IACR Cryptol. ePrint Arch.最新文献

筛选
英文 中文
Decentralized Finance (DeFi): A Survey 分散化金融(DeFi):一项调查
IACR Cryptol. ePrint Arch. Pub Date : 2023-08-10 DOI: 10.48550/arXiv.2308.05282
Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang
{"title":"Decentralized Finance (DeFi): A Survey","authors":"Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang","doi":"10.48550/arXiv.2308.05282","DOIUrl":"https://doi.org/10.48550/arXiv.2308.05282","url":null,"abstract":"Decentralized Finance (DeFi) is a new paradigm in the creation, distribution, and utilization of financial services via the integration of blockchain technology. Our research conducts a comprehensive introduction and meticulous classification of various DeFi applications. Beyond that, we thoroughly analyze these risks from both technical and economic perspectives, spanning multiple layers. Lastly, we point out research directions in DeFi, encompassing areas of technological advancements, innovative economics, and privacy optimization.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"112 1","pages":"1210"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87922782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis 解疑:边信道分析ResNets的构建与使用
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-25 DOI: 10.3390/math11153265
Sengim Karayalçın, S. Picek
{"title":"Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis","authors":"Sengim Karayalçın, S. Picek","doi":"10.3390/math11153265","DOIUrl":"https://doi.org/10.3390/math11153265","url":null,"abstract":"The deep learning-based side-channel analysis gave some of the most prominent side-channel attacks against protected targets in the past few years. To this end, the research community’s focus has been on creating the following: (1) powerful multilayer perceptron or convolutional neural network architectures and (2) (if possible) minimal multilayer perceptron or convolutional neural network architectures. Currently, we see that, computationally intensive hyperparameter tuning methods (e.g., Bayesian optimization or reinforcement learning) provide the best results. However, as targets with more complex countermeasures become available, these minimal architectures may be insufficient, and we will require novel deep learning approaches.This work explores how residual neural networks (ResNets) perform in side-channel analysis and how to construct deeper ResNets capable of working with larger input sizes and requiring minimal tuning. The resulting architectures, obtained by following our guidelines, are significantly deeper than commonly seen in side-channel analysis, require minimal hyperparameter tuning for specific datasets, and offer competitive performance with state-of-the-art methods across several datasets. Additionally, the results indicate that ResNets work especially well when the number of profiling traces and features in a trace is large.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"7 1","pages":"963"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78887295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Algebraic Restriction Codes and their Applications 代数限制码及其应用
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-24 DOI: 10.4230/LIPIcs.ITCS.2022.2
Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
{"title":"Algebraic Restriction Codes and their Applications","authors":"Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski","doi":"10.4230/LIPIcs.ITCS.2022.2","DOIUrl":"https://doi.org/10.4230/LIPIcs.ITCS.2022.2","url":null,"abstract":"Consider the following problem: You have a device that is supposed to compute a linear combination of its inputs, which are taken from some finite field. However, the device may be faulty and compute arbitrary functions of its inputs. Is it possible to encode the inputs in such a way that only linear functions can be evaluated over the encodings? I.e., learning an arbitrary function of the encodings will not reveal more information about the inputs than a linear combination. In this work, we introduce the notion of algebraic restriction codes (AR codes), which constrain adversaries who might compute any function to computing a linear function. Our main result is an information-theoretic construction AR codes that restrict any class of function with a bounded number of output bits to linear functions. Our construction relies on a seed which is not provided to the adversary. While interesting and natural on its own, we show an application of this notion in cryptography. In particular, we show that AR codes lead to the first construction of rate-1 oblivious transfer with statistical sender security from the Decisional Diffie–Hellman assumption, and the first-ever construction that makes black-box use of cryptography. Previously, such protocols were known only from the LWE assumption, using non-black-box cryptographic techniques. We expect our new notion of AR codes to find further applications, e.g., in the context of non-malleability, in the future.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"13 1","pages":"1177"},"PeriodicalIF":0.0,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87440843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Money from Abelian Group Actions 来自阿贝尔群行为的量子货币
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-22 DOI: 10.48550/arXiv.2307.12120
Mark Zhandry
{"title":"Quantum Money from Abelian Group Actions","authors":"Mark Zhandry","doi":"10.48550/arXiv.2307.12120","DOIUrl":"https://doi.org/10.48550/arXiv.2307.12120","url":null,"abstract":"We give a construction of public key quantum money, and even a strengthened version called quantum lightning, from abelian group actions, which can in turn be constructed from suitable isogenies over elliptic curves. We prove security in the generic group model for group actions under a plausible computational assumption, and develop a general toolkit for proving quantum security in this model. Along the way, we explore knowledge assumptions and algebraic group actions in the quantum setting, finding significant limitations of these assumptions/models compared to generic group actions.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"6 1","pages":"1097"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78064408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Round Multi-Signatures from Okamoto Signatures 来自冈本签名的两轮多重签名
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-22 DOI: 10.3390/math11143223
Kwangsu Lee, Hyoseung Kim
{"title":"Two-Round Multi-Signatures from Okamoto Signatures","authors":"Kwangsu Lee, Hyoseung Kim","doi":"10.3390/math11143223","DOIUrl":"https://doi.org/10.3390/math11143223","url":null,"abstract":"Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain wallets or to strengthen the security of blockchain consensus protocols are attracting a lot of attention. In this paper, we propose an efficient two-round MS scheme based on Okamoto signatures rather than Schnorr signatures. To this end, we first propose a new PKS scheme by modifying the Okamoto signature scheme and prove the unforgeability of our PKS scheme under the discrete logarithm assumption in the algebraic group model (AGM) and the non-programmable random oracle model (ROM). Next, we propose a two-round MS scheme based on the new PKS scheme and prove the unforgeability of our MS scheme under the discrete logarithm assumption in the AGM and the non-programmable ROM. Our MS scheme is the first one to prove security among two-round MS based on Okamoto signatures.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"134 1","pages":"1117"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72741017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An attack on a key exchange protocol based on max-times and min-times algebras 对基于最大次代数和最小次代数的密钥交换协议的攻击
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-21 DOI: 10.1007/s13226-023-00469-0
M. Kotov, A. Treier, Ivan Buchinskiy
{"title":"An attack on a key exchange protocol based on max-times and min-times algebras","authors":"M. Kotov, A. Treier, Ivan Buchinskiy","doi":"10.1007/s13226-023-00469-0","DOIUrl":"https://doi.org/10.1007/s13226-023-00469-0","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"1 1","pages":"1644"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80579291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis 支持自编码器的模型可移植性,以减少侧信道分析中的超参数调整工作
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-21 DOI: 10.1007/s13389-023-00330-4
Marina Krček, Guilherme Perin
{"title":"Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis","authors":"Marina Krček, Guilherme Perin","doi":"10.1007/s13389-023-00330-4","DOIUrl":"https://doi.org/10.1007/s13389-023-00330-4","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"22 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90272108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis 自动兴趣点选择侧通道分析
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-20 DOI: 10.1007/s13389-023-00328-y
Mick G. D. Remmerswaal, Lichao Wu, S. Tiran, N. Mentens
{"title":"AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis","authors":"Mick G. D. Remmerswaal, Lichao Wu, S. Tiran, N. Mentens","doi":"10.1007/s13389-023-00328-y","DOIUrl":"https://doi.org/10.1007/s13389-023-00328-y","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"133 1","pages":"8"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80165041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model 随机Oracle模型中基于二叉树的前向安全签名方案
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-20 DOI: 10.24425/ijet.2021.137868
M. Jurkiewicz
{"title":"Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model","authors":"M. Jurkiewicz","doi":"10.24425/ijet.2021.137868","DOIUrl":"https://doi.org/10.24425/ijet.2021.137868","url":null,"abstract":"—In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a completely abstract fashion it ought to be viewed as being actually defined over E ( F q n )[ p ] × E ( F q nk )[ p ] → F q nk [ p ] . The crucial element of the scheme is the key updater algorithm. With the adoption of pairings and binary trees where a number of leaves is the same as a number of time periods, we are assured that an updated secret key can not be used to recover any of its predecessors. This, in consequence, means that the scheme is forward-secure. To formally justify this assertion, we conduct analysis in fu - cma security model by reducing the security of the scheme to the computational hardness of solving the Weak ℓ -th Bilinear Diffie-Hellman Inversion problem type. We define this problem and explain why it can be treated as a source of security for cryptographic schemes. As for the reduction itself, in general case, it could be possible to make only in the random oracle model.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"89 4 1","pages":"1505"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83933824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New RSA Variant Based on Elliptic Curves 一种基于椭圆曲线的RSA新变体
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-19 DOI: 10.3390/cryptography7030037
Maher Boudabra, Abderrahmane Nitaj
{"title":"A New RSA Variant Based on Elliptic Curves","authors":"Maher Boudabra, Abderrahmane Nitaj","doi":"10.3390/cryptography7030037","DOIUrl":"https://doi.org/10.3390/cryptography7030037","url":null,"abstract":"In this paper, we propose a new scheme based on ephemeral elliptic curves over a finite ring with an RSA modulus. The new scheme is a variant of both the RSA and the KMOV cryptosystems and can be used for both signature and encryption. We study the security of the new scheme and show that it is immune to factorization attacks, discrete-logarithm-problem attacks, sum-of-two-squares attacks, sum-of-four-squares attacks, isomorphism attacks, and homomorphism attacks. Moreover, we show that the private exponents can be much smaller than the ordinary exponents in RSA and KMOV, which makes the decryption phase in the new scheme more efficient.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"2 1","pages":"1299"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89967871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信