Published: October 5, 2024 06:06

ePrint Report: Tightly Secure Threshold Signatures over Pairing-Free Groups Renas Bacho, Benedikt Wagner Threshold signatures have been drawing lots of attention in recent years.…

Understanding Leakage in Searchable Encryption: a Quantitative Approach

Published: October 5, 2024 06:06

ePrint Report: Understanding Leakage in Searchable Encryption: a Quantitative Approach Alexandra Boldyreva, Zichen Gui, Bogdan Warinschi Searchable encryption, or more generally,…

Private Laconic Oblivious Transfer with Preprocessing

Published: October 5, 2024 06:06

ePrint Report: Private Laconic Oblivious Transfer with Preprocessing Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin Laconic cryptography studies two-message…

SNARKs for Virtual Machines are Non-Malleable

Published: October 4, 2024 08:54

ePrint Report: SNARKs for Virtual Machines are Non-Malleable Matteo Campanelli, Antonio Faonio, Luigi Russo Cryptographic proof systems have a plethora of applications: from…

Revisiting Keyed-Verification Anonymous Credentials

Published: October 4, 2024 08:54

ePrint Report: Revisiting Keyed-Verification Anonymous Credentials Michele Orrù Keyed-verification anonymous credentials are widely recognized as among the most efficient tools…

Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM

Published: October 4, 2024 08:54

ePrint Report: Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM Amit Singh Bhati, Michiel Verbauwhede, Elena Andreeva Tweakable enciphering modes…

STARK-based Signatures from the RPO Permutation

Published: October 4, 2024 08:54

ePrint Report: STARK-based Signatures from the RPO Permutation Shahla Atapoor, Cyprien Delpech de Saint Guilhem, Al Kindi This work describes a digital signature scheme…

MAYO Key Recovery by Fixing Vinegar Seeds

Published: October 4, 2024 08:54

ePrint Report: MAYO Key Recovery by Fixing Vinegar Seeds Sönke Jendral, Elena Dubrova As the industry prepares for the transition to post-quantum secure public key cryptographic…

Robust AE With Committing Security

Published: October 4, 2024 08:48

ePrint Report: Robust AE With Committing Security Viet Tung Hoang, Sanketh Menda There has been a recent interest to develop and standardize Robust Authenticated Encryption…

Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

Published: October 4, 2024 08:48

ePrint Report: Bit t-SNI Secure Multiplication Gadget for Inner Product Masking John Gaspoz, Siemen Dhooghe Masking is a sound countermeasure to protect against differential…

Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process

Published: October 4, 2024 08:48

ePrint Report: Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process Pedram Hosseyni, Ralf Küsters, Tim Würtele FAPI 2.0 is…

HHL for tensor-decomposable matrices

Published: October 4, 2024 08:48

ePrint Report: HHL for tensor-decomposable matrices Cezary Pilaszewicz, Marian Margraf We use the HHL algorithm to retrieve a quantum state holding the algebraic normal formal of…

HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0

Published: October 4, 2024 08:48

ePrint Report: HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0 Ali Şah Özcan, Erkay Savaş HEonGPU is a high-performance library designed to optimize Fully…

Findex: A Concurrent and Database-Independent Searchable Encryption Scheme

Published: October 4, 2024 08:48

ePrint Report: Findex: A Concurrent and Database-Independent Searchable Encryption Scheme Théophile Brézot, Chloé Hébant State-of-the-art database implementations offer a wide…

Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle

Published: October 4, 2024 08:48

ePrint Report: Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, Luisa Siniscalchi …

Fully Composable Homomorphic Encryption

Published: October 4, 2024 08:48

ePrint Report: Fully Composable Homomorphic Encryption Daniele Micciancio The traditional definition of fully homomorphic encryption (FHE) is not composable, i.e., it does not …

PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks

Published: October 4, 2024 08:48

ePrint Report: PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, Xue Liu …

Fully-Succinct Arguments over the Integers from First Principles

Published: October 4, 2024 08:48

ePrint Report: Fully-Succinct Arguments over the Integers from First Principles Matteo Campanelli, Mathias Hall-Andersen Succinct arguments of knowledge allow an untrusted prover…

More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead

Published: October 4, 2024 08:42

ePrint Report: More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, Yongsoo Song …

Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts

Published: October 4, 2024 08:42

ePrint Report: Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts Fei Xu, Honggang Hu, Changhong Xu At Eurocrypt 2015, Zahur, Rosulek,…

VOLE-in-the-head signatures from Subfield Bilinear Collisions

Published: October 4, 2024 08:42

ePrint Report: VOLE-in-the-head signatures from Subfield Bilinear Collisions Janik Huth, Antoine Joux In this paper, we introduce a new method to construct a signature scheme…

BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention

Published: October 4, 2024 08:42

ePrint Report: BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention Jan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu In decentralized finance…

Cryptographic Characterization of Quantum Advantage

Published: October 4, 2024 08:42

ePrint Report: Cryptographic Characterization of Quantum Advantage Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa Quantum computational advantage refers to an existence of…

Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs

Published: October 4, 2024 08:42

ePrint Report: Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs Xingye Lu, Jingjing Fan, Man Ho AU In this paper, we introduce the notion…

Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem

Published: October 4, 2024 08:42

ePrint Report: Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang …

Quantum Cryptography from Meta-Complexity

Published: October 4, 2024 08:42

ePrint Report: Quantum Cryptography from Meta-Complexity Taiga Hiroka, Tomoyuki Morimae In classical cryptography, one-way functions (OWFs) are the minimal assumption, while…

Challenges in Timed Cryptography: A Position Paper

Published: October 4, 2024 08:36

ePrint Report: Challenges in Timed Cryptography: A Position Paper Karim Eldefrawy, Benjamin Terner, Moti Yung Time-lock puzzles are unique cryptographic primitives that use…

Folding Schemes with Privacy Preserving Selective Verification

Published: October 4, 2024 08:36

ePrint Report: Folding Schemes with Privacy Preserving Selective Verification Joan Boyar, Simon Erfurth Folding schemes are an exciting new primitive, transforming the task of…

FLI: Folding Lookup Instances

Published: October 4, 2024 08:36

ePrint Report: FLI: Folding Lookup Instances Albert Garreta, Ignacio Manzur We introduce two folding schemes for lookup instances: FLI and FLI+SOS. Both use a PIOP to check that…