• [digest] 2024 Week 28 (2/3)

    From IACR ePrint Archive@21:1/5 to All on Mon Jul 15 02:25:07 2024
    [continued from previous message]

    We introduce a unifying framework for capturing both ``sample-based'' adversaries that are provided with direct access to individual samples and ``gradient-based'' ones that are restricted to issuing gradient-based queries that are averaged over all
    given samples via a loss function. Within our framework, we establish a general feasibility result showing that any sample-based adversary can be simulated by a seemingly-weaker gradient-based one. Moreover, the simulation exhibits a nearly optimal
    overhead in terms of the gradient-based simulator's running time. Finally, we extend and refine our simulation technique to construct a gradient-based simulator that is fully parallelizable (crucial for avoiding an undesirable overhead for parallelizable
    cryptanalytic tasks), which is then used to construct a gradient-based simulator that executes the particular and highly useful gradient-descent method.

    Taken together, although the extent to which ML methods may outperform classical cryptanalytic approaches is still somewhat unclear, our results indicate that such gradient-based methods are not inherently limited by their seemingly restricted access to
    the provided samples.



    ## 2024/1127

    * Title: Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
    * Authors: Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega
    * [Permalink](https://eprint.iacr.org/2024/1127)
    * [Download](https://eprint.iacr.org/2024/1127.pdf)

    ### Abstract

    Recent advancements in transformers have revolutionized machine learning, forming the core of Large language models (LLMs). However, integrating these systems into everyday applications raises privacy concerns as client queries are exposed to model
    owners. Secure multiparty computation (MPC) allows parties to evaluate machine learning applications while keeping sensitive user inputs and proprietary models private. Due to inherent MPC costs, recent works introduce model-specific optimizations that
    hinder widespread adoption by machine learning researchers. CrypTen (NeurIPS'21) aimed to solve this problem by exposing MPC primitives via common machine learning abstractions such as tensors and modular neural networks. Unfortunately, CrypTen and many
    other MPC frameworks rely on polynomial approximations of the non-linear functions, resulting in high errors and communication complexity.

    This paper introduces Curl, an easy-to-use MPC framework that evaluates non-linear functions as lookup tables, resulting in better approximations and significant round and communication reduction. Curl exposes a similar programming model as CrypTen and
    is highly parallelizable through tensors. At its core, Curl relies on discrete wavelet transformations to reduce the lookup table size without sacrificing accuracy, which results in up to $19\times$ round and communication reduction compared to CrypTen
    for non-linear functions such as logarithms and reciprocals. We evaluate Curl on a diverse set of LLMs, including BERT, GPT-2, and GPT Neo, and compare against state-of-the-art related works such as Iron (NeurIPS'22) and Bolt (S&P'24) achieving at least $
    1.9\times$ less communication and latency.

    Finally, we resolve a long-standing debate regarding the security of widely used probabilistic truncation protocols by proving their security in the stand-alone model. This is of independent interest as many related works rely on this truncation style.



    ## 2024/1128

    * Title: Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
    * Authors: Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung
    * [Permalink](https://eprint.iacr.org/2024/1128)
    * [Download](https://eprint.iacr.org/2024/1128.pdf)

    ### Abstract

    We present a novel cryptographic paradigm denoted ``cryptiny:'' Employing a single cryptographic value for several security goals, thus ``compacting'' the communication sent over a space-restricted (narrow) channel, while still proving security.
    Cryptiny is contrary to the classical cryptographic convention of using a separate cryptographic element for each security goal.

    Demonstrating the importance of cryptiny, we employ it for securing a critical IoT configuration in which a broadcasting ``thing'' (called beacon) operates within stringent bandwidth constraints. In this setting, a compact BLE-broadcasting beacon
    lacking Internet connectivity efficiently directs brief (non fragmented) messages to its remotely pre-paired owner in real-time. Communication transpires through BLE-to-IP gateway devices denoted observers, (typically smartphones in the beacon's vicinity)
    , and subsequently via a cloud app server. The gateway device as well, piggybacks on the transmission a secure and private message to the owner. This configuration is a generic setting for the current and future IoT real-time ecosystems, where billion of
    owners, beacons, and observers operate.

    The configuration instances (analogous to TLS instances over the Internet) imposes high security and privacy demands. We prove that our cryptiny-based protocol for securing the above configuration achieves CCA-secrecy for the beacon's and the observer's
    messages with backward and forward security for the observer's message, as well simultaneously achieving mutual privacy for beacons and for observers. Achieving backward and forward security is important since beacon devices may be far from their owners
    for a long duration and may be passively tampered with. In addition, for the backward security proof we develop a new encryption scheme we call ``shifted-DHIES'' (``SDHIES'' for short), which generalizes DHIES. An interesting feature of SDHIES is that
    encryption is performed with a function of the public key rather than the public key itself.



    ## 2024/1129

    * Title: Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions
    * Authors: Ryuya Hayashi, Yusuke Sakai, Shota Yamada
    * [Permalink](https://eprint.iacr.org/2024/1129)
    * [Download](https://eprint.iacr.org/2024/1129.pdf)

    ### Abstract

    Attribute-based signatures (ABS) allow users to simultaneously sign messages and prove their possession of some attributes while hiding the attributes and revealing only the fact that they satisfy a public policy. In this paper, we propose a generic
    construction of ABS for circuits of unbounded depth and size with optimal parameter size, meaning that the lengths of public parameters, keys, and signatures are all constant. Our generic construction can be instantiated from various standard assumptions
    including LWE or DLIN. Only previous ABS construction with optimal parameter size necessitates succinct non-interactive argument of knowledge, which can be only constructed from non-standard assumptions. Our generic construction is based on RAM
    delegations, which intuitively allows us to compress the evaluation of a circuit when inputs are public. In high level, we find a way to compress the computation of the policy circuit on input a user attribute to achieve overall parameter size, while
    hiding the user policy at the same time.



    ## 2024/1130

    * Title: Distributed Verifiable Random Function With Compact Proof
    * Authors: Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, Oğuz Yayla
    * [Permalink](https://eprint.iacr.org/2024/1130)
    * [Download](https://eprint.iacr.org/2024/1130.pdf)

    ### Abstract

    Verifiable Random Functions (VRFs) are cryptographic primitives that generate unpredictable randomness along with proofs that are verifiable, a critical requirement for blockchain applications in decentralized finance, online gaming, and more. Existing
    VRF constructions often rely on centralized entities, creating security vulnerabilities. Distributed VRFs (DVRFs) offer a decentralized alternative but face challenges like large proof sizes or dependence on computationally expensive bilinear pairings.
    In this research, a unique distributed VRF (DVRF) system called DVRFwCP with considerable improvements is proposed. DVRFwCP has constant-size proofs, which means that the size of the proof does not change based on the number of participants. This
    overcomes a significant drawback of earlier DVRF systems, which saw proof size increase with participant count. Furthermore, DVRFwCP produces more efficient verification than previous systems by eliminating the requirement for bilinear pairings
    throughout the verification process. These innovations contribute to a more secure and scalable solution for generating verifiable randomness in decentralized environments.
    We compare our construction to well-established DVRF instantiations such as DDH-DVRF and GLOW-DVRF while also pointing out the major improvement in the estimated gas cost of these algorithms.



    ## 2024/1131

    * Title: Jolt-b: recursion friendly Jolt with basefold commitment
    * Authors: Hang Su, Qi Yang, Zhenfei Zhang
    * [Permalink](https://eprint.iacr.org/2024/1131)
    * [Download](https://eprint.iacr.org/2024/1131.pdf)

    ### Abstract

    The authors of Jolt [AST24] pioneered a unique method for creating zero-knowledge virtual machines, known as the lookup singularity. This technique extensively uses lookup tables to create virtual machine circuits. Despite Jolt’s performance being
    twice as efficient as the previous state-of-the-art1 , there is potential for further enhancement.

    The initial release of Jolt uses Spartan [Set20] and Hyrax [WTs+ 18] as their backend, leading to two constraints. First, Hyrax employs Pedersen commitment to build inner product arguments, which requires elliptic curve operations. Second, the
    verification of a Hyrax commitment takes square root time $O(\sqrt{N})$ relative to the circuit size $N$ . This makes the recursive verification of a Jolt proof impractical, as the verification circuit would need to execute all the Hyrax verification
    logic in-circuit. A later version of Jolt includes Zeromorph [KT23] and HyperKZG as their commitment backend, making the system recursion-friendly, as now the recursive verifier only needs to perform $O(\log N)$ operations, but at the
    expense of a need for a trusted setup.

    Our scheme, Jolt-b, addresses these issues by transitioning to the extension field of the Goldilocks and using the Basefold commitment scheme [ZCF23], which has an $O(\log^2 N)$ verifier time. This scheme mirrors the modifications of Plonky2 over the
    original Plonk [GWC19]: it transitions from EC fields to the Goldilocks field; it replaces the EC-based commitment scheme with an encoding-based commitment scheme.

    We implemented Jolt-b, along with an optimized version of the Basefold scheme. Our benchmarks show that at a cost of 2.47x slowdown for the prover, we achieve recursion friendliness for the original Jolt. In comparison with other recursion-friendly Jolt
    variants, our scheme is 1.24x and 1.52x faster in prover time than the Zeromorph and HyperKZG variants of Jolt, respectively.



    ## 2024/1132

    * Title: A New PPML Paradigm for Quantized Models
    * Authors: Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren
    * [Permalink](https://eprint.iacr.org/2024/1132)
    * [Download](https://eprint.iacr.org/2024/1132.pdf)

    ### Abstract

    Model quantization has become a common practice in machine learning (ML) to improve efficiency and reduce computational/communicational overhead. However, adopting quantization in privacy-preserving machine learning (PPML) remains challenging due to the
    complex internal structure of quantized operators, which leads to inefficient protocols under the existing PPML frameworks.

    In this work, we propose a new PPML paradigm that is tailor-made for and can benefit from quantized models. Our main observation is that lookup tables can ignore the complex internal constructs of any functions which can be used to simplify the quantized
    operator evaluation. We view the model inference process as a sequence of quantized operators, and each operator is implemented by a lookup table. We then develop an efficient private lookup table evaluation protocol, and its online communication cost is
    only $\log n$, where $n$ is the size of the lookup table.
    On a single CPU core, our protocol can evaluate $2^{15}$ tables with 8-bit input and 8-bit output per second.

    The resulting PPML framework for quantized models offers extremely fast online performance.
    The experimental results demonstrate that our quantization strategy achieves substantial speedups over SOTA PPML solutions, improving the online performance by $40\sim 60 \times$ w.r.t. convolutional neural network (CNN) models, such as AlexNet, VGG16,
    and ResNet18, and by $10\sim 25 \times$ w.r.t. large language models (LLMs), such as GPT-2, GPT-Neo, and Llama2.



    ## 2024/1133

    * Title: Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis
    * Authors: Hossein Arabnezhad, Babak Sadeghiyan
    * [Permalink](https://eprint.iacr.org/2024/1133)
    * [Download](https://eprint.iacr.org/2024/1133.pdf)

    ### Abstract

    The aim of an algebraic attack is to find the secret key by solving
    a collection of relations that describe the internal structure of a cipher
    for observations of plaintext/cipher-text pairs.
    Although algebraic attacks are addressed for cryptanalysis of block and
    stream ciphers, there is a limited understanding of the impact of algebraic representation of the cipher on the efficiency of solving the resulting collection of equations.
    In this paper, we investigate on how different S-box representations affect the complexity of algebraic attacks, in an empirical manner.
    In the literature some algebraic properties are intuitively proposed to evaluate optimality of an algebraic description of S-boxes for algebraic cryptanalysis.
    In this paper, we compare different S-box representation for algebraic cryptanalysis with doing experiments with SR family of block ciphers.
    We also show that the so-called \textit{Forward-Backward} representation which is in contrast with all mentioned criteria for optimal representations criteria, practically gives better results than the compliant representations.
    We also compare the representations for both $GF(2)$ and $GF(2^n)$ fields.



    ## 2024/1134

    * Title: Exploiting signature leakages: breaking Enhanced pqsigRM
    * Authors: Thomas Debris-Alazard, Pierre Loisel, Valentin Vasseur
    * [Permalink](https://eprint.iacr.org/2024/1134)
    * [Download](https://eprint.iacr.org/2024/1134.pdf)

    ### Abstract

    Enhanced pqsigRM is a code-based hash-and-sign scheme proposed to the second National Institute of Standards and Technology call for post-quantum signatures. The scheme is based on the $(U,U+V)$-construction and it enjoys remarkably small signature
    lengths, about $1$KBytes for a security level of $128$ bits. Unfortunately we show that signatures leak information about the underlying $(U,U+V)$-structure. It allows to retrieve the private-key with~$100, 000$ signatures.



    ## 2024/1135

    * Title: Scalable and Lightweight State-Channel Audits
    * Authors: Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, Mario Larangeira
    * [Permalink](https://eprint.iacr.org/2024/1135)
    * [Download](https://eprint.iacr.org/2024/1135.pdf)

    ### Abstract

    Payment channels are one of the most prominent off-chain scaling solutions for blockchain systems. However, regulatory institutions have difficulty embracing them, as the channels lack insights needed for Anti-Money Laundering (AML) auditing purposes.
    Our work tackles the problem of a formal reliable and controllable inspection of off-ledger payment channels, by offering a novel approach for maintaining and reliably auditing statistics of payment channels. We extend a typical trustless Layer 2
    protocol and provide a lightweight and scalable protocol such that:
    - every state channel is provably auditable w.r.t. a configurable set of policy queries, such that a regulator can retrieve reliable insights about the channel;
    - no information beyond the answers to auditing queries is leaked;
    - the cryptographic operations are inexpensive, the setup is simple, and storage complexity is independent of the transaction graph's size.
    We present a concrete protocol, based on Hydra Isomorphic State Channels (FC'21), and tie the creation of a state channel to real-world identifiers, both in a plain and privacy-preserving manner. For this, we employ verifiable credentials for
    decentralized identifiers, specifically verifiable Legal Entity Identifiers (vLEI) that increasingly gain traction for financial service providers and regulated institutions.



    ## 2024/1136

    * Title: Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3
    * Authors: Zhongyi Zhang, Chengan Hou, Meicheng Liu
    * [Permalink](https://eprint.iacr.org/2024/1136)
    * [Download](https://eprint.iacr.org/2024/1136.pdf)

    ### Abstract

    The SHA-3 standard consists of four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, and two extendable-output functions (XOFs), called SHAKE128 and SHAKE256. In this paper, we study the collision resistance of the SHA-3
    instances. By analyzing the nonlinear layer, we introduce the concept of maximum difference density subspace, and develop a new target internal difference algorithm by probabilistic linearization. We also exploit new strategies for optimizing the
    internal differential characteristic. Further more, we figure out the expected size of collision subsets in internal differentials, by analyzing the collision probability of the digests rather than the intermediate states input to the last nonlinear
    layer. These techniques enhance the analysis of internal differentials, leading to the best collision attacks on four round-reduced variants of the SHA-3 instances. In particular, the number of attacked rounds is extended to 5 from 4 for SHA3-384, and to
    6 from 5 for SHAKE256.



    ## 2024/1137

    * Title: Cryptanalysis of EagleSign
    * Authors: Ludo N. Pulles, Mehdi Tibouchi
    * [Permalink](https://eprint.iacr.org/2024/1137)
    * [Download](https://eprint.iacr.org/2024/1137.pdf)

    ### Abstract

    EagleSign is one of the 40 “Round 1 Additional Signatures” that is accepted for consideration in the supplementary round of the Post-Quantum Cryptography standardization process, organized by NIST. Its design is based on structured lattices, and it
    boasts greater simplicity and performance compared to the two lattice signatures already selected for standardization: Falcon and Dilithium.

    In this paper, we show that those claimed advantages come at the cost of security. More precisely, we show that the distribution of EagleSign signatures leaks information about the private key, to the point that only a few hundred signatures on arbitrary
    known messages suffice for a full key recovery, for all proposed parameters.

    A related vulnerability also affects EagleSign-V2, a subsequent version of the scheme specifically designed to thwart the initial attack. Although a larger number of signatures is required for key recovery, the idea of the attack remains largely similar.
    Both schemes come with proofs of security that we show are flawed.



    ## 2024/1138

    * Title: Dot-Product Proofs and Their Applications
    * Authors: Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, David J. Wu
    * [Permalink](https://eprint.iacr.org/2024/1138)
    * [Download](https://eprint.iacr.org/2024/1138.pdf)

    ### Abstract

    A dot-product proof (DPP) is a simple probabilistic proof system in which the input statement $\mathbf{x}$ and the proof $\boldsymbol{\pi}$ are vectors over a finite field $\mathbb{F}$, and the proof is verified by making a single dot-product query $\
    langle \mathbf{q},(\mathbf{x} \| \boldsymbol{\pi}) \rangle$ jointly to $\mathbf{x}$ and $\boldsymbol{\pi}$. A DPP can be viewed as a 1-query fully linear PCP. We study the feasibility and efficiency of DPPs, obtaining the following results:

    - Small-field DPP. For any finite field $\mathbb{F}$ and Boolean circuit $C$ of size $S$, there is a DPP for proving that there exists $\mathbf{w}$ such that $C(\mathbf{x}, \mathbf{w})=1$ with a proof $\boldsymbol{\pi}$ of length $S\cdot\mathsf{poly}(|\
    mathbb{F}|)$ and soundness error $\varepsilon=O(1 / \sqrt{|\mathbb{F}|})$. We show this error to be asymptotically optimal. In particular, and in contrast to the best known PCPs, there exist strictly linear-length DPPs over constant-size fields.

    - Large-field DPP. If $|\mathbb{F}|\ge\mathsf{poly}(S/\varepsilon)$, there is a similar DPP with soundness error $\varepsilon$ and proof length $O(S)$ (in field elements).

    The above results do not rely on the PCP theorem and their proofs are considerably simpler. We apply our DPP constructions toward two kinds of applications.

    - Hardness of approximation. We obtain a simple proof for the NP-hardness of approximating MAXLIN (with dense instances) over any finite field $\mathbb{F}$ up to some constant factor $c>1$, independent of $\mathbb{F}$. Unlike previous PCP-based proofs,
    our proof yields exponential-time hardness under the exponential time hypothesis (ETH).

    - Succinct arguments. We improve the concrete efficiency of succinct interactive arguments in the generic group model using input-independent preprocessing. In particular, the communication is comparable to sending two group elements and the verifier's
    computation is dominated by a single group exponentiation. We also show how to use DPPs together with linear-only encryption to construct succinct commit-and-prove arguments.



    ## 2024/1139

    * Title: Anonymous Outsourced Statekeeping with Reduced Server Storage
    * Authors: Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, Michael Rosenberg
    * [Permalink](https://eprint.iacr.org/2024/1139)
    * [Download](https://eprint.iacr.org/2024/1139.pdf)

    ### Abstract

    Strike-lists are a common technique for rollback and replay prevention in protocols that require that clients remain anonymous or that their current position in a state machine remain confidential. Strike-lists are heavily used in anonymous credentials,
    e-cash schemes, and trusted execution environments, and are widely deployed on the web in the form of Privacy Pass (PoPETS '18) and Google Private State Tokens.
    In such protocols, clients submit pseudorandom tokens associated with each action (e.g., a page view in Privacy Pass) or state transition, and the token is added to a server-side list to prevent reuse.

    Unfortunately, the size of a strike-list, and hence the storage required by the server, is proportional to the total number of issued tokens, $N \cdot t$, where $N$ is the number of clients and $t$ is the maximum number of tickets per client. In this
    work, we ask whether it is possible to realize a strike-list-like functionality, which we call the anonymous tickets functionality, with storage requirements proportional to $N \log(t)$.

    For the anonymous tickets functionality we construct a secure protocol from standard assumptions that achieves server storage of $O(N)$ ciphertexts, where each ciphertext encrypts a message of length $O(\log(t))$. We also consider an extension of the
    strike-list functionality where the server stores an arbitrary state for each client and clients advance their state with some function $s_i\gets f(s_{i-1},\mathsf{auxinput})$, which we call the anonymous outsourced state-keeping functionality. In this
    setting, malicious clients are prevented from rolling back their state, while honest clients are guaranteed anonymity and confidentiality against a malicious server. We achieve analogous results in this setting for two different classes of functions.

    Our results rely on a new technique to preserve client anonymity in the face of selective failure attacks by a malicious server. Specifically, our protocol guarantees that misbehavior of the server either (1) does not prevent the honest client from
    redeeming a ticket or (2) provides the honest client with an escape hatch that can be used to simulate a redeem in a way that is indistinguishable to the server.



    ## 2024/1140

    * Title: Permutation Superposition Oracles for Quantum Query Lower Bounds
    * Authors: Christian Majenz, Giulio Malavolta, Michael Walter
    * [Permalink](https://eprint.iacr.org/2024/1140)
    * [Download](https://eprint.iacr.org/2024/1140.pdf)

    ### Abstract

    We propose a generalization of Zhandry’s compressed oracle method to random permutations, where an algorithm can query both the permutation and its inverse. We show how to use the resulting oracle simulation to bound the success probability of an
    algorithm for any predicate on input-output pairs, a key feature of Zhandry’s technique that had hitherto resisted attempts at generalization to random permutations. One key technical ingredient is to use strictly monotone factorizations to represent
    the permutation in the oracle’s database. As an application of our framework, we show that the one-round sponge construction is unconditionally preimage resistant in the random permutation model. This proves a conjecture by Unruh.



    ## 2024/1141

    * Title: Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption
    * Authors: Chen Yang, Jingwei Chen, Wenyuan Wu, Yong Feng
    * [Permalink](https://eprint.iacr.org/2024/1141)
    * [Download](https://eprint.iacr.org/2024/1141.pdf)

    ### Abstract

    Clustering is a crucial unsupervised learning method extensively used in the field of data analysis. For analyzing big data, outsourced computation is an effective solution but privacy concerns arise when involving sensitive information. Fully
    homomorphic encryption (FHE) enables computations on encrypted data, making it ideal for such scenarios. However, existing privacy-preserving clustering based on FHE are often constrained by the high computational overhead incurred from FHE, typically
    requiring decryption and interactions after only one iteration of the clustering algorithm. In this work, we propose a more efficient approach to evaluate the one-hot vector for the index of the minimum in an array with FHE, which fully exploits the
    parallelism of single-instruction-multiple-data of FHE schemes. By combining this with FHE bootstrapping, we present a practical FHE-based k-means clustering protocol whose required round of interactions between the data owner and the server is optimal,
    i.e., accomplishing the entire clustering process on encrypted data in a single round. We implement this protocol using the CKKS FHE scheme. Experiments show that our protocol significantly outperforms the state-of-the-art FHE-based k-means clustering
    protocols on various public datasets and achieves comparable accuracy to plaintext result. Additionally, We adapt our protocol to support mini-batch k-means for large-scale datasets and report its performance.



    ## 2024/1142

    * Title: Predicting one class of truncated matrix congruential generators with unknown parameters
    * Authors: Changcun Wang, Zhaopeng Dai
    * [Permalink](https://eprint.iacr.org/2024/1142)
    * [Download](https://eprint.iacr.org/2024/1142.pdf)

    ### Abstract

    Matrix congruential generators is an important class of pseudorandom number generators. In this paper we show how to predict a class of Matrix congruential generators matrix
    congruential generators with unknown parameters. Given a few truncated digits of high-order bits output by a matrix congruential generator, we give a method based on lattice reduction to recover the parameters and the initial state of the
    generator.



    ## 2024/1143

    * Title: LR-OT: Leakage-Resilient Oblivious Transfer
    * Authors: Francesco Berti, Carmit Hazay, Itamar Levi
    * [Permalink](https://eprint.iacr.org/2024/1143)
    * [Download](https://eprint.iacr.org/2024/1143.pdf)

    ### Abstract

    Oblivious Transfer (OT) is a fundamental cryptographic primitive, becoming a crucial component of a practical secure protocol.
    OT is typically implemented in software, and one way to accelerate its running time is by using hardware implementations.
    However, such implementations are vulnerable to side-channel attacks (SCAs).
    On the other hand, protecting interactive protocols against SCA is highly challenging because of their longer secrets (which include inputs and randomness), more complicated design, and running multiple instances.
    Consequently, there are no truly practical leakage-resistant OT protocols yet.

    In this paper, we introduce two tailored indistinguishability-based security definitions for leakage-resilient OT, focusing on protecting the sender's state.
    Second, we propose a practical semi-honest secure OT protocol that achieves these security levels while minimizing the assumptions on the protocol's building blocks and the use of a secret state.
    Finally, we extend our protocol to support sequential composition and explore efficiency-security tradeoffs.



    ## 2024/1144

    * Title: A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain''
    * Authors: Zhengjun Cao, Lihua Liu
    * [Permalink](https://eprint.iacr.org/2024/1144)
    * [Download](https://eprint.iacr.org/2024/1144.pdf)

    ### Abstract

    We show that the data storage scheme [IEEE/ACM Trans. Netw., 2023, 31(4), 1550-1565] is flawed due to the false secret sharing protocol, which requires that some random $4\times 4$ matrixes over the finite field $F_p$ (a prime $p$) are invertible. But
    we find its mathematical proof for invertibility is incorrect. To fix this flaw, one needs to check the invertibility of all 35 matrixes so as to generate the proper 7 secret shares.



    ## 2024/1145

    * Title: A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise
    * Authors: Adrian Neal
    * [Permalink](https://eprint.iacr.org/2024/1145)
    * [Download](https://eprint.iacr.org/2024/1145.pdf)

    ### Abstract

    The one-time pad cipher is renowned for its theoretical perfect security, yet its practical deployment is primarily hindered by the key-size and distribution challenge. This paper introduces a novel approach to key distribution called q-stream, designed
    to make symmetric-key cryptography, and the one-time pad cipher in particular, a viable option for contemporary secure communications, and specifically, post-quantum cryptography, leveraging quantum noise and combinatorics to ensure secure and efficient
    key-distribution between communicating parties. We demonstrate that our key-distribution mechanism has a variable, yet quantifiable hardness of at least 504 bits, established from immutable mathematical laws, rather than conjectured-intractability, and
    how we overcome the one-time pad key-size issue with a localised quantum-noise seeded key-generation function, having a system hardness of at least 2304 bits, while introducing sender authentication and message integrity. Whilst the proposed solution
    has potential applications in fields requiring very high levels of security, such as military communications and large financial transactions, we show from our research with a prototype of q-stream, that it is sufficiently practical and scaleable for use
    in common browser-based web-applications, without any modification to the browser (i.e. plug-ins), running above SSL/TLS at the application level, where in tests, it achieved a key-distribution rate of around 7 million keys over a 5 minute surge-window,
    in a single (multi-threaded) instance of q-stream.



    ## 2024/1146

    * Title: Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions
    * Authors: Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai
    * [Permalink](https://eprint.iacr.org/2024/1146)
    * [Download](https://eprint.iacr.org/2024/1146.pdf)

    ### Abstract


    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)