-
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms
ePrint Report: Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega This paper introduces new protocols for secure multiparty computation (MPC) leveraging Discrete Wavelet Transforms (DWTs) for computing nonlinear functions over large domains. By employing DWTs, the protocols significantly reduce the overhead typically…
-
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell
ePrint Report: Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell Wouter Legiest, Jan-Pieter D’Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede This paper presents a novel approach to calculating the Levenshtein (edit) distance within the framework of Fully Homomorphic Encryption (FHE), specifically targeting third-generation schemes like TFHE. Edit distance computations are essential in…
-
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal
ePrint Report: DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal Dipayan Saha, Farimah Farahmandi Side-channel analysis (SCA) does not aim at the algorithm’s weaknesses but rather its implementations. The rise of machine learning (ML) and deep learning (DL) is giving adversaries advanced capabilities to perform stealthy attacks. In this paper, we propose DL-SCADS, a…
-
A Combinatorial Approach to IoT Data Security
ePrint Report: A Combinatorial Approach to IoT Data Security Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar This article explores the potential of Secret Sharing-Based Internet of Things (SBIoT) as a promising cryptographic element across diverse applications, including secure data storage in commercial cloud systems (Datachest), smart home environments (encompassing sensors, cameras, smart locks,…
-
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
ePrint Report: Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut, Reza Azarderakhsh Side-channel attacks (SCA) pose a significant threat to cryptographic implementations, including those designed to withstand the computational power of quantum computers. This paper introduces the first side-channel attack on an industry-grade post-quantum cryptography implementation, Adam’s Bridge.…
-
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials
ePrint Report: A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials Angold Wang This survey provides a comprehensive examination of zero-knowledge interactive verifiable computing, emphasizing the utilization of randomnes in low-degree polynomials. We begin by tracing the evolution of general-purpose verifiable computing, starting with the foundational concepts of complexity theory developed in…
-
Non Linearizable Entropic Operator
ePrint Report: Non Linearizable Entropic Operator Daniel Nager In [Pan21] a linearization attack is proposed in order to break the cryp- tosystem proposed in [Gli21]. We want to propose here a non-linearizable operator that disables this attack as this operator doesn’t give raise to a quasigrup and doesn’t obey the latin square property. Go to…
-
Compact Key Storage in the Standard Model
ePrint Report: Compact Key Storage in the Standard Model Yevgeniy Dodis, Daniel Jost In recent work [Crypto’24], Dodis, Jost, and Marcedone introduced Compact Key Storage (CKS) as a modern approach to backup for end-to-end (E2E) secure applications. As most E2E-secure applications rely on a sequence of secrets $(s_1,…,s_n)$ from which, together with the ciphertexts sent…
-
MicroNova: Folding-based arguments with efficient (on-chain) verification
ePrint Report: MicroNova: Folding-based arguments with efficient (on-chain) verification Jiaxing Zhao, Srinath Setty, Weidong Cui We describe the design and implementation of MicroNova, a folding-based recursive argument for producing proofs of incremental computations of the form $y = F^{(ell)}(x)$, where $F$ is a possibly non-deterministic computation (encoded using a constraint system such as R1CS), $x$…
-
Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup
ePrint Report: Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup Hanwen Feng, Qiang Tang This paper presents the first optimal-resilient, adaptively secure asynchronous common coin protocol with $O(lambda n^2)$ communication complexity and $O(1)$ rounds, requiring only a public silent setup. Our protocol immediately implies a sequence of quadratic-communication, constant-round asynchronous Byzantine agreement…