Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general

V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …

Practical non-interactive publicly verifiable secret sharing with thousands of parties

C Gentry, S Halevi, V Lyubashevsky - … on the Theory and Applications of …, 2022 - Springer
Non-interactive publicly verifiable secret sharing (PVSS) schemes enables (re-) sharing of
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …

Two-round multiparty secure computation from minimal assumptions

S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …

Foundations of coin mixing services

N Glaeser, M Maffei, G Malavolta… - Proceedings of the …, 2022 - dl.acm.org
Coin mixing services allow users to mix their cryptocurrency coins and thus enable
unlinkable payments in a way that prevents tracking of honest users' coins by both the …

Sok: Mitigation of front-running in decentralized finance

C Baum, J Hsin-yu Chiang, B David… - … Conference on Financial …, 2022 - Springer
Front-running is the malicious, and often illegal, act of both manipulating the order of
pending trades and injecting additional trades to make a profit at the cost of other users. In …

Succinct zero-knowledge batch proofs for set accumulators

M Campanelli, D Fiore, S Han, J Kim… - Proceedings of the …, 2022 - dl.acm.org
Cryptographic accumulators are a common solution to proving information about a large set
S. They allow one to compute a short digest of S and short certificates of some of its basic …

Multiparty generation of an RSA modulus

M Chen, J Doerner, Y Kondi, E Lee, S Rosefield… - Journal of …, 2022 - Springer
We present a new multiparty protocol for the distributed generation of biprime RSA moduli,
with security against any subset of maliciously colluding parties assuming oblivious transfer …

Fast privacy-preserving text classification based on secure multiparty computation

A Resende, D Railsback, R Dowsley… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We propose a privacy-preserving Naive Bayes classifier and apply it to the problem of
private text classification. In this setting, a party (Alice) holds a text message, while another …

Revisiting the power of non-equivocation in distributed protocols

N Ben-David, BY Chan, E Shi - … of the 2022 ACM Symposium on …, 2022 - dl.acm.org
Trusted hardware and new computing platforms such as RDMA naturally provide a non-
equivocation abstraction. Previous works have shown that non-equivocation allows us to …