Newest Questions
32,053 questions
2
votes
0
answers
29
views
Why ABY3 achieves 4k communications in semi-honest setting and 11k communications in malicious setting?
I read the ABY3 paper. First of all, I noticed that the labels for "malicious" and "semi-honest" are swapped Table 2.
Additionally, I don’t understand why ABY3 achieves 4k ...
1
vote
0
answers
38
views
How is ZKSTARK / FRI secure for small delta?
In Dan Boneh's excellent lecture about FRI, he gives the probability of a verifier accepting a vector u0 that is delta close to ...
0
votes
0
answers
38
views
Can someone decipher this supposed pigpen or rosicrucian cipher? [closed]
https://imgur.com/a/ErHmTPz
There are more variations than the one present in the image, but the most used letters are certainly present. I tried letter frequency, word searching. The plain text ...
0
votes
0
answers
37
views
CPA secure scheme without circular security
Construct a public-key encryption scheme which is CPA secure
but not circularly secure, relying only on the existence of public-key encryption
schemes.
This is a problem from my cryptography course ...
0
votes
0
answers
48
views
Does this key-derivation construction achieve context-isolated leakage resilience, and is passphrase rotation secure?
I would like to ask for a technical review of a key-derivation construction
that we developed while designing a multi-chain wallet and an E2EE identity
layer.
This construction is part of a broader ...
1
vote
0
answers
63
views
Elliptic curve cryptography on integers mod p^2
I'm trying to solve the discrete log problem in this context :
I have a curve given by a short Weirstrass equation : $y^2 = x^3+ax +b$
where the point addition and scalar multiplication are done ...
0
votes
0
answers
49
views
Questions about starting a security business [closed]
brothers.
I'm a 21-year-old college student studying security and cryptography in South Korea.
When I first encountered quantum computers a few years ago, I didn't pay much attention,
but seeing the ...
0
votes
1
answer
90
views
Is Diffie-Hellman in $\mathsf{NP}\cap\mathsf{coNP}$ without discrete log witness?
Given prime $p$, generator $g$ of $\mathbb Z_p^*$ and $h_1,h_2,h_3\in\mathbb Z_p^*$ is $$\log_ph_3=(\log_ph_1)(\log_ph_2)$$ where at every $i\in\{1,2,3\}\mbox{ }g^{\log_ph_i}\equiv h_i\bmod p$ holds?
...
2
votes
2
answers
118
views
Rationale for SP 800-56Cr2 ordering of shared secrets in hybrid schemes
In TLS, mlkem768x25519 derives a master shared secret from a concatenation of the x25519 shared secret and the ML-KEM shared secret. The FIPS-approved hybrid PQC key agreement algorithm, ...
4
votes
1
answer
152
views
What gives Streamlined NTRU Prime a small attack surface?
Streamlined NTRU Prime (SNTRUP) is a post-quantum KEM that achieves IND-CCA2 security. According to DJB's website, Streamlined NTRU Prime is designed to minimize the complexity of a thorough security ...
0
votes
0
answers
38
views
Safe Secret Data Exfiltration [closed]
Consider the following problem:
we have two parties: Alice and Bob
Alice has some sensitive data D (for Data) that she does not want to reveal to Bob
Bob has some sensitive code C (for Code) that he ...
0
votes
0
answers
27
views
Is it true that if Miller inversion is easy, then the Weil pairing inversion is easy on BN curves?
I was given the following explaination, some parts of it are wrong but others looks truethefull:
Here is the rigorous mathematical explanation of why this technique works.
The validity of the formula $...
4
votes
1
answer
444
views
Most efficient discrete log algorithm for RFC3526 primes?
I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
1
vote
1
answer
82
views
Definition of UC security
Universally composable (UC) security is defined in the ideal/real model paradigm. In this paradigm, a real protocol $\Pi$ is defined to be secure when the outputs of this protocol are ...
2
votes
1
answer
158
views
Question about some details in SQIsign signing algorithm
The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf.
I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...