首页 > 最新文献

IACR Cryptology ePrint Archive最新文献

英文 中文
Indifferentiability for Public Key Cryptosystems 公钥密码体制的不可微性
Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_3
Mark Zhandry, Cong Zhang
{"title":"Indifferentiability for Public Key Cryptosystems","authors":"Mark Zhandry, Cong Zhang","doi":"10.1007/978-3-030-56784-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_3","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spartan: Efficient and general-purpose zkSNARKs without trusted setup Spartan:没有可信设置的高效通用zksnark
Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_25
Srinath T. V. Setty
{"title":"Spartan: Efficient and general-purpose zkSNARKs without trusted setup","authors":"Srinath T. V. Setty","doi":"10.1007/978-3-030-56877-1_25","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_25","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115154409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 174
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums 除法性质的一个代数表述:重访度评估、立方体攻击和键无关和
Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-64837-4_15
Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
{"title":"An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums","authors":"Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang","doi":"10.1007/978-3-030-64837-4_15","DOIUrl":"https://doi.org/10.1007/978-3-030-64837-4_15","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Security Limitations of Classical-Client Delegated Quantum Computing 经典客户端委托量子计算的安全限制
Pub Date : 2020-07-03 DOI: 10.1007/978-3-030-64834-3_23
Christian Badertscher, Alexandru Cojocaru, Léo Colisson, E. Kashefi, D. Leichtle, A. Mantri, P. Wallden
{"title":"Security Limitations of Classical-Client Delegated Quantum Computing","authors":"Christian Badertscher, Alexandru Cojocaru, Léo Colisson, E. Kashefi, D. Leichtle, A. Mantri, P. Wallden","doi":"10.1007/978-3-030-64834-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-64834-3_23","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Linear Generalized ElGamal Encryption Scheme 线性广义ElGamal加密方案
Pub Date : 2020-07-01 DOI: 10.5220/0009828703720379
Demba Sow, Léo Robert, P. Lafourcade
ElGamal public key encryption scheme has been designed in the 80's. It is one of the first partial homomorphic encryption and one of the first IND-CPA probabilistic public key encryption scheme. A linear version has been recently proposed by Boneh et al. In this paper, we present a linear encryption based on a generalized version of ElGamal encryption scheme. We prove that our scheme is IND-CPA secure under linear assumption. We design a generalized ElGamal scheme from the generalized linear. We also run an evaluation of performances of our scheme. We show that the decryption algorithm is slightly faster than the existing versions.
ElGamal公钥加密方案是在80年代设计的。它是最早的部分同态加密和最早的IND-CPA概率公钥加密方案之一。Boneh等人最近提出了一个线性版本。本文提出了一种基于广义ElGamal加密方案的线性加密方案。在线性假设下证明了该方案是IND-CPA安全的。我们从广义线性出发,设计了一个广义ElGamal格式。我们还对方案的性能进行了评估。我们展示了解密算法比现有版本稍微快一些。
{"title":"Linear Generalized ElGamal Encryption Scheme","authors":"Demba Sow, Léo Robert, P. Lafourcade","doi":"10.5220/0009828703720379","DOIUrl":"https://doi.org/10.5220/0009828703720379","url":null,"abstract":"ElGamal public key encryption scheme has been designed in the 80's. It is one of the first partial homomorphic encryption and one of the first IND-CPA probabilistic public key encryption scheme. A linear version has been recently proposed by Boneh et al. In this paper, we present a linear encryption based on a generalized version of ElGamal encryption scheme. We prove that our scheme is IND-CPA secure under linear assumption. We design a generalized ElGamal scheme from the generalized linear. We also run an evaluation of performances of our scheme. We show that the decryption algorithm is slightly faster than the existing versions.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"SE-13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rational Behavior in Committee-Based Blockchains 基于委员会的区块链中的理性行为
Pub Date : 2020-06-11 DOI: 10.4230/LIPIcs.OPODIS.2020.12
Yackolley Amoussou-Guenou, B. Biais, M. Potop-Butucaru, S. Piergiovanni
We study the rational behaviors of participants in committee-based blockchains. Committee-based blockchains rely on specific blockchain consensus that must be guaranteed in presence of rational participants. We consider a simplified blockchain consensus algorithm based on existing or proposed committee-based blockchains that encapsulates the main actions of the participants: voting for a block, and checking its validity. Knowing that those actions have costs, and achieving the consensus gives rewards to committee members, we study using game theory how strategic players behave while trying to maximizing their gains. We consider different reward schemes, and found that in each setting, there exist equilibria where blockchain consensus is guaranteed; in some settings however, there can be coordination failures hindering consensus. Moreover, we study equilibria with trembling participants, which is a novelty in the context of committee-based blockchains. Trembling participants are rational that can do unintended actions with a low probability. We found that in presence of trembling participants, there exist equilibria where blockchain consensus is guaranteed; however, when only voters are rewarded, there also exist equilibria where validity can be violated.
我们研究了基于委员会的区块链中参与者的理性行为。基于委员会的区块链依赖于特定的区块链共识,必须在理性参与者在场的情况下得到保证。我们考虑了一种简化的区块链共识算法,该算法基于现有的或拟议的基于委员会的区块链,它封装了参与者的主要动作:对区块进行投票,并检查其有效性。知道这些行动是有成本的,而达成共识会给委员会成员带来回报,我们使用博弈论研究战略参与者在试图最大化收益时的行为。我们考虑了不同的奖励方案,发现在每种情况下,都存在保证区块链共识的均衡;然而,在某些情况下,协调失败可能会妨碍协商一致。此外,我们研究了参与者颤抖的均衡,这在基于委员会的区块链背景下是一种新奇的东西。颤抖的参与者是理性的,他们可以做出低概率的意外行为。我们发现,在参与者颤抖的情况下,存在保证区块链共识的均衡;然而,当只有选民得到奖励时,也存在可能违反有效性的均衡。
{"title":"Rational Behavior in Committee-Based Blockchains","authors":"Yackolley Amoussou-Guenou, B. Biais, M. Potop-Butucaru, S. Piergiovanni","doi":"10.4230/LIPIcs.OPODIS.2020.12","DOIUrl":"https://doi.org/10.4230/LIPIcs.OPODIS.2020.12","url":null,"abstract":"We study the rational behaviors of participants in committee-based blockchains. Committee-based blockchains rely on specific blockchain consensus that must be guaranteed in presence of rational participants. We consider a simplified blockchain consensus algorithm based on existing or proposed committee-based blockchains that encapsulates the main actions of the participants: voting for a block, and checking its validity. Knowing that those actions have costs, and achieving the consensus gives rewards to committee members, we study using game theory how strategic players behave while trying to maximizing their gains. We consider different reward schemes, and found that in each setting, there exist equilibria where blockchain consensus is guaranteed; in some settings however, there can be coordination failures hindering consensus. Moreover, we study equilibria with trembling participants, which is a novelty in the context of committee-based blockchains. Trembling participants are rational that can do unintended actions with a low probability. We found that in presence of trembling participants, there exist equilibria where blockchain consensus is guaranteed; however, when only voters are rewarded, there also exist equilibria where validity can be violated.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Game theoretical framework for analyzing Blockchains Robustness 分析区块链鲁棒性的博弈论框架
Pub Date : 2020-05-27 DOI: 10.4230/LIPIcs.DISC.2021.42
P. Zappalà, M. Belotti, M. Potop-Butucaru, Stefano Secci
Blockchains systems evolve in complex environments that mix classical patterns of faults (e.g crash faults, transient faults, Byzantine faults, churn) with selfish, rational or irrational behaviors typical to economical systems. In this paper we propose a game theoretical framework in order to formally characterize the robustness of blockchains systems in terms of resilience to rational deviations and immunity to Byzantine behaviors. Our framework includes necessary and sufficient conditions for checking the immunity and resilience of games and a new technique for composing games that preserves the robustness of individual games. We prove the practical interest of our formal framework by characterizing the robustness of three different protocols popular in blockchain systems: a HTLC-based payment scheme (a.k.a. Lightning Network), a side-chain protocol and a cross-chain swap protocol.
区块链系统在复杂的环境中进化,这些环境混合了经典的故障模式(例如崩溃故障、瞬态故障、拜占庭故障、流失)和经济系统典型的自私、理性或非理性行为。在本文中,我们提出了一个博弈论框架,以便从对理性偏差的弹性和对拜占庭行为的免疫力方面正式表征区块链系统的鲁棒性。我们的框架包括检查游戏免疫力和弹性的必要和充分条件,以及组成游戏的新技术,以保持单个游戏的鲁棒性。我们通过描述区块链系统中流行的三种不同协议的鲁棒性来证明我们的正式框架的实际意义:基于html的支付方案(又名闪电网络),侧链协议和跨链交换协议。
{"title":"Game theoretical framework for analyzing Blockchains Robustness","authors":"P. Zappalà, M. Belotti, M. Potop-Butucaru, Stefano Secci","doi":"10.4230/LIPIcs.DISC.2021.42","DOIUrl":"https://doi.org/10.4230/LIPIcs.DISC.2021.42","url":null,"abstract":"Blockchains systems evolve in complex environments that mix classical patterns of faults (e.g crash faults, transient faults, Byzantine faults, churn) with selfish, rational or irrational behaviors typical to economical systems. In this paper we propose a game theoretical framework in order to formally characterize the robustness of blockchains systems in terms of resilience to rational deviations and immunity to Byzantine behaviors. Our framework includes necessary and sufficient conditions for checking the immunity and resilience of games and a new technique for composing games that preserves the robustness of individual games. We prove the practical interest of our formal framework by characterizing the robustness of three different protocols popular in blockchain systems: a HTLC-based payment scheme (a.k.a. Lightning Network), a side-chain protocol and a cross-chain swap protocol.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics 用拟合优度统计分析矩阵操作模式
Pub Date : 2020-05-19 DOI: 10.3384/ecp2020171017
G. Teşeleanu
Romania Abstract. The Hill cipher is a classical poly-alphabetical cipher based on matrices. Although known plaintext attacks for the Hill cipher have been known for almost a century, feasible ciphertext only attacks have been developed only about ten years ago and for small matrix dimensions. In this paper we extend the ciphertext only attacks for the Hill cipher in two ways. First, we present two attacks for the affine version of the Hill cipher. Secondly, we show that the presented attacks can be extended to several modes of operations. We also provide the reader with several experimental results and show how the message’s language can influence the presented
罗马尼亚抽象。希尔密码是一种经典的基于矩阵的多字母密码。虽然已知的针对Hill密码的明文攻击已经有近一个世纪的历史了,但可行的仅针对密文的攻击仅在大约十年前才被开发出来,而且是针对小矩阵维度的。本文从两方面对希尔密码的纯密文攻击进行了扩展。首先,我们提出了两种针对希尔密码仿射版本的攻击。其次,我们证明了所提出的攻击可以扩展到几种操作模式。我们还为读者提供了几个实验结果,并展示了信息的语言如何影响呈现
{"title":"Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics","authors":"G. Teşeleanu","doi":"10.3384/ecp2020171017","DOIUrl":"https://doi.org/10.3384/ecp2020171017","url":null,"abstract":"Romania Abstract. The Hill cipher is a classical poly-alphabetical cipher based on matrices. Although known plaintext attacks for the Hill cipher have been known for almost a century, feasible ciphertext only attacks have been developed only about ten years ago and for small matrix dimensions. In this paper we extend the ciphertext only attacks for the Hill cipher in two ways. First, we present two attacks for the affine version of the Hill cipher. Secondly, we show that the presented attacks can be extended to several modes of operations. We also provide the reader with several experimental results and show how the message’s language can influence the presented","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inner-Product Functional Encryption with Fine-Grained Access Control 具有细粒度访问控制的内产品功能加密
Pub Date : 2020-05-16 DOI: 10.1007/978-3-030-64840-4_16
Michel Abdalla, D. Catalano, Romain Gay, B. Ursu
{"title":"Inner-Product Functional Encryption with Fine-Grained Access Control","authors":"Michel Abdalla, D. Catalano, Romain Gay, B. Ursu","doi":"10.1007/978-3-030-64840-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-64840-4_16","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Transferable E-cash: A Cleaner Model and the First Practical Instantiation 可转让电子现金:一个更清洁的模型和第一个实际实例
Pub Date : 2020-05-13 DOI: 10.1007/978-3-030-75248-4_20
B. Bauer, G. Fuchsbauer, Chen Qian
{"title":"Transferable E-cash: A Cleaner Model and the First Practical Instantiation","authors":"B. Bauer, G. Fuchsbauer, Chen Qian","doi":"10.1007/978-3-030-75248-4_20","DOIUrl":"https://doi.org/10.1007/978-3-030-75248-4_20","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134221541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
IACR Cryptology ePrint Archive
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1