IACR Cryptol. ePrint Arch.最新文献

筛选
英文 中文
Reduction of the secret key length in the perfect cipher by data compression and randomisation 通过数据压缩和随机化来减少完美密码中的密钥长度
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-19 DOI: 10.48550/arXiv.2307.09735
B. Ryabko
{"title":"Reduction of the secret key length in the perfect cipher by data compression and randomisation","authors":"B. Ryabko","doi":"10.48550/arXiv.2307.09735","DOIUrl":"https://doi.org/10.48550/arXiv.2307.09735","url":null,"abstract":"Perfect ciphers have been a very attractive cryptographic tool ever since C. Shannon described them. Note that, by definition, if a perfect cipher is used, no one can get any information about the encrypted message without knowing the secret key. We consider the problem of reducing the key length of perfect ciphers, because in many applications the length of the secret key is a crucial parameter. This paper describes a simple method of key length reduction. This method gives a perfect cipher and is based on the use of data compression and randomisation, and the average key length can be made close to Shannon entropy (which is the key length limit). It should be noted that the method can effectively use readily available data compressors (archivers).","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"57 1","pages":"1036"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86714896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin 单层混合PoW共识协议,鼓励比特币去中心化
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-15 DOI: 10.1155/2023/6169933
Gyu-Chol Kim
{"title":"Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin","authors":"Gyu-Chol Kim","doi":"10.1155/2023/6169933","DOIUrl":"https://doi.org/10.1155/2023/6169933","url":null,"abstract":"We propose a single-tiered hybrid proof-of-work consensus protocol to encourage decentralization in bitcoin. Our new mechanism comprises coupled puzzles from which properties differ from each other; the one is the extant outsourceable bitcoin puzzle while the other is nonoutsourceable. Our new protocol enables miners to solve either puzzle as they want; therefore, blocks can be generated by either puzzle. Our hybrid consensus can be successfully implemented in bitcoin because it is backward-compatible with existing bitcoin mining equipment (more precisely, existing bitcoin mining ASICs).","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"31 1","pages":"84"},"PeriodicalIF":0.0,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80971123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper bounding the number of bent functions using 2-row bent rectangles 使用两行弯曲矩形的弯曲函数数目的上限
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-06 DOI: 10.29235/1561-2430-2023-59-2-130-135
S. Agievich
{"title":"Upper bounding the number of bent functions using 2-row bent rectangles","authors":"S. Agievich","doi":"10.29235/1561-2430-2023-59-2-130-135","DOIUrl":"https://doi.org/10.29235/1561-2430-2023-59-2-130-135","url":null,"abstract":"Using the representation of bent functions (maximum nonlinear functions) by bent rectangles, that is, special matrices with restrictions on columns and rows, we obtain herein an upper bound on the number of bent functions that improves the previously known bounds in a practical range of dimensions. The core of our method is the following fact based on the recent observation by V. Potapov (arXiv:2107.14583): a 2-row bent rectangle is completely determined by one of its rows and the remaining values in slightly more than half of the columns. ","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"75 1","pages":"497"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86404273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption 一种基于同态加密的持久同态计算算法
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-04 DOI: 10.48550/arXiv.2307.01923
Dominic Gold, Koray Karabina, Francis C. Motta
{"title":"An Algorithm for Persistent Homology Computation Using Homomorphic Encryption","authors":"Dominic Gold, Koray Karabina, Francis C. Motta","doi":"10.48550/arXiv.2307.01923","DOIUrl":"https://doi.org/10.48550/arXiv.2307.01923","url":null,"abstract":"Topological Data Analysis (TDA) offers a suite of computational tools that provide quantified shape features in high dimensional data that can be used by modern statistical and predictive machine learning (ML) models. In particular, persistent homology (PH) takes in data (e.g., point clouds, images, time series) and derives compact representations of latent topological structures, known as persistence diagrams (PDs). Because PDs enjoy inherent noise tolerance, are interpretable and provide a solid basis for data analysis, and can be made compatible with the expansive set of well-established ML model architectures, PH has been widely adopted for model development including on sensitive data, such as genomic, cancer, sensor network, and financial data. Thus, TDA should be incorporated into secure end-to-end data analysis pipelines. In this paper, we take the first step to address this challenge and develop a version of the fundamental algorithm to compute PH on encrypted data using homomorphic encryption (HE).","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"47 1","pages":"1048"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80396770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical-Quantum Differential Attack on Block Ciphers 分组密码的实用量子差分攻击
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-01 DOI: 10.1007/s12095-023-00650-6
T. Yadav, M. Kumar, Ajay Kumar, S. Pal
{"title":"A Practical-Quantum Differential Attack on Block Ciphers","authors":"T. Yadav, M. Kumar, Ajay Kumar, S. Pal","doi":"10.1007/s12095-023-00650-6","DOIUrl":"https://doi.org/10.1007/s12095-023-00650-6","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"24 1","pages":"489"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79109984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption 频率暴露攻击与频率隐藏保序加密
IACR Cryptol. ePrint Arch. Pub Date : 2023-07-01 DOI: 10.14778/3611479.3611513
Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
{"title":"Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption","authors":"Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren","doi":"10.14778/3611479.3611513","DOIUrl":"https://doi.org/10.14778/3611479.3611513","url":null,"abstract":"Order-preserving encryption (OPE) allows efficient comparison operations over encrypted data and thus is popular in encrypted databases. However, most existing OPE schemes are vulnerable to inference attacks as they leak plaintext frequency. To this end, some\u0000 frequency-hiding\u0000 order-preserving encryption (FH-OPE) schemes are proposed and claim to prevent the leakage of frequency. FH-OPE schemes are considered an important step towards mitigating inference attacks.\u0000 \u0000 \u0000 Unfortunately, there are still vulnerabilities in all existing FH-OPE schemes. In this work, we revisit the security of all existing FH-OPE schemes. We are the first to demonstrate that plaintext frequency hidden by them is recoverable. We present three ciphertext-only attacks named\u0000 frequency-revealing attacks\u0000 to recover plaintext frequency. We evaluate our attacks in three real-world datasets. They recover over 90% of plaintext frequency hidden by any existing FH-OPE scheme. With frequency revealed, we also show the potentiality to apply inference attacks on existing FH-OPE schemes.\u0000 \u0000 Our findings highlight the limitations of current FH-OPE schemes. Our attacks demonstrate that achieving frequency-hiding requires addressing the leakages of both non-uniform ciphertext distribution and insertion orders of ciphertexts, even though the leakage of insertion orders is always ignored in OPE.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"32 1","pages":"1122"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87423039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Two-sided Permutation Inversion Problem 关于双侧置换反演问题
IACR Cryptol. ePrint Arch. Pub Date : 2023-06-23 DOI: 10.48550/arXiv.2306.13729
G. Alagic, Chen-Ming Bai, Alexander Poremba, Kaiyan Shi
{"title":"On the Two-sided Permutation Inversion Problem","authors":"G. Alagic, Chen-Ming Bai, Alexander Poremba, Kaiyan Shi","doi":"10.48550/arXiv.2306.13729","DOIUrl":"https://doi.org/10.48550/arXiv.2306.13729","url":null,"abstract":"In the permutation inversion problem, the task is to find the preimage of some challenge value, given oracle access to the permutation. This is a fundamental problem in query complexity, and appears in many contexts, particularly cryptography. In this work, we examine the setting in which the oracle allows for quantum queries to both the forward and the inverse direction of the permutation -- except that the challenge value cannot be submitted to the latter. Within that setting, we consider two options for the inversion algorithm: whether it can get quantum advice about the permutation, and whether it must produce the entire preimage (search) or only the first bit (decision). We prove several theorems connecting the hardness of the resulting variations of the inversion problem, and establish a number of lower bounds. Our results indicate that, perhaps surprisingly, the inversion problem does not become significantly easier when the adversary is granted oracle access to the inverse, provided it cannot query the challenge itself.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"72 1","pages":"985"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84018505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving Federated Singular Value Decomposition 保持隐私的联邦奇异值分解
IACR Cryptol. ePrint Arch. Pub Date : 2023-06-21 DOI: 10.3390/app13137373
Bowen Liu, Qiang Tang
{"title":"Privacy-preserving Federated Singular Value Decomposition","authors":"Bowen Liu, Qiang Tang","doi":"10.3390/app13137373","DOIUrl":"https://doi.org/10.3390/app13137373","url":null,"abstract":"Singular value decomposition (SVD) is a fundamental technique widely used in various applications, such as recommendation systems and principal component analyses. In recent years, the need for privacy-preserving computations has been increasing constantly, which concerns SVD as well. Federated SVD has emerged as a promising approach that enables collaborative SVD computation without sharing raw data. However, existing federated approaches still need improvements regarding privacy guarantees and utility preservation. This paper moves a step further towards these directions: we propose two enhanced federated SVD schemes focusing on utility and privacy, respectively. Using a recommendation system use-case with real-world data, we demonstrate that our schemes outperform the state-of-the-art federated SVD solution. Our utility-enhanced scheme (utilizing secure aggregation) improves the final utility and the convergence speed by more than 2.5 times compared with the existing state-of-the-art approach. In contrast, our privacy-enhancing scheme (utilizing differential privacy) provides more robust privacy protection while improving the same aspect by more than 25%.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"23 1","pages":"1271"},"PeriodicalIF":0.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79486843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerated Encrypted Execution of General-Purpose Applications 通用应用程序的加速加密执行
IACR Cryptol. ePrint Arch. Pub Date : 2023-06-19 DOI: 10.48550/arXiv.2306.11006
Charles Gouert, Vinu Joseph, Steven Dalton, C. Augonnet, M. Garland, N. G. Tsoutsos
{"title":"Accelerated Encrypted Execution of General-Purpose Applications","authors":"Charles Gouert, Vinu Joseph, Steven Dalton, C. Augonnet, M. Garland, N. G. Tsoutsos","doi":"10.48550/arXiv.2306.11006","DOIUrl":"https://doi.org/10.48550/arXiv.2306.11006","url":null,"abstract":"Fully Homomorphic Encryption (FHE) is a cryptographic method that guarantees the privacy and security of user data during computation. FHE algorithms can perform unlimited arithmetic computations directly on encrypted data without decrypting it. Thus, even when processed by untrusted systems, confidential data is never exposed. In this work, we develop new techniques for accelerated encrypted execution and demonstrate the significant performance advantages of our approach. Our current focus is the Fully Homomorphic Encryption over the Torus (CGGI) scheme, which is a current state-of-the-art method for evaluating arbitrary functions in the encrypted domain. CGGI represents a computation as a graph of homomorphic logic gates and each individual bit of the plaintext is transformed into a polynomial in the encrypted domain. Arithmetic on such data becomes very expensive: operations on bits become operations on entire polynomials. Therefore, evaluating even relatively simple nonlinear functions, such as a sigmoid, can take thousands of seconds on a single CPU thread. Using our novel framework for end-to-end accelerated encrypted execution called ArctyrEX, developers with no knowledge of complex FHE libraries can simply describe their computation as a C program that is evaluated over $40times$ faster on an NVIDIA DGX A100 and $6times$ faster with a single A100 relative to a 256-threaded CPU baseline.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"40 1","pages":"641"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72924406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new approach based on quadratic forms to attack the McEliece cryptosystem 一种基于二次型的攻击McEliece密码系统的新方法
IACR Cryptol. ePrint Arch. Pub Date : 2023-06-17 DOI: 10.48550/arXiv.2306.10294
Alain Couvreur, Rocco Mora, J. Tillich
{"title":"A new approach based on quadratic forms to attack the McEliece cryptosystem","authors":"Alain Couvreur, Rocco Mora, J. Tillich","doi":"10.48550/arXiv.2306.10294","DOIUrl":"https://doi.org/10.48550/arXiv.2306.10294","url":null,"abstract":"We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms. Those are associated with quadratic relationships for the component-wise product in the dual of the code used in the cryptosystem. Depending on the characteristic of the code field, this space of matrices consists only of symmetric matrices or skew-symmetric matrices. This matrix space is shown to contain unusually low-rank matrices (rank $2$ or $3$ depending on the characteristic) which reveal the secret polynomial structure of the code. Finding such matrices can then be used to recover the secret key of the scheme. We devise a dedicated approach in characteristic $2$ consisting in using a Gr\"obner basis modeling that a skew-symmetric matrix is of rank $2$. This allows to analyze the complexity of solving the corresponding algebraic system with Gr\"obner bases techniques. This computation behaves differently when applied to the skew-symmetric matrix space associated with a random code rather than with a Goppa or an alternant code. This gives a distinguisher of the latter code family. We give a bound on its complexity which turns out to interpolate nicely between polynomial and exponential depending on the code parameters. A distinguisher for alternant/Goppa codes was already known [FGO+11]. It is of polynomial complexity but works only in a narrow parameter regime. This new distinguisher is also polynomial for the parameter regime necessary for [FGO+11] but contrarily to the previous one is able to operate for virtually all code parameters relevant to cryptography. Moreover, we use this matrix space to find a polynomial time attack of the McEliece cryptosystem provided that the Goppa code is distinguishable by the method of [FGO+11] and its degree is less than $q-1$, where $q$ is the alphabet size of the code.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"63 1","pages":"950"},"PeriodicalIF":0.0,"publicationDate":"2023-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81383352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信