Secure IoT in the era of quantum computers—Where are the bottlenecks?
M Schöffel, F Lauer, CC Rheinländer, N Wehn - Sensors, 2022 - mdpi.com
Recent progress in quantum computers severely endangers the security of widely used
public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is …
public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is …
Stacking Sigmas: A Framework to Compose -Protocols for Disjunctions
Abstract Zero-Knowledge (ZK) Proofs for disjunctive statements have been a focus of a long
line of research. Classical results such as Cramer et al.[CRYPTO'94] and Abe et al.[AC'02] …
line of research. Classical results such as Cramer et al.[CRYPTO'94] and Abe et al.[AC'02] …
Speed-stacking: fast sublinear zero-knowledge proofs for disjunctions
A Goel, M Hall-Andersen, G Kaptchuk… - … Conference on the Theory …, 2023 - Springer
Building on recent compilers for efficient disjunctive composition (eg an OR of multiple
clauses) of zero-knowledge proofs (eg Goel et al.[EUROCRYPT'22]) we propose a new …
clauses) of zero-knowledge proofs (eg Goel et al.[EUROCRYPT'22]) we propose a new …
Energy efficiency analysis of post-quantum cryptographic algorithms
Classical cryptographic schemes in use today are based on the difficulty of certain number
theoretic problems. Security is guaranteed by the fact that the computational work required …
theoretic problems. Security is guaranteed by the fact that the computational work required …
Dora: A Simple Approach to Zero-Knowledge for RAM Programs
A Goel, M Hall-Andersen, G Kaptchuk - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …
Efficient set membership proofs using mpc-in-the-head
Set membership proofs are an invaluable part of privacy preserving systems. These proofs
allow a prover to demonstrate knowledge of a witness $ w $ corresponding to a secret …
allow a prover to demonstrate knowledge of a witness $ w $ corresponding to a secret …
Efficient proofs of software exploitability for real-world processors
M Green, M Hall-Andersen, E Hennenfent… - Proceedings on …, 2023 - petsymposium.org
We consider the problem of proving in zero-knowledge the existence of vulnerabilities in
executables compiled to run on real-world processors. We demonstrate that it is practical to …
executables compiled to run on real-world processors. We demonstrate that it is practical to …
[PDF][PDF] Imbalanced Cryptographic Protocols
G Van Laer - 2022 - jscholarship.library.jhu.edu
Efficiency is paramount when designing cryptographic protocols, heavy mathematical
operations often increase computation time, even for modern computers. Moreover, they …
operations often increase computation time, even for modern computers. Moreover, they …
A New Type of Signature Scheme Derived from a MRHS Representation of a Symmetric Cipher
P Zajac, P Spacek - Infocommunications Journal, 2019 - real.mtak.hu
We propose a new concept of (post-quantum) digital signature algorithm derived from a
symmetric cipher. Key derivation is based on a system of Multiple-Right-Hand-Sides …
symmetric cipher. Key derivation is based on a system of Multiple-Right-Hand-Sides …
[PDF][PDF] Stacking Sigmas
Abstract Zero-Knowledge (ZK) Proofs for disjunctive statements have been a focus of a long
line of research. Classical results such as Cramer et al.[CRYPTO'94] and Abe et al.[AC'02] …
line of research. Classical results such as Cramer et al.[CRYPTO'94] and Abe et al.[AC'02] …