Subjects -> MATHEMATICS (Total: 1120 journals)     - APPLIED MATHEMATICS (92 journals)    - GEOMETRY AND TOPOLOGY (23 journals)    - MATHEMATICS (822 journals)    - MATHEMATICS (GENERAL) (45 journals)    - NUMERICAL ANALYSIS (25 journals)    - PROBABILITIES AND MATH STATISTICS (113 journals) MATHEMATICS (822 journals)            First | 1 2 3 4 5
 Showing 401 - 538 of 538 Journals sorted alphabetically Journal of Computational Physics       (Followers: 71) Journal of Computational Physics : X       (Followers: 1) Journal of Computer Engineering, System and Science (CESS) Journal of Contemporary Mathematical Analysis Journal of Cryptology       (Followers: 5) Journal of Difference Equations and Applications Journal of Differential Equations       (Followers: 1) Journal of Discrete Algorithms       (Followers: 4) Journal of Discrete Mathematics       (Followers: 1) Journal of Dynamics and Differential Equations Journal of Engineering Mathematics       (Followers: 2) Journal of Evolution Equations Journal of Experimental Algorithmics       (Followers: 1) Journal of Flood Risk Management       (Followers: 14) Journal of Formalized Reasoning       (Followers: 2) Journal of Function Spaces Journal of Functional Analysis       (Followers: 2) Journal of Geochemical Exploration       (Followers: 1) Journal of Geological Research       (Followers: 1) Journal of Geovisualization and Spatial Analysis Journal of Global Optimization       (Followers: 7) Journal of Global Research in Mathematical Archives       (Followers: 1) Journal of Group Theory       (Followers: 2) Journal of Homotopy and Related Structures Journal of Honai Math Journal of Humanistic Mathematics       (Followers: 1) Journal of Hyperbolic Differential Equations Journal of Indian Council of Philosophical Research Journal of Industrial Mathematics       (Followers: 2) Journal of Inequalities and Applications Journal of Infrared, Millimeter and Terahertz Waves       (Followers: 2) Journal of Integrable Systems       (Followers: 1) Journal of K-Theory Journal of Knot Theory and Its Ramifications       (Followers: 1) Journal of Kufa for Mathematics and Computer       (Followers: 1) Journal of Liquid Chromatography & Related Technologies       (Followers: 7) Journal of Logical and Algebraic Methods in Programming Journal of Manufacturing Systems       (Followers: 4) Journal of Mathematical Analysis and Applications       (Followers: 5) Journal of mathematical and computational science       (Followers: 7) Journal of Mathematical and Fundamental Sciences Journal of Mathematical Behavior       (Followers: 3) Journal of Mathematical Chemistry       (Followers: 3) Journal of Mathematical Cryptology       (Followers: 1) Journal of Mathematical Extension       (Followers: 3) Journal of Mathematical Finance       (Followers: 9) Journal of Mathematical Imaging and Vision       (Followers: 6) Journal of Mathematical Logic       (Followers: 3) Journal of Mathematical Modelling and Algorithms       (Followers: 1) Journal of Mathematical Neuroscience       (Followers: 10) Journal of Mathematical Sciences Journal of Mathematical Sciences and Applications       (Followers: 2) Journal of Mathematical Sociology       (Followers: 3) Journal of Mathematics Journal of Mathematics and Statistics       (Followers: 8) Journal of Mathematics and Statistics Studies       (Followers: 4) Journal of Mathematics and the Arts       (Followers: 2) Journal of Mathematics Education at Teachers College       (Followers: 3) Journal of Mathematics in Industry Journal of Mathematics Research       (Followers: 6) Journal of Metallurgy       (Followers: 8) Journal of Modern Mathematics Frontier Journal of Multidisciplinary Modeling and Optimization Journal of Multivariate Analysis       (Followers: 13) Journal of Natural Sciences and Mathematics Research Journal of Nonlinear Analysis and Optimization : Theory & Applications       (Followers: 4) Journal of Nonlinear Mathematical Physics       (Followers: 1) Journal of Nonlinear Science       (Followers: 1) Journal of Numerical Cognition       (Followers: 1) Journal of Numerical Mathematics       (Followers: 2) Journal of Optimization       (Followers: 5) Journal of Peridynamics and Nonlocal Modeling Journal of Problem Solving       (Followers: 2) Journal of Progressive Research in Mathematics       (Followers: 5) Journal of Pseudo-Differential Operators and Applications Journal of Pure and Applied Algebra       (Followers: 4) Journal of Quantitative Analysis in Sports       (Followers: 9) Journal of Quantitative Linguistics       (Followers: 6) Journal of Scientific Computing       (Followers: 18) Journal of Scientific Research Journal of Symbolic Computation       (Followers: 1) Journal of the Australian Mathematical Society Journal of the Egyptian Mathematical Society Journal of the European Mathematical Society       (Followers: 1) Journal of the Indian Mathematical Society       (Followers: 1) Journal of the Institute of Mathematics of Jussieu Journal of the London Mathematical Society       (Followers: 2) Journal of the Nigerian Mathematical Society       (Followers: 1) Journal of Theoretical and Applied Physics       (Followers: 8) Journal of Topology and Analysis Journal of Transport and Supply Chain Management       (Followers: 16) Journal of Turbulence       (Followers: 9) Journal of Uncertainty Analysis and Applications       (Followers: 1) Journal of Universal Mathematics Journal of Urban Regeneration & Renewal       (Followers: 11) JRAMathEdu : Journal of Research and Advances in Mathematics Education       (Followers: 6) JUMLAHKU : Jurnal Matematika Ilmiah STKIP Muhammadiyah Kuningan       (Followers: 2) JURING (Journal for Research in Mathematics Learning)       (Followers: 1) Jurnal Ilmiah AdMathEdu Jurnal Matematika       (Followers: 1) Jurnal Matematika Integratif Jurnal Matematika, Sains, Dan Teknologi Jurnal Natural Jurnal Pendidikan Matematika Raflesia Jurnal Penelitian Pembelajaran Matematika Sekolah Jurnal Penelitian Sains (JPS) Jurnal Riset Pendidikan Matematika Jurnal Sains Matematika dan Statistika Jurnal Tadris Matematika Jurnal Teknologi dan Sistem Komputer Kontinu : Jurnal Penelitian Didaktik Matematika       (Followers: 3) Kreano, Jurnal Matematika Kreatif-Inovatif       (Followers: 6) Le Matematiche Learning and Teaching Mathematics       (Followers: 7) Lettera Matematica Lietuvos Matematikos Rinkinys       (Followers: 3) Limits : Journal of Mathematics and Its Applications       (Followers: 1) Linear Algebra and its Applications       (Followers: 23) Linear and Multilinear Algebra       (Followers: 8) Lithuanian Mathematical Journal LMS Journal of Computation and Mathematics Lobachevskii Journal of Mathematics Logic and Analysis       (Followers: 1) Logic Journal of the IGPL       (Followers: 1) Logica Universalis manuscripta mathematica MaPan : Jurnal Matematika dan Pembelajaran Marine Genomics       (Followers: 2) Matemáticas, Educación y Sociedad Matematicheskie Zametki Matematika Matematychni Studii Mathematica Eterna Mathematica Scandinavica       (Followers: 1) Mathematica Slovaca       (Followers: 1) Mathematical and Computational Forestry & Natural-Resource Sciences Mathematical Communications Mathematical Computation       (Followers: 1) Mathematical Geosciences       (Followers: 3) Mathematical Journal of Interdisciplinary Sciences       (Followers: 1) Mathematical Medicine and Biology: A Journal of the IMA       (Followers: 1) Mathematical Methods in the Applied Sciences       (Followers: 4) Mathematical Methods of Statistics       (Followers: 4) Mathematical Modelling and Analysis       (Followers: 1) Mathematical Modelling in Civil Engineering       (Followers: 5) Mathematical Modelling of Natural Phenomena       (Followers: 1) Mathematical Models and Methods in Applied Sciences       (Followers: 2) Mathematical Models in Engineering       (Followers: 2) Mathematical Notes Mathematical Proceedings of the Cambridge Philosophical Society       (Followers: 2) Mathematical Programming Computation       (Followers: 3) Mathematical Sciences Mathematical Social Sciences       (Followers: 1) Mathematical Theory and Modeling       (Followers: 13) Mathematical Thinking and Learning       (Followers: 4) Mathematics and Statistics       (Followers: 5) Mathematics Education Forum Chitwan       (Followers: 2) Mathematics Education Journal       (Followers: 3) Mathematics Education Research Journal       (Followers: 20) Mathematics in Science and Engineering Mathematics of Control, Signals, and Systems (MCSS)       (Followers: 5) Mathematics of Quantum and Nano Technologies Mathématiques et sciences humaines       (Followers: 6) Mathematische Annalen       (Followers: 1) Mathematische Nachrichten       (Followers: 1) Mathematische Semesterberichte Mathematische Zeitschrift       (Followers: 1) MathLAB Journal       (Followers: 5) MATI : Mathematical Aspects of Topological Indeces MATICS       (Followers: 2) Matrix Science Mathematic       (Followers: 1) Measurement Science Review       (Followers: 3) Mediterranean Journal of Mathematics Memetic Computing Mendel : Soft Computing Journal Metaheuristics Metals and Materials International Metascience       (Followers: 1) Metrology and Instruments / Метрологія та прилади Milan Journal of Mathematics Mitteilungen der DMV MLQ- Mathematical Logic Quarterly       (Followers: 1) MONA : Matematik- og Naturfagsdidaktik       (Followers: 5) Monatshefte fur Mathematik Moroccan Journal of Pure and Applied Analysis       (Followers: 4) Moscow University Mathematics Bulletin MSOR Connections       (Followers: 1) Multiscale Modeling and Simulation       (Followers: 3) MUST : Journal of Mathematics Education, Science and Technology       (Followers: 2) Nagoya Mathematical Journal Nano Research       (Followers: 4) Nanotechnologies in Russia       (Followers: 1) Natural Resource Modeling       (Followers: 1) New Mathematics and Natural Computation Nonlinear Analysis : Modelling and Control       (Followers: 1) Nonlinear Analysis : Theory, Methods & Applications       (Followers: 1) Nonlinear Analysis: Hybrid Systems Nonlinear Analysis: Real World Applications       (Followers: 2) Nonlinear Differential Equations and Applications NoDEA Nonlinear Engineering
Similar Journals
 Journal of CryptologyJournal Prestige (SJR): 0.347 Citation Impact (citeScore): 2Number of Followers: 5      Hybrid journal (It can contain Open Access articles) ISSN (Print) 1432-1378 - ISSN (Online) 0933-2790 Published by Springer-Verlag  [2655 journals]
• Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT
Key Exchange
• Abstract: Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographically protected payload data along with the very first KE message, are motivated by the practical demand for secure low-latency communication. For a long time, it was unclear whether protocols that simultaneously achieve 0-RTT and full forward secrecy exist. Only recently, the first forward-secret 0-RTT protocol was described by Günther et al. (Eurocrypt, 2017). It is based on puncturable encryption. Forward secrecy is achieved by “puncturing” the secret key after each decryption operation, such that a given ciphertext can only be decrypted once (cf. also Green and Miers, S&P 2015). Unfortunately, their scheme is completely impractical, since one puncturing operation takes between 30 s and several minutes for reasonable security and deployment parameters, such that this solution is only a first feasibility result, but not efficient enough to be deployed in practice. In this paper, we introduce a new primitive that we term Bloom filter encryption (BFE), which is derived from the probabilistic Bloom filter data structure. We describe different constructions of BFE schemes and show how these yield new puncturable encryption mechanisms with extremely efficient puncturing. Most importantly, a puncturing operation only involves a small number of very efficient computations, plus the deletion of certain parts of the secret key, which outperforms previous constructions by orders of magnitude. This gives rise to the first forward-secret 0-RTT protocols that are efficient enough to be deployed in practice. We believe that BFE will find applications beyond forward-secret 0-RTT protocols.
PubDate: 2021-03-09

• Round-Preserving Parallel Composition of Probabilistic-Termination
Cryptographic Protocols
• Abstract: An important benchmark for multi-party computation protocols (MPC) is their round complexity. For several important MPC tasks, such as broadcast, (tight) lower bounds on the round complexity are known. However, some of these lower bounds can be circumvented when the termination round of every party is not a priori known, and simultaneous termination is not guaranteed. Protocols with this property are called probabilistic-termination (PT) protocols. Running PT protocols in parallel affects the round complexity of the resulting protocol in somewhat unexpected ways. For instance, an execution of m protocols with constant expected round complexity might take $$O(\log m)$$ rounds to complete. In a seminal work, Ben-Or and El-Yaniv (Distributed Computing ‘03) developed a technique for a parallel execution of arbitrarily many broadcast protocols, while preserving expected round complexity. More recently, Cohen et al. (CRYPTO ‘16) devised a framework for universal composition of PT protocols, and provided the first composable parallel-broadcast protocol with a simulation-based proof. These constructions crucially rely on the fact that broadcast is “privacy-free,” and do not generalize to arbitrary protocols in a straightforward way. This raises the question of whether it is possible to execute arbitrary PT protocols in parallel, without increasing the round complexity. In this paper we tackle this question and provide both feasibility and infeasibility results. We construct a round-preserving protocol compiler, tolerating any dishonest minority of actively corrupted parties, that compiles arbitrary protocols into a protocol realizing their parallel composition, while having a black-box access to the underlying protocols. Furthermore, we prove that the same cannot be achieved, using known techniques, given only black-box access to the functionalities realized by the protocols, unless merely security against semi-honest corruptions is required, for which case we provide a protocol. To prove our results, we utilize the language and results by Cohen et al., which we extend to capture parallel composition and reactive functionalities, and to handle the case of an honest majority.
PubDate: 2021-03-09

• Placing Conditional Disclosure of Secrets in the Communication Complexity
Universe
• Abstract: In the conditional disclosure of secrets (CDS) problem (Gertner et al. in J Comput Syst Sci, 2000) Alice and Bob, who hold n-bit inputs x and y respectively, wish to release a common secret z to Carol, who knows both x and y, if and only if the input (x, y) satisfies some predefined predicate f. Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some shared randomness, and the goal is to minimize the communication complexity while providing information-theoretic security. Despite the growing interest in this model, very few lower-bounds are known. In this paper, we relate the CDS complexity of a predicate f to its communication complexity under various communication games. For several basic predicates our results yield tight, or almost tight, lower-bounds of $$\Omega (n)$$ or $$\Omega (n^{1-\epsilon })$$ , providing an exponential improvement over previous logarithmic lower-bounds. We also define new communication complexity classes that correspond to different variants of the CDS model and study the relations between them and their complements. Notably, we show that allowing for imperfect correctness can significantly reduce communication—a seemingly new phenomenon in the context of information-theoretic cryptography. Finally, our results show that proving explicit super-logarithmic lower-bounds for imperfect CDS protocols is a necessary step towards proving explicit lower-bounds against the communication complexity class $$\text {AM}^{\text {cc}}$$ , or even $$\text {AM}^{\text {cc}}\cap \text {co-AM}^{\text {cc}}$$ —a well known open problem in the theory of communication complexity. Thus imperfect CDS forms a new minimal class which is placed just beyond the boundaries of the “civilized” part of the communication complexity world for which explicit lower-bounds are known.
PubDate: 2021-02-11

• On the Local Leakage Resilience of Linear Secret Sharing Schemes
• Abstract: We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage' We focus on a simple local leakage model, where the adversary can apply an arbitrary function of a bounded output length to the secret state of each party, but cannot otherwise learn joint information about the states. We show that additive secret sharing schemes and high-threshold instances of Shamir’s secret sharing scheme are secure under local leakage attacks when the underlying field is of a large prime order and the number of parties is sufficiently large. This should be contrasted with the fact that any linear secret sharing scheme over a small characteristic field is clearly insecure under local leakage attacks, regardless of the number of parties. Our results are obtained via tools from Fourier analysis and additive combinatorics. We present two types of applications of the above results and techniques. As a positive application, we show that the “GMW protocol” for honest-but-curious parties, when implemented using shared products of random field elements (so-called “Beaver Triples”), is resilient in the local leakage model for sufficiently many parties and over certain fields. This holds even when the adversary has full access to a constant fraction of the views. As a negative application, we rule out multiparty variants of the share conversion scheme used in the 2-party homomorphic secret sharing scheme of Boyle et al. (in: Crypto, 2016).
PubDate: 2021-02-09

• Tight Tradeoffs in Searchable Symmetric Encryption
• Abstract: A searchable symmetric encryption (SSE) scheme enables a client to store data on an untrusted server while supporting keyword searches in a secure manner. Recent experiments have indicated that the practical relevance of such schemes heavily relies on the tradeoff between their space overhead, locality (the number of non-contiguous memory locations that the server accesses with each query), and read efficiency (the ratio between the number of bits the server reads with each query and the actual size of the answer). These experiments motivated Cash and Tessaro (EUROCRYPT ’14) and Asharov et al. (STOC ’16) to construct SSE schemes offering various such tradeoffs and to prove lower bounds for natural SSE frameworks. Unfortunately, the best-possible tradeoff has not been identified, and there are substantial gaps between the existing schemes and lower bounds, indicating that a better understanding of SSE is needed. We establish tight bounds on the tradeoff between the space overhead, locality and read efficiency of SSE schemes within two general frameworks that capture the memory access pattern underlying all existing schemes. First, we introduce the “pad-and-split” framework, refining that of Cash and Tessaro while still capturing the same existing schemes. Within our framework we significantly strengthen their lower bound, proving that any scheme with locality L must use space $$\Omega ( N \log N / \log L )$$ for databases of size N. This is a tight lower bound, matching the tradeoff provided by the scheme of Demertzis and Papamanthou (SIGMOD ’17) which is captured by our pad-and-split framework. Then, within the “statistical-independence” framework of Asharov et al. we show that their lower bound is essentially tight: We construct a scheme whose tradeoff matches their lower bound within an additive $$O(\log \log \log N)$$ factor in its read efficiency, once again improving upon the existing schemes. Our scheme offers optimal space and locality, and nearly optimal read efficiency that depends on the frequency of the queried keywords: For a keyword that is associated with $$n = N^{1 - \epsilon (n)}$$ document identifiers, the read efficiency is $$\omega (1) \cdot {\epsilon }(n)^{-1}+ O(\log \log \log N)$$ when retrieving its identifiers (where the $$\omega (1)$$ term may be arbitrarily small, and $$\omega (1) \cdot {\epsilon }(n)^{-1}$$ is the lower bound proved by Asharov et al.). In particular, for any keyword that is associated with at most $$N^{1 - 1/o(\log \log \log N)}$$ document identifiers (i.e., for any keyword that is not exceptionally common), we provide read efficiency $$O(\log \log \log N)$$ when retrieving its identifiers.
PubDate: 2021-01-21
DOI: 10.1007/s00145-020-09370-z

• Can PPAD Hardness be Based on Standard Cryptographic Assumptions'
• Abstract: We consider the question of whether PPAD hardness can be based on standard cryptographic assumptions, such as the existence of one-way functions or public-key encryption. This question is particularly well-motivated in light of new devastating attacks on obfuscation candidates and their underlying building blocks, which are currently the only known source for PPAD hardness. Central in the study of obfuscation-based PPAD hardness is the sink-of-verifiable-line (SVL) problem, an intermediate step in constructing instances of the PPAD-complete problem source-or-sink. Within the framework of black-box reductions, we prove the following results: (i) average-case PPAD hardness (and even SVL hardness) does not imply any form of cryptographic hardness (not even one-way functions). Moreover, even when assuming the existence of one-way functions, average-case PPAD hardness (and, again, even SVL hardness) does not imply any public-key primitive. Thus, strong cryptographic assumptions (such as obfuscation-related ones) are not essential for average-case PPAD hardness. (ii) Average-case SVL hardness cannot be based either on standard cryptographic assumptions or on average-case PPAD hardness. In particular, average-case SVL hardness is not essential for average-case PPAD hardness. (iii) Any attempt for basing the average-case hardness of the PPAD-complete problem source-or-sink on standard cryptographic assumptions must result in instances with a nearly exponential number of solutions. This stands in striking contrast to the obfuscation-based approach, which results in instances having a unique solution. Taken together, our results imply that it may still be possible to base PPAD hardness on standard cryptographic assumptions, but any such black-box attempt must significantly deviate from the obfuscation-based approach: It cannot go through the SVL problem, and it must result in source-or-sink instances with a nearly exponential number of solutions.
PubDate: 2021-01-12
DOI: 10.1007/s00145-020-09369-6

• Bootstrapping for HElib
• Abstract: Gentry’s bootstrapping technique is still the only known method of obtaining fully homomorphic encryption where the system’s parameters do not depend on the complexity of the evaluated functions. Bootstrapping involves a recryption procedure where the scheme’s decryption algorithm is evaluated homomorphically. Prior to this work, there were very few implementations of recryption and fewer still that can handle “packed ciphertexts” that encrypt vectors of elements. In the current work, we report on an implementation of recryption of fully packed ciphertexts using the HElib library for somewhat homomorphic encryption. This implementation required extending previous recryption algorithms from the literature, as well as many aspects of the HElib library. Our implementation supports bootstrapping of packed ciphertexts over many extension fields/rings. One example that we tested involves ciphertexts that encrypt vectors of 1024 elements from $${\text {GF}}(2^{16})$$ . In that setting, the recryption procedure takes under 3 min (at security level $$\approx 80$$ ) on a single core and allows a multiplicative depth-11 computation before the next recryption is needed. This report updates the results that we reported in Eurocrypt 2015 in several ways. Most importantly, it includes a much more robust method for deriving the parameters, ensuring that recryption errors only occur with negligible probability. Many aspects of this analysis are proved, and for the few well-specified heuristics that we made, we report on thorough experimentation to validate them. The procedure that we describe here is also significantly more efficient than in the previous version, incorporating many optimizations that were reported elsewhere (such as more efficient linear transformations) and adding a few new ones. Finally, our implementation now also incorporates Chen and Han’s techniques from Eurocrypt 2018 for more efficient digit extraction (for some parameters), as well as for “thin bootstrapping” when the ciphertext is only sparsely packed.
PubDate: 2021-01-06
DOI: 10.1007/s00145-020-09368-7

• The Number of Almost Perfect Nonlinear Functions Grows Exponentially
• Abstract: Almost perfect nonlinear (APN) functions play an important role in the design of block ciphers as they offer the strongest resistance against differential cryptanalysis. Despite more than 25 years of research, only a limited number of APN functions are known. In this paper, we show that a recent construction by Taniguchi provides at least $$\frac{\varphi (m)}{2}\left\lceil \frac{2^m+1}{3m} \right\rceil$$ inequivalent APN functions on the finite field with $${2^{2m}}$$ elements, where $$\varphi$$ denotes Euler’s totient function. This is a great improvement of previous results: for even m, the best known lower bound has been $$\frac{\varphi (m)}{2}\left( \lfloor \frac{m}{4}\rfloor +1\right)$$ ; for odd m, there has been no such lower bound at all. Moreover, we determine the automorphism group of Taniguchi’s APN functions.
PubDate: 2021-01-06
DOI: 10.1007/s00145-020-09373-w

• Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
• Abstract: In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (GPV-IBE) scheme based on a post-quantum assumption, namely the learning with errors assumption. Since their proof was only made in the random oracle model (ROM) instead of the quantum random oracle model (QROM), it remained unclear whether the scheme was truly post-quantum or not. In (CRYPTO, 2012), Zhandry developed new techniques to be used in the QROM and proved security of GPV-IBE in the QROM, hence answering in the affirmative that GPV-IBE is indeed post-quantum. However, since the general technique developed by Zhandry incurred a large reduction loss, there was a wide gap between the concrete efficiency and security level provided by GPV-IBE in the ROM and QROM. Furthermore, regardless of being in the ROM or QROM, GPV-IBE is not known to have a tight reduction in the multi-challenge setting. Considering that in the real-world an adversary can obtain many ciphertexts, it is desirable to have a security proof that does not degrade with the number of challenge ciphertext. In this paper, we provide a much tighter proof for the GPV-IBE in the QROM in the single-challenge setting. In addition, we show that a slight variant of the GPV-IBE has an almost tight reduction in the multi-challenge setting both in the ROM and QROM, where the reduction loss is independent of the number of challenge ciphertext. Our proof departs from the traditional partitioning technique and resembles the approach used in the public key encryption scheme of Cramer and Shoup (CRYPTO, 1998). Our proof strategy allows the reduction algorithm to program the random oracle the same way for all identities and naturally fits the QROM setting where an adversary may query a superposition of all identities in one random oracle query. Notably, our proofs are much simpler than the one by Zhandry and conceptually much easier to follow for cryptographers not familiar with quantum computation. Although at a high level, the techniques used for the single- and multi-challenge setting are similar, the technical details are quite different. For the multi-challenge setting, we rely on the Katz–Wang technique (CCS, 2003) to overcome some obstacles regarding the leftover hash lemma.
PubDate: 2021-01-06
DOI: 10.1007/s00145-020-09371-y

• Toward Non-interactive Zero-Knowledge Proofs for NP from LWE
• Abstract: Non-interactive zero-knowledge ( $$\mathsf {NIZK}$$ ) is a fundamental primitive that is widely used in the construction of cryptographic schemes and protocols. Our main result is a reduction from constructing $$\mathsf {NIZK}$$ proof systems for all of $$\mathbf {NP}$$ based on $$\mathsf {LWE}$$ , to constructing a $$\mathsf {NIZK}$$ proof system for a particular computational problem on lattices, namely a decisional variant of the bounded distance decoding ( $$\mathsf {BDD}$$ ) problem. That is, we show that assuming $$\mathsf {LWE}$$ , every language $$L \in \mathbf {NP}$$ has a $$\mathsf {NIZK}$$ proof system if (and only if) the decisional $$\mathsf {BDD}$$ problem has a $$\mathsf {NIZK}$$ proof system. This (almost) confirms a conjecture of Peikert and Vaikuntanathan (CRYPTO, 2008). To construct our $$\mathsf {NIZK}$$ proof system, we introduce a new notion that we call prover-assisted oblivious ciphertext sampling ( $$\mathsf {POCS}$$ ), which we believe to be of independent interest. This notion extends the idea of oblivious ciphertext sampling, which allows one to sample ciphertexts without knowing the underlying plaintext. Specifically, we augment the oblivious ciphertext sampler with access to an (untrusted) prover to help it accomplish this task. We show that the existence of encryption schemes with a $$\mathsf {POCS}$$ procedure, as well as some additional natural requirements, suffices for obtaining $$\mathsf {NIZK}$$ proofs for $$\mathbf {NP}$$ . We further show that such encryption schemes can be instantiated based on $$\mathsf {LWE}$$ , assuming the existence of a $$\mathsf {NIZK}$$ proof system for the decisional $$\mathsf {BDD}$$ problem.
PubDate: 2021-01-06
DOI: 10.1007/s00145-020-09365-w

• Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money
from Cryptographic Assumptions
• Abstract: Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary. In this work, we investigate quantum lightning, a formalization of “collision-free quantum money” defined by Lutomirski et al. [ICS’10], where no-cloning holds even when the adversary herself generates the quantum state to be cloned. We then study quantum money and quantum lightning, showing the following results: We demonstrate the usefulness of quantum lightning beyond quantum money by showing several potential applications, such as generating random strings with a proof of entropy, to completely decentralized cryptocurrency without a blockchain where transactions are instantaneous and local. We give win–win results for quantum money/lightning, showing that either signatures/hash functions/commitment schemes meet very strong recently proposed notions of security, or they yield quantum money or lightning. Given the difficulty in constructing public key quantum money, this suggests that natural schemes do attain strong security guarantees. We show that instantiating the quantum money scheme of Aaronson and Christiano [STOC’12] with indistinguishability obfuscation that is secure against quantum computers yields a secure quantum money scheme. This construction can be seen as an instance of our win–win result for signatures, giving the first separation between two security notions for signatures from the literature. Finally, we give a plausible construction for quantum lightning, which we prove secure under an assumption related to the multicollision resistance of degree-2 hash functions. Our construction is inspired by our win–win result for hash functions and yields the first plausible standard model instantiation of a non-collapsing collision-resistant hash function. This improves a result of Unruh [Eurocrypt’16] which is relative to a quantum oracle. Thus, we provide the first constructions of public key quantum money from several cryptographic assumptions. Along the way, we develop several new techniques including a new precise variant of the no-cloning theorem.
PubDate: 2021-01-06
DOI: 10.1007/s00145-020-09372-x

• Learning Strikes Again: The Case of the DRS Signature Scheme
• Abstract: Lattice signature schemes generally require particular care when it comes to preventing secret information from leaking through signature transcript. For example, the Goldreich–Goldwasser–Halevi (GGH) signature scheme and the NTRUSign scheme were completely broken by the parallelepiped-learning attack of Nguyen and Regev (Eurocrypt 2006). Several heuristic countermeasures were also shown vulnerable to similar statistical attacks. At PKC 2008, Plantard, Susilo and Win proposed a new variant of GGH, informally arguing resistance to such attacks. Based on this variant, Plantard, Sipasseuth, Dumondelle and Susilo proposed a concrete signature scheme, called DRS, that is in the round 1 of the NIST post-quantum cryptography project. In this work, we propose yet another statistical attack and demonstrate a weakness of the DRS scheme: one can recover some partial information of the secret key from sufficiently many signatures. One difficulty is that, due to the DRS reduction algorithm, the relation between the statistical leak and the secret seems more intricate. We work around this difficulty by training a statistical model, using a few features that we designed according to a simple heuristic analysis. While we only recover partial secret coefficients, this information is easily exploited by lattice attacks, significantly decreasing their complexity. Concretely, we claim that, provided that $$100\,000$$ signatures are available, the secret key may be recovered using BKZ-138 for the first set of DRS parameters submitted to the NIST. This puts the security level of this parameter set below 80-bits (maybe even 70-bits), to be compared to an original claim of 128-bits. Furthermore, we review the DRS v2 scheme that is proposed to resist above statistical attack. For this countermeasure, while one may not recover partial secret coefficients exactly by learning, it seems feasible to gain some information on the secret key. Exploiting this information, we can still effectively reduce the cost of lattice attacks.
PubDate: 2020-11-25
DOI: 10.1007/s00145-020-09366-9

• Reusable Fuzzy Extractors for Low-Entropy Distributions
• Abstract: Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment phase that takes the first noisy reading of the secret and produces a nonsecret helper string to be used in subsequent readings. Reusable fuzzy extractors (Boyen, in Proceedings of the 11th ACM conference on computer and communications security, CCS, ACM, New York, 2004, pp 82–91) remain secure even when this initial enrollment phase is repeated multiple times with noisy versions of the same secret, producing multiple helper strings (for example, when a single person’s biometric is enrolled with multiple unrelated organizations). We construct the first reusable fuzzy extractor that makes no assumptions about how multiple readings of the source are correlated. The extractor works for binary strings with Hamming noise; it achieves computational security under the existence of digital lockers (Canetti and Dakdouk, in Advances in cryptology—EUROCRYPT 2008, Springer, Berlin, 2008, pp 489–508). It is simple and tolerates near-linear error rates. Our reusable extractor is secure for source distributions of linear min-entropy rate. The construction is also secure for sources with much lower entropy rates—lower than those supported by prior (nonreusable) constructions—assuming that the distribution has some additional structure, namely, that random subsequences of the source have sufficient minentropy. Structure beyond entropy is necessary to support distributions with low entropy rates. We then explore further how different structural properties of a noisy source can be used to construct fuzzy extractors when the error rates are high, building a computationally secure and an information-theoretically secure construction for large-alphabet sources.
PubDate: 2020-11-23
DOI: 10.1007/s00145-020-09367-8

• Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
• Abstract: We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably secure authenticated encryption services, and since its proposal about 15 years ago it belongs to the top performers in this realm. OCB2 was included in an ISO standard in 2009. An internal building block of OCB2 is the tweakable blockcipher obtained by operating a regular blockcipher in $${\text {XEX}}^*$$  mode. The latter provides security only when evaluated in accordance with certain technical restrictions that, as we note, are not always respected by OCB2. This leads to devastating attacks against OCB2’s security promises: We develop a range of very practical attacks that, amongst others, demonstrate universal forgeries and full plaintext recovery. We complete our report with proposals for (provably) repairing OCB2. As a direct consequence of our findings, OCB2 is currently in a process of removal from ISO standards. Our attacks do not apply to OCB1 and OCB3, and our privacy attacks on OCB2 require an active adversary.
PubDate: 2020-10-01
DOI: 10.1007/s00145-020-09359-8

• The IITM Model: A Simple and Expressive Model for Universal Composability
• Abstract: The universal composability paradigm allows for the modular design and analysis of cryptographic protocols. It has been widely and successfully used in cryptography. However, devising a coherent yet simple and expressive model for universal composability is, as the history of such models shows, highly non-trivial. For example, several partly severe problems have been pointed out in the literature for the UC model. In this work, we propose a coherent model for universal composability, called the IITM model (“Inexhaustible Interactive Turing Machine”). A main feature of the model is that it is stated without a priori fixing irrelevant details, such as a specific way of addressing of machines by session and party identifiers, a specific modeling of corruption, or a specific protocol hierarchy. In addition, we employ a very general notion of runtime. All reasonable protocols and ideal functionalities should be expressible based on this notion in a direct and natural way, and without tweaks, such as (artificial) padding of messages or (artificially) adding extra messages. Not least because of these features, the model is simple and expressive. Also the general results that we prove, such as composition theorems, hold independently of how such details are fixed for concrete applications. Being inspired by other models for universal composability, in particular the UC model and because of the flexibility and expressivity of the IITM model, conceptually, results formulated in these models directly carry over to the IITM model.
PubDate: 2020-10-01
DOI: 10.1007/s00145-020-09352-1

• Foundations of Fully Dynamic Group Signatures
• Abstract: Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. The group manager can also reveal the identity of a signer if and when needed to enforce accountability and deter abuse. For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time. Existing security definitions for fully dynamic group signatures are informal, have shortcomings, and are mutually incompatible. We fill the gap by providing a formal rigorous security model for fully dynamic group signatures. Our model is general and is not tailored toward a specific design paradigm and can therefore, as we show, be used to argue about the security of different existing constructions following different design paradigms. Our definitions are stringent and when possible incorporate protection against maliciously chosen keys. We consider both the case where the group management and tracing signatures are administered by the same authority, i.e., a single group manager, and also the case where those roles are administered by two separate authorities, i.e., a group manager and an opening authority. We also show that a specialization of our model captures existing models for static and partially dynamic schemes. In the process, we identify a subtle gap in the security achieved by group signatures using revocation lists. We show that in such schemes new members achieve a slightly weaker notion of traceability. The flexibility of our security model allows to capture such relaxation of traceability.
PubDate: 2020-10-01
DOI: 10.1007/s00145-020-09357-w

• Tightly Secure Hierarchical Identity-Based Encryption
• Abstract: We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secure based on the Matrix Diffie-Hellman assumption, which is a generalization of standard Diffie-Hellman assumptions such as k-Linear. We have two tightly secure constructions, one with constant ciphertext size, and the other with tighter security at the cost of linear ciphertext size. Among other things, our schemes imply the first tightly secure identity-based signature scheme by a variant of the Naor transformation.
PubDate: 2020-09-15
DOI: 10.1007/s00145-020-09356-x

• Non-malleable Encryption: Simpler, Shorter, Stronger
• Abstract: One approach toward basing public-key encryption (PKE) schemes on weak and credible assumptions is to build “stronger” or more general schemes generically from “weaker” or more restricted ones. One particular line of work in this context was initiated by Myers and Shelat (FOCS ’09) and continued by Hohenberger, Lewko, and Waters (Eurocrypt ’12), who provide constructions of multi-bit CCA-secure PKE from single-bit CCA-secure PKE. It is well known that encrypting each bit of a plaintext string independently is not CCA-secure—the resulting scheme is malleable. We therefore investigate whether this malleability can be dealt with using the conceptually simple approach of applying a suitable non-malleable code (Dziembowski et al., ICS ’10) to the plaintext and subsequently encrypting the resulting codeword bit by bit. We find that an attacker’s ability to ask multiple decryption queries requires that the underlying code be continuously non-malleable (Faust et al., TCC ’14). Since, as we show, this flavor of non-malleability can only be achieved if the code is allowed to “self-destruct,” the resulting scheme inherits this property and therefore only achieves a weaker variant of CCA security. We formalize this new notion of so-called indistinguishability under self-destruct attacks (IND-SDA) as CCA security with the restriction that the decryption oracle stops working once the attacker submits an invalid ciphertext. We first show that the above approach based on non-malleable codes yields a solution to the problem of domain extension for IND-SDA-secure PKE, provided that the underlying code is continuously non-malleable against (a reduced form of) bit-wise tampering. Then, we prove that the code of Dziembowski et al. is actually already continuously non-malleable against bit-wise tampering. We further investigate the notion of security under self-destruct attacks and combine IND-SDA security with non-malleability under chosen-ciphertext attacks (NM-CPA) to obtain the strictly stronger notion of non-malleability under self-destruct attacks (NM-SDA). We show that NM-SDA security can be obtained from basic IND-CPA security by means of a black-box construction based on the seminal work by Choi et al. (TCC ’08). Finally, we provide a domain extension technique for building a multi-bit NM-SDA scheme from a single-bit NM-SDA scheme. To achieve this goal, we define and construct a novel type of continuous non-malleable code, called secret-state NMC, since, as we show, standard continuous NMCs are insufficient for the natural “encode-then-encrypt-bit-by-bit” approach to work.
PubDate: 2020-08-04
DOI: 10.1007/s00145-020-09361-0

• PCPs and the Hardness of Generating Synthetic Data
• Abstract: Assuming the existence of one-way functions, we show that there is no polynomial-time differentially private algorithm $${\mathcal {A}}$$ that takes a database $$D\in (\{0,1\}^d)^n$$ and outputs a “synthetic database” $${\hat{D}}$$ all of whose two-way marginals are approximately equal to those of D. (A two-way marginal is the fraction of database rows $$x\in \{0,1\}^d$$ with a given pair of values in a given pair of columns.) This answers a question of Barak et al. (PODS ‘07), who gave an algorithm running in time $$\mathrm {poly}(n,2^d)$$ . Our proof combines a construction of hard-to-sanitize databases based on digital signatures (by Dwork et al., STOC ‘09) with encodings based on the PCP theorem. We also present both negative and positive results for generating “relaxed” synthetic data, where the fraction of rows in D satisfying a predicate c are estimated by applying c to each row of $${\hat{D}}$$ and aggregating the results in some way.
PubDate: 2020-07-31
DOI: 10.1007/s00145-020-09363-y

• $${\varvec{1/p}}$$ 1 / p -Secure Multiparty Computation without an Honest
Majority and the Best of Both Worlds
• Abstract: A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation, where parties give their inputs to a trusted party that returns the output of the functionality to all parties. In particular, in the ideal model, such computation is fair—if the corrupted parties get the output, then the honest parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not possible without an honest majority. To overcome this impossibility, Gordon and Katz (Eurocrypt 2010) suggested a relaxed definition—1/p-secure computation—which guarantees partial fairness. For two parties, they constructed 1/p-secure protocols for functionalities for which the size of either their domain or their range is polynomial (in the security parameter). Gordon and Katz ask whether their results can be extended to multiparty protocols. We study 1/p-secure protocols in the multiparty setting for general functionalities. Our main result is constructions of 1/p-secure protocols that are resilient against any number of corrupted parties provided that the number of parties is constant and the size of the range of the functionality is at most polynomial (in the security parameter $${n}$$ ). If fewer than 2/3 of the parties are corrupted, the size of the domain of each party is constant, and the functionality is deterministic, then our protocols are efficient even when the number of parties is $$\log \log {n}$$ . On the negative side, we show that when the number of parties is super-constant, 1/p-secure protocols are not possible when the size of the domain of each party is polynomial. Thus, our feasibility results for 1/p-secure computation are essentially tight. We further motivate our results by constructing protocols with stronger guarantees: If in the execution of the protocol there is a majority of honest parties, then our protocols provide full security. However, if only a minority of the parties are honest, then our protocols are 1/p-secure. Thus, our protocols provide the best of both worlds, where the 1/p-security is only a fall-back option if there is no honest majority.
PubDate: 2020-07-16
DOI: 10.1007/s00145-020-09354-z

JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762

Your IP address: 34.204.201.220

Home (Search)
API
About JournalTOCs
News (blog, publications)

JournalTOCs © 2009-