Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <7VFKDcTWLUahsTDgOg36fJ9LxhHuy0Wl@eprint.iacr.org.invalid>
Deutsch   English   Français   Italiano  
<7VFKDcTWLUahsTDgOg36fJ9LxhHuy0Wl@eprint.iacr.org.invalid>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: IACR ePrint Archive <noreply@example.invalid>
Newsgroups: sci.crypt
Subject: [digest] 2024 Week 30
Date: Mon, 29 Jul 2024 02:26:25 -0000
Organization: A noiseless patient Spider
Lines: 1078
Message-ID: <7VFKDcTWLUahsTDgOg36fJ9LxhHuy0Wl@eprint.iacr.org.invalid>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Injection-Date: Mon, 29 Jul 2024 04:26:32 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="300283253f1cd75b516e3ea2a65ce787";
	logging-data="337641"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+Ak34NCzNZSrAAiESOG9oLxXwM4iDPm3Y="
Cancel-Lock: sha1:1BT7QPRIVKF3ZwP9qr7ULIZXnOM=
Bytes: 59788

## In this issue

1. [2024/875] Succinctly-Committing Authenticated Encryption
2. [2024/1179] Inner Product Ring LWE Problem, Reduction, New ...
3. [2024/1180] Fast computation of 2-isogenies in dimension 4 and ...
4. [2024/1181] AQQUA: Augmenting Quisquis with Auditability
5. [2024/1182] Hyperion: Transparent End-to-End Verifiable Voting ...
6. [2024/1183] Updatable Private Set Intersection from Structured ...
7. [2024/1184] Sanitizable and Accountable Endorsement for Dynamic ...
8. [2024/1185] Erebor and Durian: Full Anonymous Ring Signatures ...
9. [2024/1186] MATTER: A Wide-Block Tweakable Block Cipher
10. [2024/1187] STORM =E2=80=94 Small Table Oriented Redundancy-based SCA ...
11. [2024/1188] Lightweight Dynamic Linear Components for Symmetric ...
12. [2024/1189] The Espresso Sequencing Network: HotShot Consensus, ...
13. [2024/1190] Efficient Two-Party Secure Aggregation via ...
14. [2024/1191] A note on ``a novel authentication protocol for ...
15. [2024/1192] Towards ML-KEM & ML-DSA on OpenTitan
16. [2024/1193] The syzygy distinguisher
17. [2024/1194] Hardware Implementation and Security Analysis of ...
18. [2024/1195] Efficient Implementation of Super-optimal Pairings ...
19. [2024/1196] Client-Aided Privacy-Preserving Machine Learning
20. [2024/1197] Optimizing Rectangle and Boomerang Attacks: A ...
21. [2024/1198] ECO-CRYSTALS: Efficient Cryptography CRYSTALS on ...
22. [2024/1199] On degrees of carry and Scholz's conjecture
23. [2024/1200] Depth-Aware Arithmetization of Common Primitives in ...
24. [2024/1201] Designing a General-Purpose 8-bit (T)FHE Processor ...
25. [2024/1202] Prover - Toward More Efficient Formal Verification ...
26. [2024/1203] Preservation of Speculative Constant-time by ...
27. [2024/1204] A fast heuristic for mapping Boolean circuits to ...
28. [2024/1205] Analysis of One Scheme for User Authentication and ...
29. [2024/1206] Applying Post-Quantum Cryptography Algorithms to a ...
30. [2024/1207] What Have SNARGs Ever Done for FHE?
31. [2024/1208] H=E1=B4=87=E1=B4=8B=E1=B4=80=E1=B4=9B=E1=B4=8F=C9=B4: Horizon=
tally-Scalable zkSNARKs via Proof ...
32. [2024/1209] Collaborative CP-NIZKs: Modular, Composable Proofs ...

## 2024/875

* Title: Succinctly-Committing Authenticated Encryption
* Authors: Mihir Bellare, Viet Tung Hoang
* [Permalink](https://eprint.iacr.org/2024/875)
* [Download](https://eprint.iacr.org/2024/875.pdf)

### Abstract

Recent attacks and applications have led to the need for symmetric encryption=
 schemes that, in addition to providing the usual authenticity and privacy, a=
re also committing. In response, many committing authenticated encryption sch=
emes have been proposed. However, all known schemes, in order to provide s bi=
ts of committing security, suffer an expansion---this is the length of the ci=
phertext minus the length of the plaintext---of 2s bits. This incurs a cost i=
n bandwidth or storage. (We typically want s=3D128, leading to 256-bit expans=
ion.) However, it has been considered unavoidable due to birthday attacks. We=
 show how to bypass this limitation. We give authenticated encryption (AE) sc=
hemes that provide s bits of committing security, yet suffer expansion only a=
round s as long as messages are long enough, namely more than s bits. We call=
 such schemes succinct. We do this via a generic, ciphertext-shortening trans=
form called SC: given an AE scheme with 2s-bit expansion, SC returns an AE sc=
heme with s-bit expansion while preserving committing security. SC is very ef=
ficient; an AES-based instantiation has overhead just two AES calls. As a too=
l, SC uses a collision-resistant invertible PRF called HtM, that we design, a=
nd whose analysis is technically difficult. To add the committing security th=
at SC assumes to a base scheme, we also give a transform CTY that improves Ch=
an and Rogaway's CTX. Our results hold in a general framework for authenticat=
ed encryption, called AE3, that includes both AE1 (also called AEAD) and AE2 =
(also called nonce-hiding AE) as special cases, so that we in particular obta=
in succinctly-committing AE schemes for both these settings.



## 2024/1179

* Title: Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm fo=
r Inner Product Ring LWE Problem and Ring SIS Problem
* Authors: Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
* [Permalink](https://eprint.iacr.org/2024/1179)
* [Download](https://eprint.iacr.org/2024/1179.pdf)

### Abstract

Lattice cryptography is currently a major research focus in public-key encryp=
tion, renowned for its ability to resist quantum attacks. The introduction of=
 ideal lattices (ring lattices) has elevated the theoretical framework of lat=
tice cryptography. Ideal lattice cryptography, compared to classical lattice =
cryptography, achieves more acceptable operational efficiency through fast Fo=
urier transforms. However, to date, issues of impracticality or insecurity pe=
rsist in ideal lattice problems. In order to provide a reasonable and secure =
trapdoor algorithm, this paper introduces the concept of "Inner Product Ring =
LWE" and establishes its quantum resistance and indistinguishability using kn=
owledge of time complexity, fixed-point theory, and statistical distances. In=
ner product Ring LWE is easier to construct trapdoor algorithms compared to R=
ing LWE. Additionally, leveraging the properties of NTRU, we propose a more s=
ecure Ring SIS trapdoor algorithm.



## 2024/1180

* Title: Fast computation of 2-isogenies in dimension 4 and cryptographic app=
lications
* Authors: Pierrick Dartois
* [Permalink](https://eprint.iacr.org/2024/1180)
* [Download](https://eprint.iacr.org/2024/1180.pdf)

### Abstract

Dimension 4 isogenies have first been introduced in cryptography for the cryp=
tanalysis of Supersingular Isogeny Diffie-Hellman (SIDH) and have been used c=
onstructively in several schemes, including SQIsignHD, a derivative of SQIsig=
n isogeny based signature scheme. Unlike in dimensions 2 and 3, we can no lon=
ger rely on the Jacobian model and its derivatives to compute isogenies. In d=
imension 4 (and higher), we can only use theta-models. Previous works by Roma=
in Cosset, David Lubicz and Damien Robert have focused on the computation of =
$\ell$-isogenies in theta-models of level $n$ coprime to $\ell$ (which requir=
es to use $n^g$ coordinates in dimension $g$). For cryptographic applications=
, we need to compute chains of $2$-isogenies, requiring to use $\geq 3^g$ coo=
rdinates in dimension $g$ with state of the art algorithms. =20

In this paper, we present algorithms to compute chains of $2$-isogenies betwe=
en abelian varieties of dimension $g\geq 1$ with theta-coordinates of level $=
n=3D2$, generalizing a previous work by Pierrick Dartois, Luciano Maino, Giac=
omo Pope and Damien Robert in dimension $g=3D2$. We propose an implementation=
 of these algorithms in dimension $g=3D4$ to compute endomorphisms of ellipti=
c curve products derived from Kani's lemma with applications to SQIsignHD and=
 SIDH cryptanalysis. We are now able to run a complete key recovery attack on=
 SIDH when the endomorphism ring of the starting curve is unknown within a fe=
w seconds on a laptop for all NIST SIKE parameters.



## 2024/1181

* Title: AQQUA: Augmenting Quisquis with Auditability
* Authors: George Papadoulis, Danai Balla, Panagiotis Grontas, Aris Pagourtzis
* [Permalink](https://eprint.iacr.org/2024/1181)
* [Download](https://eprint.iacr.org/2024/1181.pdf)

### Abstract

We propose AQQUA: a digital payment system that combines auditability and pri=
vacy. AQQUA extends Quisquis by adding two authorities; one for registration =
and one for auditing. These authorities do not intervene in the everyday tran=
saction processing; as a consequence, the decentralized nature of the cryptoc=
urrency is not disturbed. Our construction is account-based. An account consi=
sts of an updatable public key which functions as a cryptographically unlinka=
ble pseudonym, and of commitments to the balance, the total amount of coins s=
pent, and the total amount of coins received. In order to participate in the =
system a user creates an initial account with the registration authority. To =
protect their privacy, whenever the user wants to transact they create unlink=
able new accounts by updating their public key and the total number of accoun=
ts they own (maintained in committed form). The audit authority may request a=
n audit at will. The user must prove in zero-knowledge that all their account=
s are compliant to  specific policies. We formally define a security model ca=
pturing the properties that a private and auditable digital payment system sh=
ould possess and we analyze the security of AQQUA under this model.



## 2024/1182

* Title: Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mit=
igation
* Authors: Aditya Damodaran, Simon Rastikian, Peter B. R=C3=B8nne, Peter Y A =
Ryan
* [Permalink](https://eprint.iacr.org/2024/1182)
* [Download](https://eprint.iacr.org/2024/1182.pdf)

### Abstract

We present Hyperion, an end-to-end verifiable e-voting scheme that allows the=
 voters to identify their votes in cleartext in the final tally. In contrast =
to schemes like Selene or sElect, identification is not via (private) tracker=
 numbers but via cryptographic commitment terms. After publishing the tally, =
the Election Authority provides each voter with an individual dual key. Voter=
s identify their votes by raising their dual key to their secret trapdoor key=
 and finding the matching commitment term in the tally.=20
The dual keys are self-certifying in that, without the voter's trapdoor key, =
it is intractable to forge a dual key that, when raised to the trapdoor key, =
will match an alternative commitment. On the other hand, a voter can use thei=
r own trapdoor key to forge a dual key to fool any would-be coercer.
Additionally, we propose a variant of Hyperion that counters the tracker coll=
ision threat present in Selene. We introduce individual verifiable views: eac=
h voter gets their own independently shuffled view of the master Bulletin Boa=
========== REMAINDER OF ARTICLE TRUNCATED ==========