首页 > 最新文献

IACR Cryptology ePrint Archive最新文献

英文 中文
Secure Noise Sampling for DP in MPC with Finite Precision 在精度有限的 MPC 中对 DP 进行安全噪声采样
Pub Date : 2024-07-30 DOI: 10.1145/3664476.3664490
Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao
While secure multi-party computation (MPC) protects the privacy of inputs and intermediate values of a computation, differential privacy (DP) ensures that the output itself does not reveal too much about individual inputs. For this purpose, MPC can be used to generate noise and add this noise to the output. However, securely generating and adding this noise is a challenge considering real-world implementations on finite-precision computers, since many DP mechanisms guarantee privacy only when noise is sampled from continuous distributions requiring infinite precision. We introduce efficient MPC protocols that securely realize noise sampling for several plaintext DP mechanisms that are secure against existing precision-based attacks: the discrete Laplace and Gaussian mechanisms, the snapping mechanism, and the integer-scaling Laplace and Gaussian mechanisms. Due to their inherent trade-offs, the favorable mechanism for a specific application depends on the available computation resources, type of function evaluated, and desired ( 𝜖,𝛿 ) -DP guarantee. The benchmarks of our protocols implemented in the state-of-the-art MPC framework MOTION (Braun et al., TOPS’22) demonstrate highly efficient online runtimes of less than 32 ms/query and down to about 1ms/query with batching in the two-party setting. Also the respective offline phases are practical, requiring only 51 ms to 5.6 seconds/query depending on the batch size.
安全多方计算(MPC)可保护输入和计算中间值的隐私,而差分隐私(DP)则可确保输出本身不会泄露太多关于单个输入的信息。为此,MPC 可用于生成噪声并将噪声添加到输出中。然而,考虑到在有限精度计算机上的实际应用,安全地生成和添加这种噪声是一项挑战,因为许多 DP 机制只有在从需要无限精度的连续分布中采样噪声时才能保证隐私。我们介绍了高效的 MPC 协议,可安全地实现几种明文 DP 机制的噪声采样,这些机制可安全地抵御现有的基于精度的攻击:离散拉普拉斯和高斯机制、抢断机制以及整数缩放拉普拉斯和高斯机制。由于其内在的权衡,针对特定应用的有利机制取决于可用的计算资源、评估函数的类型以及所需的 ( 𝜖,𝛿 ) -DP 保证。在最先进的 MPC 框架 MOTION(Braun 等人,TOPS'22)中实施的我们协议的基准测试表明,在双方设置的情况下,高效的在线运行时间小于 32 毫秒/查询,在批处理的情况下,可降至约 1 毫秒/查询。此外,相应的离线阶段也很实用,根据批量大小,每次查询只需 51 毫秒至 5.6 秒。
{"title":"Secure Noise Sampling for DP in MPC with Finite Precision","authors":"Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao","doi":"10.1145/3664476.3664490","DOIUrl":"https://doi.org/10.1145/3664476.3664490","url":null,"abstract":"While secure multi-party computation (MPC) protects the privacy of inputs and intermediate values of a computation, differential privacy (DP) ensures that the output itself does not reveal too much about individual inputs. For this purpose, MPC can be used to generate noise and add this noise to the output. However, securely generating and adding this noise is a challenge considering real-world implementations on finite-precision computers, since many DP mechanisms guarantee privacy only when noise is sampled from continuous distributions requiring infinite precision. We introduce efficient MPC protocols that securely realize noise sampling for several plaintext DP mechanisms that are secure against existing precision-based attacks: the discrete Laplace and Gaussian mechanisms, the snapping mechanism, and the integer-scaling Laplace and Gaussian mechanisms. Due to their inherent trade-offs, the favorable mechanism for a specific application depends on the available computation resources, type of function evaluated, and desired ( 𝜖,𝛿 ) -DP guarantee. The benchmarks of our protocols implemented in the state-of-the-art MPC framework MOTION (Braun et al., TOPS’22) demonstrate highly efficient online runtimes of less than 32 ms/query and down to about 1ms/query with batching in the two-party setting. Also the respective offline phases are practical, requiring only 51 ms to 5.6 seconds/query depending on the batch size.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"10 21","pages":"25:1-25:12"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141795672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON IDEA-DAC:通过 ZK-JSON 对可问责的去中心化匿名凭证进行完整性驱动的编辑
Pub Date : 2024-05-13 DOI: 10.1145/3589334.3645658
Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu
Decentralized Anonymous Credential (DAC) systems are increasingly relevant, especially when enhancing revocation mechanisms in the face of complex traceability challenges. This paper introduces IDEA-DAC , a paradigm shift from the conventional revoke-and-reissue methods, promoting direct and I ntegrity-D riven E diting (IDE) for A ccountable DAC s, which results in better integrity accountability, traceability, and system simplicity. We further incorporate an Edit-bound Conformity Check that ensures tailored integrity standards during credential amendments using R1CS-based ZK-SNARKs. Delving deeper, we propose ZK-JSON , a unique R1CS circuit design tailored for IDE over generic JSON documents. This design imposes strictly 𝑂 ( 𝑁 ) rank-1 constraints for variable-length JSON documents of up to 𝑁 bytes in length, encompassing serialization, encryption, and edit-bound conformity checks. Additionally, our circuits only necessitate a one-time compilation, setup, and smart contract deployment for homogeneous JSON documents up to a specified size. While preserving core DAC features such as selective disclosure, anonymity, and predicate provability, IDEA-DAC achieves precise data modification checks without revealing private content, ensuring only authorized edits are permitted. In summary, IDEA-DAC offers an enhanced methodology for large-scale JSON-formatted credential systems, setting a new standard in decentralized identity management efficiency and precision
去中心化匿名凭证(DAC)系统越来越重要,尤其是在面对复杂的可追溯性挑战时加强撤销机制。本文介绍了 IDEA-DAC,这是对传统的撤销和重发方法的范式转变,促进了可问责 DAC 的直接和完整性破坏编辑(IDE),从而实现了更好的完整性问责、可追溯性和系统简易性。我们进一步整合了编辑绑定符合性检查(Edit-bound Conformity Check),确保在使用基于 R1CS 的 ZK-SNARKs 进行凭证修订时采用量身定制的完整性标准。深入研究后,我们提出了 ZK-JSON,一种为通用 JSON 文档 IDE 量身定制的独特 R1CS 电路设计。该设计对长度不超过 𝑁 字节的可变长度 JSON 文档施加严格的 𝑂 ( 𝑁 ) 级-1 约束,包括序列化、加密和编辑绑定一致性检查。此外,我们的电路只需进行一次性编译、设置和智能合约部署,即可处理指定大小的同质 JSON 文档。IDEA-DAC 保留了选择性披露、匿名性和谓词可证明性等核心 DAC 功能,在不泄露隐私内容的情况下实现了精确的数据修改检查,确保只允许授权编辑。总之,IDEA-DAC 为大规模 JSON 格式的凭证系统提供了一种增强的方法,为分散式身份管理的效率和精确性设定了新标准。
{"title":"IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON","authors":"Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu","doi":"10.1145/3589334.3645658","DOIUrl":"https://doi.org/10.1145/3589334.3645658","url":null,"abstract":"Decentralized Anonymous Credential (DAC) systems are increasingly relevant, especially when enhancing revocation mechanisms in the face of complex traceability challenges. This paper introduces IDEA-DAC , a paradigm shift from the conventional revoke-and-reissue methods, promoting direct and I ntegrity-D riven E diting (IDE) for A ccountable DAC s, which results in better integrity accountability, traceability, and system simplicity. We further incorporate an Edit-bound Conformity Check that ensures tailored integrity standards during credential amendments using R1CS-based ZK-SNARKs. Delving deeper, we propose ZK-JSON , a unique R1CS circuit design tailored for IDE over generic JSON documents. This design imposes strictly 𝑂 ( 𝑁 ) rank-1 constraints for variable-length JSON documents of up to 𝑁 bytes in length, encompassing serialization, encryption, and edit-bound conformity checks. Additionally, our circuits only necessitate a one-time compilation, setup, and smart contract deployment for homogeneous JSON documents up to a specified size. While preserving core DAC features such as selective disclosure, anonymity, and predicate provability, IDEA-DAC achieves precise data modification checks without revealing private content, ensuring only authorized edits are permitted. In summary, IDEA-DAC offers an enhanced methodology for large-scale JSON-formatted credential systems, setting a new standard in decentralized identity management efficiency and precision","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"17 5","pages":"1868-1879"},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem 了解 Web3 生态系统中用户感知的安全风险和缓解策略
Pub Date : 2024-05-11 DOI: 10.1145/3613904.3642291
Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang
The advent of Web3 technologies promises unprecedented levels of user control and autonomy. However, this decentralization shifts the burden of security onto the users, making it crucial to understand their security behaviors and perceptions. To address this, our study introduces a comprehensive framework that identifies four core components of user interaction within the Web3 ecosystem: blockchain infrastructures, Web3-based Decentralized Applications (DApps), online communities, and off-chain cryptocurrency platforms. We delve into the security concerns perceived by users in each of these components and analyze the mitigation strategies they employ, ranging from risk assessment and aversion to diversification and acceptance. We further discuss the landscape of both technical and human-induced security risks in the Web3 ecosystem, identify the unique security differences between Web2 and Web3, and highlight key challenges that render users vulnerable, to provide implications for security design in Web3.
Web3 技术的出现使用户的控制和自主性达到了前所未有的水平。然而,这种去中心化将安全重担转移到了用户身上,因此了解用户的安全行为和感知至关重要。为了解决这个问题,我们的研究引入了一个综合框架,确定了 Web3 生态系统中用户互动的四个核心组成部分:区块链基础设施、基于 Web3 的去中心化应用程序(DApps)、在线社区和链外加密货币平台。我们深入探讨了用户在每个组成部分中感知到的安全问题,并分析了他们采用的缓解策略,包括风险评估和规避、多样化和接受等。我们进一步讨论了 Web3 生态系统中的技术和人为安全风险,确定了 Web2 和 Web3 之间独特的安全差异,并强调了使用户易受攻击的关键挑战,从而为 Web3 的安全设计提供启示。
{"title":"Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem","authors":"Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang","doi":"10.1145/3613904.3642291","DOIUrl":"https://doi.org/10.1145/3613904.3642291","url":null,"abstract":"The advent of Web3 technologies promises unprecedented levels of user control and autonomy. However, this decentralization shifts the burden of security onto the users, making it crucial to understand their security behaviors and perceptions. To address this, our study introduces a comprehensive framework that identifies four core components of user interaction within the Web3 ecosystem: blockchain infrastructures, Web3-based Decentralized Applications (DApps), online communities, and off-chain cryptocurrency platforms. We delve into the security concerns perceived by users in each of these components and analyze the mitigation strategies they employ, ranging from risk assessment and aversion to diversification and acceptance. We further discuss the landscape of both technical and human-induced security risks in the Web3 ecosystem, identify the unique security differences between Web2 and Web3, and highlight key challenges that render users vulnerable, to provide implications for security design in Web3.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":" 3","pages":"974:1-974:22"},"PeriodicalIF":0.0,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140988447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking Fastcrypto:通过持续基准测试开创密码学先河
Pub Date : 2024-05-07 DOI: 10.1145/3629527.3652266
K. Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang
,
,
{"title":"Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking","authors":"K. Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang","doi":"10.1145/3629527.3652266","DOIUrl":"https://doi.org/10.1145/3629527.3652266","url":null,"abstract":",","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"68 3","pages":"227-234"},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141003938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation Extractable Versions of Groth's zk-SNARK Revisited growth的zk-SNARK的模拟可提取版本重新访问
Pub Date : 2023-09-05 DOI: 10.1007/978-3-030-65411-5_22
Karim Baghery, Zaira Pindado, Carla Ràfols
{"title":"Simulation Extractable Versions of Groth's zk-SNARK Revisited","authors":"Karim Baghery, Zaira Pindado, Carla Ràfols","doi":"10.1007/978-3-030-65411-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-65411-5_22","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Colordag: An Incentive-Compatible Blockchain colorday:激励兼容的bbb
Pub Date : 2023-08-22 DOI: 10.48550/arXiv.2308.11379
Ittai Abraham, D. Dolev, Ittay Eyal, Joseph Y. Halpern
We present Colordag, a blockchain protocol where following the prescribed strategy is, with high probability, a best response as long as all miners have less than 1/2 of the mining power. We prove the correctness of Colordag even if there is an extremely powerful adversary who knows future actions of the scheduler: specifically, when agents will generate blocks and when messages will arrive. The state-of-the-art protocol, Fruitchain, is an epsilon-Nash equilibrium as long as all miners have less than 1/2 of the mining power. However, there is a simple deviation that guarantees that deviators are never worse off than they would be by following Fruitchain, and can sometimes do better. Thus, agents are motivated to deviate. Colordag implements a solution concept that we call epsilon-sure Nash equilibrium and does not suffer from this problem. Because it is an epsilon-sure Nash equilibrium, Colordag is an epsilon Nash equilibrium and with probability (1 - epsilon) is a best response.
我们提出了Colordag,这是一个区块链协议,只要所有矿工的挖矿能力小于1/2,遵循规定的策略就有很高的概率是最佳响应。我们证明了Colordag的正确性,即使有一个非常强大的对手知道调度程序的未来动作:具体来说,代理何时生成块以及消息何时到达。最先进的协议Fruitchain是一种epsilon-Nash均衡,只要所有矿工的挖矿能力低于二分之一。然而,有一个简单的偏差保证偏离者不会比遵循水果链更糟糕,有时甚至会做得更好。因此,代理人有偏离的动机。Colordag实现了一个解的概念,我们称之为确定纳什均衡,它不会受到这个问题的困扰。因为它是一个确定的纳什均衡,Colordag是一个确定的纳什均衡并且概率为(1 -)是最佳对策。
{"title":"Colordag: An Incentive-Compatible Blockchain","authors":"Ittai Abraham, D. Dolev, Ittay Eyal, Joseph Y. Halpern","doi":"10.48550/arXiv.2308.11379","DOIUrl":"https://doi.org/10.48550/arXiv.2308.11379","url":null,"abstract":"We present Colordag, a blockchain protocol where following the prescribed strategy is, with high probability, a best response as long as all miners have less than 1/2 of the mining power. We prove the correctness of Colordag even if there is an extremely powerful adversary who knows future actions of the scheduler: specifically, when agents will generate blocks and when messages will arrive. The state-of-the-art protocol, Fruitchain, is an epsilon-Nash equilibrium as long as all miners have less than 1/2 of the mining power. However, there is a simple deviation that guarantees that deviators are never worse off than they would be by following Fruitchain, and can sometimes do better. Thus, agents are motivated to deviate. Colordag implements a solution concept that we call epsilon-sure Nash equilibrium and does not suffer from this problem. Because it is an epsilon-sure Nash equilibrium, Colordag is an epsilon Nash equilibrium and with probability (1 - epsilon) is a best response.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures 紧格小格及其在哈希签名中的应用
Pub Date : 2023-05-21 DOI: 10.48550/arXiv.2305.12481
Yang Yu, Huiwen Jia, Xiaoyun Wang
This work aims to improve the practicality of gadget-based cryptosystems, with a focus on hash-and-sign signatures. To this end, we develop a compact gadget framework in which the used gadget is a square matrix instead of the short and fat one used in previous constructions. To work with this compact gadget, we devise a specialized gadget sampler, called semi-random sampler, to compute the approximate preimage. It first deterministically computes the error and then randomly samples the preimage. We show that for uniformly random targets, the preimage and error distributions are simulatable without knowing the trapdoor. This ensures the security of the signature applications. Compared to the Gaussian-distributed errors in previous algorithms, the deterministic errors have a smaller size, which lead to a substantial gain in security and enables a practically working instantiation. As the applications, we present two practically efficient gadget-based signature schemes based on NTRU and Ring-LWE respectively. The NTRU-based scheme offers comparable efficiency to Falcon and Mitaka and a simple implementation without the need of generating the NTRU trapdoor. The LWE-based scheme also achieves a desirable overall performance. It not only greatly outperforms the state-of-the-art LWE-based hash-and-sign signatures, but also has an even smaller size than the LWE-based Fiat-Shamir signature scheme Dilithium. These results fill the long-term gap in practical gadget-based signatures.
这项工作旨在提高基于小工具的密码系统的实用性,重点是哈希和签名签名。为此,我们开发了一个紧凑的小工具框架,其中使用的小工具是一个方阵,而不是在以前的结构中使用的短而胖的小工具。为了使用这个紧凑的小工具,我们设计了一个专门的小工具采样器,称为半随机采样器,来计算近似的原像。它首先确定地计算误差,然后对原图像进行随机采样。结果表明,对于均匀随机目标,在不知道陷门的情况下,原像分布和误差分布是可以模拟的。这样可以保证签名应用的安全性。与以前算法中的高斯分布错误相比,确定性错误具有更小的大小,从而大大提高了安全性,并实现了实际工作的实例化。作为应用,我们分别提出了基于NTRU和Ring-LWE的两种实用高效的基于小工具的签名方案。基于NTRU的方案提供了与Falcon和Mitaka相当的效率,并且在不需要生成NTRU活板门的情况下实现简单。基于lwe的方案也达到了理想的总体性能。它不仅大大优于最先进的基于lwe的哈希签名签名,而且比基于lwe的Fiat-Shamir签名方案diilithium更小。这些结果填补了基于小工具的实际签名的长期空白。
{"title":"Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures","authors":"Yang Yu, Huiwen Jia, Xiaoyun Wang","doi":"10.48550/arXiv.2305.12481","DOIUrl":"https://doi.org/10.48550/arXiv.2305.12481","url":null,"abstract":"This work aims to improve the practicality of gadget-based cryptosystems, with a focus on hash-and-sign signatures. To this end, we develop a compact gadget framework in which the used gadget is a square matrix instead of the short and fat one used in previous constructions. To work with this compact gadget, we devise a specialized gadget sampler, called semi-random sampler, to compute the approximate preimage. It first deterministically computes the error and then randomly samples the preimage. We show that for uniformly random targets, the preimage and error distributions are simulatable without knowing the trapdoor. This ensures the security of the signature applications. Compared to the Gaussian-distributed errors in previous algorithms, the deterministic errors have a smaller size, which lead to a substantial gain in security and enables a practically working instantiation. As the applications, we present two practically efficient gadget-based signature schemes based on NTRU and Ring-LWE respectively. The NTRU-based scheme offers comparable efficiency to Falcon and Mitaka and a simple implementation without the need of generating the NTRU trapdoor. The LWE-based scheme also achieves a desirable overall performance. It not only greatly outperforms the state-of-the-art LWE-based hash-and-sign signatures, but also has an even smaller size than the LWE-based Fiat-Shamir signature scheme Dilithium. These results fill the long-term gap in practical gadget-based signatures.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121060794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The special case of cyclotomic fields in quantum algorithms for unit groups 单位群量子算法中分环场的特例
Pub Date : 2023-03-07 DOI: 10.48550/arXiv.2303.03978
R. Barbulescu, Adrien Poulalion
Unit group computations are a cryptographic primitive for which one has a fast quantum algorithm, but the required number of qubits is $tilde O(m^5)$. In this work we propose a modification of the algorithm for which the number of qubits is $tilde O(m^2)$ in the case of cyclotomic fields. Moreover, under a recent conjecture on the size of the class group of $mathbb{Q}(zeta_m + zeta_m^{-1})$, the quantum algorithms is much simpler because it is a hidden subgroup problem (HSP) algorithm rather than its error estimation counterpart: continuous hidden subgroup problem (CHSP). We also discuss the (minor) speed-up obtained when exploiting Galois automorphisms thanks to the Buchmann-Pohst algorithm over $mathcal{O}_K$-lattices.
单位组计算是一种加密原语,可以使用快速量子算法,但所需的量子比特数为$tilde O(m^5)$。在这项工作中,我们提出了一种算法的修改,在环切场的情况下,量子比特的数量为$tilde O(m^2)$。此外,在最近关于$mathbb{Q}(zeta_m + zeta_m^{-1})$类群大小的猜想下,量子算法要简单得多,因为它是一个隐藏子群问题(HSP)算法,而不是其误差估计对应的连续隐藏子群问题(CHSP)。我们还讨论了利用$mathcal{O}_K$ -格上的Buchmann-Pohst算法利用伽罗瓦自同构时获得的(次要)加速。
{"title":"The special case of cyclotomic fields in quantum algorithms for unit groups","authors":"R. Barbulescu, Adrien Poulalion","doi":"10.48550/arXiv.2303.03978","DOIUrl":"https://doi.org/10.48550/arXiv.2303.03978","url":null,"abstract":"Unit group computations are a cryptographic primitive for which one has a fast quantum algorithm, but the required number of qubits is $tilde O(m^5)$. In this work we propose a modification of the algorithm for which the number of qubits is $tilde O(m^2)$ in the case of cyclotomic fields. Moreover, under a recent conjecture on the size of the class group of $mathbb{Q}(zeta_m + zeta_m^{-1})$, the quantum algorithms is much simpler because it is a hidden subgroup problem (HSP) algorithm rather than its error estimation counterpart: continuous hidden subgroup problem (CHSP). We also discuss the (minor) speed-up obtained when exploiting Galois automorphisms thanks to the Buchmann-Pohst algorithm over $mathcal{O}_K$-lattices.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Encryption with Secure Key Leasing 使用安全密钥租赁的公钥加密
Pub Date : 2023-02-22 DOI: 10.48550/arXiv.2302.11663
Shweta Agrawal, Fuyuki Kitagawa, R. Nishimaki, Shota Yamada, Takashi Yamakawa
We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a leased key achieves the decryption functionality but comes with the guarantee that if the quantum decryption key returned by a user passes a validity test, then the user has lost the ability to decrypt. Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021) but captures significantly more general adversarial strategies. In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software. Our results can be summarized as follows: 1. Definitions: We introduce the definition of PKE with secure key leasing and formalize security notions. 2. Constructing PKE with Secure Key Leasing: We provide a construction of PKE-SKL by leveraging a PKE scheme that satisfies a new security notion that we call consistent or inconsistent security against key leasing attacks (CoIC-KLA security). We then construct a CoIC-KLA secure PKE scheme using 1-key Ciphertext-Policy Functional Encryption (CPFE) that in turn can be based on any IND-CPA secure PKE scheme. 3. Identity Based Encryption, Attribute Based Encryption and Functional Encryption with Secure Key Leasing: We provide definitions of secure key leasing in the context of advanced encryption schemes such as identity based encryption (IBE), attribute-based encryption (ABE) and functional encryption (FE). Then we provide constructions by combining the above PKE-SKL with standard IBE, ABE and FE schemes.
我们引入了使用安全密钥租赁(PKE-SKL)进行公钥加密的概念。我们的概念支持解密密钥的租赁,这样租用的密钥就可以实现解密功能,但同时也要保证,如果用户返回的量子解密密钥通过了有效性测试,那么用户就失去了解密的能力。我们的概念在精神上类似于Ananth和La Placa (Eurocrypt 2021)引入的安全软件租赁(SSL)概念,但捕获了更普遍的对抗性策略。更详细地说,我们的对手并不局限于使用诚实的评估算法来运行盗版软件。我们的研究结果可以总结如下:1。定义:介绍了具有安全密钥租赁的PKE的定义,并形式化了安全概念。2. 使用安全密钥租赁构建PKE:我们通过利用PKE方案来构建PKE- skl,该方案满足新的安全概念,我们称之为针对密钥租赁攻击的一致或不一致安全(CoIC-KLA安全)。然后,我们使用1密钥密文-策略功能加密(CPFE)构建了一个CoIC-KLA安全PKE方案,该方案可以基于任何IND-CPA安全PKE方案。3.基于身份的加密、基于属性的加密和具有安全密钥租赁的功能加密:我们在高级加密方案(如基于身份的加密(IBE)、基于属性的加密(ABE)和功能加密(FE))的背景下提供安全密钥租赁的定义。然后,我们将上述PKE-SKL与标准的IBE、ABE和FE方案相结合,给出了结构。
{"title":"Public Key Encryption with Secure Key Leasing","authors":"Shweta Agrawal, Fuyuki Kitagawa, R. Nishimaki, Shota Yamada, Takashi Yamakawa","doi":"10.48550/arXiv.2302.11663","DOIUrl":"https://doi.org/10.48550/arXiv.2302.11663","url":null,"abstract":"We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a leased key achieves the decryption functionality but comes with the guarantee that if the quantum decryption key returned by a user passes a validity test, then the user has lost the ability to decrypt. Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021) but captures significantly more general adversarial strategies. In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software. Our results can be summarized as follows: 1. Definitions: We introduce the definition of PKE with secure key leasing and formalize security notions. 2. Constructing PKE with Secure Key Leasing: We provide a construction of PKE-SKL by leveraging a PKE scheme that satisfies a new security notion that we call consistent or inconsistent security against key leasing attacks (CoIC-KLA security). We then construct a CoIC-KLA secure PKE scheme using 1-key Ciphertext-Policy Functional Encryption (CPFE) that in turn can be based on any IND-CPA secure PKE scheme. 3. Identity Based Encryption, Attribute Based Encryption and Functional Encryption with Secure Key Leasing: We provide definitions of secure key leasing in the context of advanced encryption schemes such as identity based encryption (IBE), attribute-based encryption (ABE) and functional encryption (FE). Then we provide constructions by combining the above PKE-SKL with standard IBE, ABE and FE schemes.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Neural Networks for Encrypted Inference with TFHE 基于TFHE的深度神经网络加密推理
Pub Date : 2023-02-13 DOI: 10.48550/arXiv.2302.10906
A. Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames
Fully homomorphic encryption (FHE) is an encryption method that allows to perform computation on encrypted data, without decryption. FHE preserves the privacy of the users of online services that handle sensitive data, such as health data, biometrics, credit scores and other personal information. A common way to provide a valuable service on such data is through machine learning and, at this time, Neural Networks are the dominant machine learning model for unstructured data. In this work we show how to construct Deep Neural Networks (DNN) that are compatible with the constraints of TFHE, an FHE scheme that allows arbitrary depth computation circuits. We discuss the constraints and show the architecture of DNNs for two computer vision tasks. We benchmark the architectures using the Concrete stack, an open-source implementation of TFHE.
完全同态加密(FHE)是一种允许对加密数据执行计算而不需要解密的加密方法。FHE保护处理敏感数据(如健康数据、生物特征、信用评分和其他个人信息)的在线服务用户的隐私。在这些数据上提供有价值服务的一种常见方法是通过机器学习,而此时,神经网络是非结构化数据的主要机器学习模型。在这项工作中,我们展示了如何构建与TFHE约束兼容的深度神经网络(DNN), TFHE是一种允许任意深度计算电路的FHE方案。我们讨论了两个计算机视觉任务的约束条件,并展示了dnn的体系结构。我们使用Concrete栈(TFHE的开源实现)对架构进行基准测试。
{"title":"Deep Neural Networks for Encrypted Inference with TFHE","authors":"A. Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames","doi":"10.48550/arXiv.2302.10906","DOIUrl":"https://doi.org/10.48550/arXiv.2302.10906","url":null,"abstract":"Fully homomorphic encryption (FHE) is an encryption method that allows to perform computation on encrypted data, without decryption. FHE preserves the privacy of the users of online services that handle sensitive data, such as health data, biometrics, credit scores and other personal information. A common way to provide a valuable service on such data is through machine learning and, at this time, Neural Networks are the dominant machine learning model for unstructured data. In this work we show how to construct Deep Neural Networks (DNN) that are compatible with the constraints of TFHE, an FHE scheme that allows arbitrary depth computation circuits. We discuss the constraints and show the architecture of DNNs for two computer vision tasks. We benchmark the architectures using the Concrete stack, an open-source implementation of TFHE.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
IACR Cryptology ePrint Archive
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1