• [digest] 2025 Week 9 (2/3)

    From IACR ePrint Archive@21:1/5 to All on Mon Mar 3 03:18:35 2025
    [continued from previous message]

    Leakage-resilient secret sharing schemes are a fundamental building block for secure computation in the presence of leakage. As a result, there is a strong interest in building secret sharing schemes that combine resilience in practical leakage scenarios
    with potential for efficient computation. In this work, we revisit the inner-product framework, where a secret $y$ is encoded by two vectors $(\omega, y)$, such that their inner product is equal to $y$. So far, the most efficient inner-product masking
    schemes (in which $\omega$ is public but random) are provably secure with the same security notions (e.g., in the abstract probing model) as additive, Boolean masking, yet at the cost of a slightly more expensive implementation. Hence, their advantage in
    terms of theoretical security guarantees remains unclear, also raising doubts about their practical relevance. We address this question by showing the leakage resilience of inner-product masking schemes, in the bounded leakage threat model. It depicts
    well implementation contexts where the physical noise is negligible. In this threat model, we show that if $m$ bits are leaked from the $d$ shares $y$ of the encoding over an $n$-bit field, then with probability at least $1−2^{-\lambda}$ over the
    choice of $\omega$, the scheme is $O(\sqrt{ 2^{−(d−1)·n+m+2\lambda}})$-leakage resilient. Furthermore, this result holds without assuming independent leakage from the shares, which may be challenging to enforce in practice. We additionally show that
    in large Mersenne-prime fields, a wise choice of the public coefficients $\omega$ can yield leakage resilience up to $O(n · 2^{−d·n+n+d})$, in the case where one physical bit from each share is revealed to the adversary. The exponential rate of the
    leakage resilience we put forward significantly improves upon previous bounds in additive masking, where the past literature exhibited a constant exponential rate only.



    ## 2025/338

    * Title: CT-LLVM: Automatic Large-Scale Constant-Time Analysis
    * Authors: Zhiyuan Zhang, Gilles Barthe
    * [Permalink](https://eprint.iacr.org/2025/338)
    * [Download](https://eprint.iacr.org/2025/338.pdf)

    ### Abstract

    Constant-time (CT) is a popular programming discipline to protect
    cryptographic libraries against micro-architectural timing attacks.
    One appeal of the CT discipline lies in its conceptual simplicity: a
    program is CT iff it has no secret-dependent data-flow,
    control-flow or variable-timing operation. Thanks to its simplicity,
    the CT discipline is supported by dozens of analysis tools. However, a
    recent user study demonstrates that these tools are seldom used due to
    poor usability and maintainability (Jancar et al. IEEE SP 2022).

    In this paper, we introduce CT-LLVM, a CT analysis tool designed for
    usability, maintainability and automatic large-scale analysis.
    Concretely, CT-LLVM is packaged as a
    LLVM plugin and is built as a thin layer on top of two standard LLVM
    analysis: def-use and alias analysis. Besides confirming known CT
    violations, we demonstrate the usability and scalability of CT-LLVM by automatically analyzing nine cryptographic libraries. On
    average, CT-LLVM can automatically and soundly analyze 36% of the
    functions in these libraries, proving that 61% of them are CT. In
    addition, the large-scale automatic analysis also reveals new
    vulnerabilities in these libraries. In the end, we demonstrate
    that CT-LLVM helps systematically mitigate compiler-introduced CT
    violations, which has been a long-standing issue in CT analysis.



    ## 2025/339

    * Title: Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More
    * Authors: Damiano Abram, Giulio Malavolta, Lawrence Roy
    * [Permalink](https://eprint.iacr.org/2025/339)
    * [Download](https://eprint.iacr.org/2025/339.pdf)

    ### Abstract

    We propose a new method to construct a public-key encryption scheme, where one can homomorphically transform a ciphertext encrypted under a key $\mathbf{x}$ into a ciphertext under $(P, P(\mathbf{x}))$, for any polynomial-time RAM program $P: \mathbf{x} \
    mapsto \mathbf{y}$ with runtime $T$ and memory $L$. Combined with other lattice techniques, this allows us to construct:
    1) Succinct-randomised encodings from RAM programs with encoder complexity $(|\mathbf{x}| + |\mathbf{y}|)\cdot \text{poly}(\log T, \log L)$ and rate-1 encodings.
    2) Laconic function evaluation for RAM programs, with encoder runtime bounded by $(|\mathbf{x}| + |\mathbf{y}|)\cdot\text{poly}(\log T, \log L)$ and rate-1 encodings.
    3) Key-policy attribute-based encryption for RAM programs, with ciphertexts of size $O(T)$. The same scheme can be converted to the register setting, obtaining linear CRS size in the number of parties.

    All of our schemes rely on the hardness of the \emph{decomposed learning with errors} (LWE) problem, along with other standard computational assumptions on lattices. The decomposed LWE problem can be interpreted as postulating the circular-security of a
    natural lattice-based public-key encryption scheme. To gain confidence in the assumption, we show that it is implied by the hardness of the succinct LWE problem of Wee (CRYPTO'24).



    ## 2025/340

    * Title: Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE
    * Authors: Martin R. Albrecht, Benjamin Benčina, Russell W. F. Lai
    * [Permalink](https://eprint.iacr.org/2025/340)
    * [Download](https://eprint.iacr.org/2025/340.pdf)

    ### Abstract

    Updatable public-key encryption (UPKE) allows anyone to update a public key while simultaneously producing an update token, given which the secret key holder could consistently update the secret key. Furthermore, ciphertexts encrypted under the old
    public key remain secure even if the updated secret key is leaked -- a property much desired in secure messaging. All existing lattice-based constructions of UPKE update keys by a noisy linear shift. As the noise accumulates, these schemes either require
    super-polynomial-size moduli or an a priori bounded number of updates to maintain decryption correctness.

    Inspired by recent works on cryptography based on the lattice isomorphism problem, we propose an alternative way to update keys in lattice-based UPKE. Instead of shifting, we rotate them. As rotations do not induce norm growth, our construction supports
    an unbounded number of updates with a polynomial-size modulus. The security of our scheme is based on the LWE assumption over hollow matrices -- matrices which generate linear codes with non-trivial hull -- and the hardness of permutation code
    equivalence. Along the way, we also show that LWE over hollow matrices is as hard as LWE over uniform matrices, and that a leftover hash lemma holds for hollow matrices.



    ## 2025/341

    * Title: CCA-Secure Traceable Threshold (ID-based) Encryption and Application
    * Authors: Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman
    * [Permalink](https://eprint.iacr.org/2025/341)
    * [Download](https://eprint.iacr.org/2025/341.pdf)

    ### Abstract

    A recent work by Boneh, Partap, and Rotem [Crypto'24] introduced the concept of traceable threshold encryption, in that if $t$ or more parties collude to construct a decryption box, which performs decryptions, then at least one party's identity can be
    traced by making a few black-box queries to the box. This has important applications, e.g., in blockchain mempool privacy, where collusion yields high financial gain through MEVs without any consequence - the possibility of tracing discourages collusion.
    Nevertheless, their definitions leave room for exploitation as they only achieve CPA security and do not consider inconsistency in decryption via different participating sets.

    This paper proposes stronger definitions of traceable threshold encryption, which supports CCA-security and consistency. Our main approach considers identity-based variants of traceable encryption (which we also define). It converts that to a CCA-secure
    construction, adapting two generic transformations, first using a one-time signature and then a fingerprinting code.
    We put forward two efficient instantiations of our identity-based scheme with different merits: our first construction is based on Boneh-Franklin IBE [Crypto'01] and has constant size ciphertexts but quadratic size public keys - this is proven secure
    based on XDH and BDDH. Our second construction is based on Boneh-Boyen IBE [Eurocrypt'04]. It supports both constant-size ciphertexts and constant-size public keys - this is proven secure based on a variant of the uber assumption over bilinear pairings.
    Our concrete analysis shows that the first construction's ciphertext is much (~6x) smaller than the second construction. Finally, we extend the definitions to support consistency and achieve it by adjoining an efficient, non-interactive proof of correct
    encryption.



    ## 2025/342

    * Title: Traceable Threshold Encryption without Trusted Dealer
    * Authors: Jan Bormet, Jonas Hofmann, Hussien Othman
    * [Permalink](https://eprint.iacr.org/2025/342)
    * [Download](https://eprint.iacr.org/2025/342.pdf)

    ### Abstract

    The fundamental assumption in $t$-out-of-$n$ threshold encryption is that the adversary can only corrupt less than $t$ parties. Unfortunately, it may be unfounded in practical scenarios where shareholders could be incentivized to collude. Boneh, Partap,
    and Rotem (Crypto'24) recently addressed the setting where $t$ or more shareholders work together to decrypt illegally. Inspired by the well-established notion of traitor tracing in broadcast encryption, they added a traceability mechanism that
    guarantees identifying at least one of the colluders. They provide several constructions that enable traceability, all of which require a trusted dealer to distribute the secret shares. While the trusted dealer can be replaced with a DKG for conventional
    threshold encryption, it is unclear how to do so without compromising traceability. As thresholdizing is meant to mitigate a single point of failure, a natural question that remains is: Can we construct an efficient traceable threshold encryption scheme
    that does not rely on a trusted party to distribute the secret shares?
    In this paper, we achieve two dealerless traceable threshold encryption constructions with different merits by extending the PLBE primitive of Boneh et al. (Eurocrypt'06) and combining it with the silent setup threshold encryption construction of
    Garg et al. (Crypto'24). Our first construction achieves an amortized ciphertext of size $O(1)$ (for $O(n)$ ciphertexts). Our second construction achieves constant ciphertext size even in the worst case but requires a less efficient preprocessing phase
    as a tradeoff. Both our constructions enjoy a constant secret key size and do not require any interaction between the parties.
    An additional restriction in the constructions of Boneh et al. is that they can only guarantee to find at least one colluder, leaving techniques to identify more traitors as an open problem. In this paper, we take a first step towards solving this
    question by formalizing a technique and applying it to our first construction. Namely, our first construction enables tracing $t$ traitors.



    ## 2025/343

    * Title: Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms
    * Authors: Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila
    * [Permalink](https://eprint.iacr.org/2025/343)
    * [Download](https://eprint.iacr.org/2025/343.pdf)

    ### Abstract

    A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a passively secure public-key encryption (PKE) scheme and then apply
    the Fujisaki–Okamoto (FO) transform that turns any such PKE scheme into an IND-CCA secure KEM. While the base security requirement for KEMs is typically IND-CCA security, adversaries in practice can sometimes observe and attack many public keys and/or
    ciphertexts, which is referred to as multi-challenge security. FO does not necessarily guarantee multi-challenge security: for example, FrodoKEM, a Round 3 alternate in NIST’s post-quantum project, used FO to achieve IND-CCA security, but was
    subsequently shown to be vulnerable to attackers that can target multiple ciphertexts. To avert this multi-ciphertext attack, the FrodoKEM team added a salt to the encapsulation procedure and proved that this does not degrade (single-ciphertext) IND-CCA
    security. The formal analysis of whether this indeed averts multi-ciphertext attacks, however, was left open, which we address in this work.

    Firstly, we formalize FrodoKEM's approach as a new variant of the FO transform, called the salted FO transform. Secondly, we give tight reductions from multi-challenge security of the resulting KEM to multi-challenge security of the underlying public key
    encryption scheme, in both the random oracle model (ROM) and the quantum-accessible ROM (QROM). Together these results justify the multi-ciphertext security of the salted FrodoKEM scheme, and can also be used generically by other schemes requiring multi-
    ciphertext security.



    ## 2025/344

    * Title: Publicly Verifiable Generalized Secret Sharing and Its Application in Building Decentralized Exchange
    * Authors: Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang
    * [Permalink](https://eprint.iacr.org/2025/344)
    * [Download](https://eprint.iacr.org/2025/344.pdf)

    ### Abstract

    Generalized secret sharing (GSS), which can offer more flexibility by accommodating diverse access structures and conditions, has been under-explored in distributed computing over the past decades. To address the gaps, we propose the publicly verifiable
    generalized secret sharing (PVGSS) scheme, enhancing the applicability of GSS in transparent systems. Public verifiability is a crucial property to gain trustworthiness for decentralized systems like blockchain. We begin by introducing two GSS
    constructions, one based on Shamir's secret sharing and the other on the linear secret sharing scheme (LSSS). Next, we present PVGSS schemes that combine GSS with non-interactive zero-knowledge (NIZK) proofs. Further, we construct a decentralized
    exchange (DEX) based on PVGSS scheme, where any users can participate in exchanges and engage in arbitrage. Specifically, users can fairly swap ERC-20 tokens with passive watchers, who earn profits by providing arbitration services. The critical property
    of "fairness" required by the DEX is ensured through a sophisticated access structure, supported by the PVGSS scheme. We provide a comprehensive evaluation on the performance of the PVGSS schemes and the monetary costs for users in the DEX. The results
    demonstrate the feasibility and practicality of this approach in real-world applications.



    ## 2025/345

    * Title: Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation
    * Authors: Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang
    * [Permalink](https://eprint.iacr.org/2025/345)
    * [Download](https://eprint.iacr.org/2025/345.pdf)

    ### Abstract

    Proxy re-encryption (PRE) has been regarded as an effective cryptographic primitive in data sharing systems with distributed proxies. However, no literature considers the honesty of data owners, which is critical in the age of big data. In this paper, we
    fill the gap by introducing a new proxy re-encryption scheme, called publicly verifiable threshold PRE (PVTPRE). Briefly speaking, we innovatively apply a slightly modified publicly verifiable secret sharing (PVSS) scheme to distribute the re-encryption
    keys to multiple proxies. Consequently, we achieve publicly verifiability of data owners non-interactively. Then, the correctness of data users in decryption and public verifiability of proxies in re-encryption are guaranteed seamlessly through execution
    of the PVSS reconstruction algorithms. We further prove that PVTPRE satisfies IND-CPA security. Besides, we put forward a privacy-preserving data rights confirmation framework by providing clear principles for data ownership and usage, based on the
    PVTPRE scheme and blockchain. Blockchain plays the role of data bank and smart contract engine, providing reliable storage and verification for all framework. To our knowledge, we are the first to systematically investigate data rights confirmation
    considering privacy as well as public verifiability, addressing the growing need for robust mechanisms to protect data rights and ensure transparency. Finally, we conduct comprehensive experiments to illustrate the correctness, feasibility and
    effectiveness. The experimental results show that our PVTPRE outperforms other PREs in many aspects.



    ## 2025/346

    * Title: Homomorphic Encryption for Large Integers from Nested Residue Number Systems
    * Authors: Dan Boneh, Jaehyung Kim
    * [Permalink](https://eprint.iacr.org/2025/346)
    * [Download](https://eprint.iacr.org/2025/346.pdf)

    ### Abstract

    Existing fully homomorphic encryption (FHE) schemes primarily support a plaintext space defined over a relatively small prime. However, in some important applications of FHE one needs arithmetic over a large prescribed prime. In this paper we construct a
    new FHE system that is specifically designed for this purpose.
    Our system composes three layers of residue systems to enable much better performance than was previously possible. Our experiments show that for arithmetic modulo a 256-bit integer, when compared to the TFHE-rs implementation of 256-bit arithmetic, our
    new system achieves a factor of a thousand better multiplication throughput and a factor of ten better latency. Moreover, for a 2048-bit prime modulus we achieve far better performance than was previously possible.



    ## 2025/347

    * Title: Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries
    * Authors: Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Ye Dong, Xudong Chen
    * [Permalink](https://eprint.iacr.org/2025/347)
    * [Download](https://eprint.iacr.org/2025/347.pdf)

    ### Abstract

    With the growing emphasis on data privacy, secure multi-party computation has garnered significant attention for its strong security guarantees in developing privacy-preserving machine learning (PPML) schemes. However, only a few works address scenarios
    with a large number of participants. The state of the art by Liu et al. (LXY24, USENIX Security'24) first achieves a practical PPML protocol for up to 63 parties but is constrained to semi-honest security. Although naive extensions to the malicious
    setting are possible, they would introduce significant overhead.
    In this paper, we propose Helix, a scalable framework for maliciously secure PPML in the honest majority setting, aiming to enhance both the scalability and practicality of maliciously secure protocols. In particular, we report a privacy leakage issue in
    LXY24 during prefix OR operations and introduce a round-optimized alternative based on a single-round vectorized three-layer multiplication protocol. Additionally, by exploiting reusability properties within the computation process, we propose
    lightweight compression protocols that substantially improve the efficiency of multiplication verification. We also develop a batch check protocol to reduce the computational complexity of revealing operations in the malicious setting. For 63-party
    neural network inference, compared to the semi-honest LXY24, Helix is only 1.9$\times$ (1.1$\times$) slower in the online phase and 1.2$\times$ (1.1$\times$) slower in preprocessing under LAN (WAN) in the best case.



    ## 2025/348

    * Title: Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication
    * Authors: Nora Trapp, Diego Ongaro
    * [Permalink](https://eprint.iacr.org/2025/348)
    * [Download](https://eprint.iacr.org/2025/348.pdf)

    ### Abstract

    Existing secret management techniques demand users memorize complex passwords, store convoluted recovery phrases, or place their trust in a specific service or hardware provider. We have designed a novel protocol that combines existing cryptographic
    techniques to eliminate these complications and reduce user complexity to recalling a short PIN. Our protocol specifically focuses on a distributed approach to secret storage that leverages Oblivious Pseudorandom Functions (OPRFs) and a Secret-Sharing
    Scheme (SSS) combined with self-destructing secrets to minimize the trust placed in any singular server. Additionally, our approach allows for servers distributed across organizations, eliminating the need to trust a singular service operator. We have
    built an open-source implementation of the client and server sides of this new protocol, the latter of which has variants for running on commodity hardware and secure hardware.



    ## 2025/349

    * Title: Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once
    * Authors: Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
    * [Permalink](https://eprint.iacr.org/2025/349)
    * [Download](https://eprint.iacr.org/2025/349.pdf)

    ### Abstract

    We study efficient public randomness generation protocols in the PASSO (PArties Speak Sequentially Once) model for multi-party computation (MPC). PASSO is a variation of traditional MPC where $n$ parties are executed in sequence and each party ``speaks''
    only once, broadcasting and sending secret messages only to parties further down the line. Prior results in this setting include information-theoretic protocols in which the computational complexity scales exponentially with the number of corruptions $t$
    (CRYPTO 2022), as well as more efficient computationally-secure protocols either assuming a trusted setup phase or DDH (FC 2024). Moreover, these works only consider security against static adversaries.

    In this work, we focus on computational security against adaptive adversaries and from minimal assumptions, and improve on the works mentioned above in several ways:

    - Assuming the existence of non-interactive perfectly binding commitments, we design protocols with $n=3t+1$ or $n=4t$ parties that are efficient and secure whenever $t$ is small compared to the security parameter $\lambda$ (e.g., $t$ is constant). This
    improves the resiliency of all previous protocols, even those requiring a trusted setup. It also shows that $n=4$ parties are necessary and sufficient for $t=1$ corruptions in the computational setting, while $n=5$ parties are required for information-
    theoretic security.

    - Under the same assumption, we design protocols with $n=4t+2$ or $n=5t+2$ parties (depending on the adversarial network model) which are efficient whenever $t=poly(\lambda)$. This improves on the existing DDH-based protocol both in terms of resiliency
    and the underlying assumptions.

    - We design efficient protocols with $n=5t+3$ or $n=6t+3$ parties (depending on the adversarial network model) assuming the existence of one-way functions.

    We complement these results by studying lower bounds for randomness generation protocols in the computational setting.



    ## 2025/350

    * Title: Bootstrapping with RMFE for Fully Homomorphic Encryption
    * Authors: Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang
    * [Permalink](https://eprint.iacr.org/2025/350)
    * [Download](https://eprint.iacr.org/2025/350.pdf)

    ### Abstract

    There is a heavy preference towards instantiating BGV and BFV homomorphic encryption schemes where the cyclotomic order $m$ is a power of two, as this admits highly efficient fast Fourier transformations. Field Instruction Multiple Data (FIMD) was
    introduced to increase packing capacity in the case of small primes and improve amortised performance, using reverse multiplication-friendly embeddings (RMFEs) to encode more data into each SIMD slot. However, FIMD currently does not admit bootstrapping.

    In this work, we achieve bootstrapping for RMFE-packed ciphertexts with low capacity loss. We first adapt the digit extraction algorithm to work over RMFE-packed ciphertexts, by applying the recode map after every evaluation of the lifting polynomial.
    This allows us to follow the blueprint of thin bootstrapping, performing digit extraction on a single ciphertext. To achieve the low capacity loss, we introduce correction maps to the Halevi-Shoup digit extraction algorithm, to remove all but the final
    recode of RMFE digit extraction.

    We implement several workflows for bootstrapping RMFE-packed ciphertexts in HElib, and benchmark them against thin bootstrapping for $m=32768$. Our experiments show that the basic strategy of recoding multiple times in digit extraction yield better data
    packing, but result in very low remaining capacity and latencies of up to hundreds of seconds. On the other hand, using correction maps gives up to $6$ additional multiplicative depth and brings latencies often below $10$ seconds, at the cost of lower
    packing capacity.



    ## 2025/351

    * Title: Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure
    * Authors: Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang
    * [Permalink](https://eprint.iacr.org/2025/351)
    * [Download](https://eprint.iacr.org/2025/351.pdf)

    ### Abstract

    Falcon is one of post-quantum signature schemes selected by NIST for standardization. With the deployment underway, its implementation security is of great importance. In this work, we focus on the side-channel security of Falcon and our contributions
    are threefold.

    First, by exploiting the symplecticity of NTRU and a recent decoding technique, we dramatically improve the key recovery using power leakages within Falcon Gaussian samplers. Compared to the state of the art (Zhang, Lin, Yu and Wang, EUROCRYPT 2023), the
    amount of traces required by our attack for a full key recovery is reduced by at least 85%.

    Secondly, we present a complete power analysis for two exposed power leakages within Falcon’s integer Gaussian sampler. We identify new sources of these leakages, which have not been identified by previous works, and conduct detailed security
    evaluations within the reference implementation of Falcon on Chipwhisperer.

    Thirdly, we propose effective and easy-to-implement countermeasures against both two leakages to protect the whole Falcon’s integer Gaussian sampler. Configured with our countermeasures, we provide security evaluations on Chipwhisperer and report
    performance of protected implementation. Experimental results highlight that our countermeasures admit a practical trade-off between effciency and side-channel security.



    ## 2025/352

    * Title: Efficient NIZK Arguments with Straight-Line Simulation and Extraction * Authors: Michele Ciampi, Ivan Visconti
    * [Permalink](https://eprint.iacr.org/2025/352)
    * [Download](https://eprint.iacr.org/2025/352.pdf)

    ### Abstract

    Non-interactive zero-knowledge (NIZK) arguments allow a prover to convince a verifier about the truthfulness of an NP-statement by sending just one message, without disclosing any additional information. In several practical scenarios, the Fiat-Shamir
    transform is used to convert an efficient constant-round public-coin honest-verifier zero-knowledge proof system into an efficient NIZK argument system. This approach is provably secure in the random oracle model, crucially requires the programmability
    of the random oracle and extraction works through rewinds. The works of Lindell [TCC 2015] and Ciampi et al. [TCC 2016] proposed efficient NIZK arguments with non-programmable
    random oracles along with a programmable common reference string. In this work we show an efficient NIZK argument with straight-line simulation and extraction that relies on features that alone are insufficient to construct NIZK arguments (regardless of
    efficiency). More specifically we consider the notion of quasi-polynomial time simulation proposed by Pass in [EUROCRYPT 2003] and combine it with simulation and extraction with non-programmable random
    oracles thus obtaining a NIZK argument of knowledge where neither the zero-knowledge simulator, nor the argument of knowledge extractor needs to program the random oracle. Still, both the simulator and the extractor are straight-line. Our construction
    uses as a building block a modification of the Fischlin’s transform [CRYPTO 2005] and combines it with the concept of dense puzzles introduced by Baldimtsi et al. [ASIACRYPT 2016]. We also argue that our NIZK argument system inherits the efficiency
    features of Fischlin’s transform, which represents the main advantage of Fischlin’s protocol over existing schemes.



    ## 2025/353

    * Title: Stronger Security for Threshold Blind Signatures
    * Authors: Anja Lehmann, Phillip Nazarian, Cavit Özbay
    * [Permalink](https://eprint.iacr.org/2025/353)
    * [Download](https://eprint.iacr.org/2025/353.pdf)

    ### Abstract

    Blind signatures allow a user to obtain a signature from an issuer in a privacy-preserving way: the issuer neither learns the signed message, nor can link the signature to its issuance. The threshold version of blind signatures further splits the secret
    key among n issuers, and requires the user to obtain at least t ≤ n of signature shares in order to derive the final signature. Security should then hold as long as at most t − 1 issuers are corrupt. Security for blind signatures is expressed through
    the notion of one-more unforgeability and demands that an adversary must not be able to produce more signatures than what is considered trivial after its interactions with the honest issuer(s). While one-more unforgeability is well understood for the
    single-issuer setting, the situation is much less clear in the threshold case: due to the blind issuance, counting which interactions can yield a trivial signature is a challenging task. Existing works bypass that challenge by using simplified models
    that do not fully capture the expectations of the threshold setting. In this work, we study the security of threshold blind signatures, and propose a framework of one-more unforgeability notions where the adversary can corrupt c < t issuers. Our model is
    generic enough to capture both interactive and non-interactive protocols, and it provides a set of natural properties with increasingly stronger guarantees, giving the issuers gradually more control over how their shares can be combined. As a point of
    comparison, we reconsider the existing threshold blind signature models and show that their security guarantees are weaker and less clearly comprehensible than they seem. We then re-assess the security of existing threshold blind signature schemes –
    BLS-based and Snowblind – in our framework, and show how to lift them to provide stronger security.



    ## 2025/354

    * Title: Delayed-Input Multi-Party Computation
    * Authors: Michele Ciampi, Jure Sternad, Yu Xia
    * [Permalink](https://eprint.iacr.org/2025/354)
    * [Download](https://eprint.iacr.org/2025/354.pdf)

    ### Abstract


    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)