6003 results sorted by ID

2026/402 (PDF) Last updated: 2026-02-26
Conditionally Linkable Attribute-Based Signatures
Minh Pham, Khoa Nguyen, Slim Bettaieb, Mukul Kulkarni, Willy Susilo
Cryptographic protocols

Attribute-Based Signatures (ABS) enable users to authenticate messages under expressive attribute policies while remaining anonymous. Existing ABS variants, however, treat linkability as a static, system-wide property: signatures are either always unlinkable, as in standard ABS, or globally linkable, as in traceable or accountable extensions. This rigid dichotomy fails to capture scenarios where correlation should arise only under explicitly declared conditions. This work introduces...

2026/401 (PDF) Last updated: 2026-02-26
NIROPoK-Based Post-Quantum Sidechain Design on Ethereum
Hassan Khodaiemehr, Khadijeh Bagheri, Saeid Yazdinejad, Chen Feng
Cryptographic protocols

This paper presents a pioneering approach to constructing sidechains on the Ethereum network with a focus on post-quantum security. Our framework integrates a novel quantum-resistant version of a non-interactive random oracle proof of knowledge (NIROPoK) scheme, alongside a quantum-resistant proof-of-stake mechanism and a post-quantum bridge based on the Dilithium digital signature scheme. By harnessing these advanced cryptographic techniques, we establish a robust defense against quantum...

2026/400 (PDF) Last updated: 2026-02-26
Non-interactive Blind Signatures with Threshold Issuance
Foteini Baldimtsi, Lucjan Hanzlik, Aayush Yadav
Cryptographic protocols

Non-interactive blind signatures (NIBS) capture the minimal setting of blind signatures where the message space is restricted to unstructured random strings. They enable a signer to pre-compute presignatures without prior interaction, while ensuring that only the intended recipient can derive the corresponding blind signature. In this work, we consider the problem of threshold issuance of NIBS. Specifically, we introduce the notion of non-interactive threshold blind signatures (NITBS),...

2026/398 (PDF) Last updated: 2026-02-26
Orthus: Practical Sublinear Batch-Verification of Lattice Relations from Standard Assumptions
Madalina Bolboceanu, Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo, Gregor Seiler
Cryptographic protocols

The past several years have seen a rapid rise in practical lattice-based proof systems with linear-sized zero-knowledge proofs forming the foundation of many of the most efficient quantum-safe privacy protocols, and succinct proofs rapidly catching up and surpassing other quantum-safe alternatives in many metrics. A recent comparison of lattice-based aggregate signatures (Ethereum Foundation, 2025) involving the hash-based aggregate signature scheme Plonky3 and the instantiation of...

2026/395 (PDF) Last updated: 2026-02-26
How To Make Delegated Payments on Bitcoin: A Question for the AI Agentic Future
Jay Taylor, Paul Gerhart, Sri AravindaKrishnan Thyagarajan
Cryptographic protocols

AI agents and custodial services are increasingly being entrusted as intermediaries to conduct transactions on behalf of institutions. The stakes are high: The digital asset market is projected to exceed \$16 trillion by 2030, where exchanges often involve proprietary, time-sensitive goods. Although industry efforts like Google’s Agent-to-Payments (AP2) protocol standardize how agents authorize payments, they leave open the core challenge of fair exchange: ensuring that a buyer obtains the...

2026/391 (PDF) Last updated: 2026-02-25
Zero-Knowledge IOPPs for Constrained Interleaved Codes
Alessandro Chiesa, Giacomo Fenzi, Guy Weissenberg
Cryptographic protocols

Succinct arguments based on interactive oracle proofs (IOPs) have achieved remarkable efficiency improvements and are now widely adopted in applications. State-of-the-art IOPs involve protocols for testing proximity to constrained interleaved linear codes, and enjoy essentially optimal parameters. However, recent IOP constructions provide no privacy guarantees, which remain a must for many applications. We present an IOP of proximity for testing constrained interleaved linear codes that...

2026/381 (PDF) Last updated: 2026-02-24
Multi-Committee MPC: From Unanimous to Identifiable Abort
Lichun Li, Hongqing Liu, Jiawei Ni, Chaoping Xing, Chen Yuan
Cryptographic protocols

In this work, we consider dishonest majority MPC protocols with $(1-\epsilon)n$ corrupted parties for some constant $\epsilon\in (0,1/2)$. In this setting, there exist MPC protocols with unanimous abort that achieve constant communication in both online and offline phases via a packed secret sharing scheme. Departing from their approaches, we revisit the ``committee-based'' approach to design an efficient MPC protocol with constant online and offline communication complexity. To balance the...

2026/380 (PDF) Last updated: 2026-02-27
Lattice HD Wallets: Post-Quantum BIP32 Hierarchical Deterministic Wallets from Lattice Assumptions
Conor Deegan, James Fitzwater, Kamil Doruk Gur, David Nugent
Cryptographic protocols

Hierarchical deterministic (HD) wallets, standardized as BIP32, allow users to manage a tree of cryptographic key pairs from a single master seed. A defining feature is non-hardened derivation: child public keys can be derived from a parent public key alone, enabling watch-only wallets where a server generates fresh receiving addresses while the signing key remains offline. Existing constructions rely on the algebraic structure of elliptic curve public keys, and recovering this functionality...

2026/378 (PDF) Last updated: 2026-02-24
Information-Theoretic Network-Agnostic MPC with Polynomial Communication
Xiaoyu Ji, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
Cryptographic protocols

Network-agnostic MPC protocols tolerate simultaneously a higher number of corruptions $t_s < n/2$ when the network is synchronous, and a lower number $t_a < n/3$ when the network is asynchronous. As such, they provide strong resilience, irrespective of the type of underlying communication network. We focus on improving the communication complexity of network-agnostic MPC with optimal resilience $2t_s + t_a < n$. In this regime, there are no polynomial-time information-theoretic solutions...

2026/377 (PDF) Last updated: 2026-02-24
Perfectly Secure Network-Agnostic MPC Comes for Free
Xiaoyu Ji, Chen-Da Liu-Zhang, Yifan Song
Cryptographic protocols

Secure multiparty computation (MPC) allows a set of parties to jointly compute a function while keeping their inputs private. Classical MPC protocols assume either a synchronous or an asynchronous network. Synchronous protocols tolerate more corrupted parties but rely on a timing bound, while asynchronous protocols make no timing assumptions but handle fewer corruptions. The network-agnostic model aims to combine the advantages of both. It requires security without knowing in advance...

2026/376 (PDF) Last updated: 2026-02-24
Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters
Lucas Piske, Ni Trieu
Cryptographic protocols

Private Set Union (PSU) enables two parties to compute the union of their private sets without revealing anything beyond the union itself. Existing PSU protocols remain much slower than private set intersection (PSI), often by a factor of around $30\times$. In this work, we present the first PSU protocol based on Invertible Bloom Lookup Tables (IBLTs), introducing a fundamentally new framework that departs from traditional, inefficient approaches. Our protocol exploits structural...

2026/371 (PDF) Last updated: 2026-02-23
A Modular Approach to Succinct Arguments for QMA
James Bartusek, Jiahui Liu, Giulio Malavolta
Cryptographic protocols

Succinct argument systems are of central importance to modern crytpography, enabling the efficient verification of computational claims. In the classical setting, Kilian (STOC 92) established that any probabilistically checkable proof for NP can be transformed into a succinct argument system for NP using only collision-resistant hash functions. In the quantum setting, recent works have established the feasibility of (classically-verifiable) succinct arguments for QMA, capturing statements...

2026/370 (PDF) Last updated: 2026-02-23
Round-Optimal Byzantine Agreement without Trusted Setup
Diana Ghinea, Ivana Klasovitá, Chen-Da Liu-Zhang
Cryptographic protocols

Byzantine Agreement is a fundamental primitive in cryptography and distributed computing, and minimizing its round complexity is of paramount importance. The seminal works of Karlin and Yao [Manuscript'84] and Chor, Merritt and Shmoys [JACM'89] showed that any randomized $r$-round protocol must fail with probability at least $(c\cdot r)^{-r}$, for some constant $c$, when the number of corruptions is linear in the number of parties, $t = \theta(n)$. The work of Ghinea, Goyal and Liu-Zhang...

2026/368 (PDF) Last updated: 2026-02-23
Additions, Multiplications, and the Interaction In-Between: Optimizing MPC Protocols via Leveled Linear Secret Sharing
Andreas Brüggemann, Thomas Schneider, Maximilian Stillger
Cryptographic protocols

In concretely efficient secure multiparty computation (MPC) protocols based on secret sharing, a frequent pattern is to locally multiply two shared values into some intermediate representation that is immediately and interactively translated back into sharings of the product. The intermediate representation is often still a full-fledged but different secret sharing scheme. This has been used to efficiently compute dot products by computing the sum of all intermediate products and then...

2026/364 (PDF) Last updated: 2026-02-23
SPRINT: New Isogeny Proofs of Knowledge and Isogeny-Based Signatures
Thomas den Hollander, Shai Levin, Marzio Mula, Robi Pedersen, Daniel Slamanig, Sebastian A. Spindler
Cryptographic protocols

Zero-knowledge proofs of knowledge are a fundamental building block in many isogeny-based cryptographic protocols, such as signature schemes based on identification-to-signature transformations, or multi-party ceremonies that avoid a trusted setup, in particular for generating supersingular elliptic curves with unknown endomorphism rings. In this paper, we construct SPRINT, an efficient polynomial IOP-based proof system that encodes the radical $2$-isogeny formulas into a system of...

2026/359 (PDF) Last updated: 2026-02-22
Cyclo: Lightweight Lattice-based Folding via Partial Range Checks
Albert Garreta, Helger Lipmaa, Urmas Luhaäär, Michał Osadnik
Cryptographic protocols

Folding is a powerful technique for constructing efficient succinct proof systems, especially for computations that are expressed in a streaming fashion. In this work, we present Cyclo, a new lattice-based folding protocol that improves upon LatticeFold+ [Boneh and Chen '25] in multiple dimensions and which incorporates, among others, the pay-per-bit techniques from Neo when folding constraints expressed over a field $\mathbb{F}_q$ [Nguyen and Setty '25]. Cyclo proposes a new framework...

2026/352 (PDF) Last updated: 2026-02-24
Migrating Bitcoin and Ethereum Addresses to the Quantum Blockchain Era
Mehmet Sabir Kiraz, Suleyman Kardas
Cryptographic protocols

Recent advances in quantum computing threaten the cryptographic foundations of blockchain systems, including Bitcoin and Ethereum, which rely on elliptic-curve cryptography (ECC) for security. Algorithms such as Shor's algorithm can efficiently solve the discrete logarithm problem (DLP), enabling recovery of private keys from public keys. Existing funds, especially those tied to long-lived addresses or unspent coinbase outputs (such as Satoshi Nakamoto's bitcoins), and Ethereum externally...

2026/350 (PDF) Last updated: 2026-02-21
Hybridization of Cryptographic Primitives: A Generalized Framework for Adaptive Security
Zahra Seyedi, Eckhard Pfluegel, Shahzad Ahmad, Willie Kouam, Stefan Rass
Cryptographic protocols

Hybrid cryptographic schemes combine multiple primitives to provide resilience against diverse threats, particularly in the post-quantum era where classical algorithms face potential quantum attacks. However, existing hybrid approaches rely on predefined, fixed pairings of specific cryptographic algorithms, limiting their adaptability to evolving security requirements and heterogeneous deployment environments. This paper presents a generalized framework for the hybridization of cryptographic...

2026/348 (PDF) Last updated: 2026-02-21
Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols
Shan Chen, Kaige Pan, Olga Sanina
Cryptographic protocols

SAE and SAE-PK are the core security protocols introduced in the latest Wi-Fi security standard, WPA3, to protect personal networks. SAE-PK extends SAE to prevent the so-called evil twin attacks, where an attacker with the knowledge of the password attempts to impersonate a legitimate access point. In this work, we present the first provable security and privacy analysis of SAE and SAE-PK. We introduce formal models that capture their intended properties and use these models to analyze the...

2026/347 (PDF) Last updated: 2026-02-20
Relaxed Modular PCS from Arbitrary PCS and Applications to SNARKs for Integers
Alireza Shirzad, Sriram Sridhar, Dimitrios Papadopoulos, Charalampos Papamanthou
Cryptographic protocols

\emph{Modular Polynomial Commitment Schemes (Mod-PCS)} extend standard PCSs by enabling provable evaluation of integer polynomials modulo a random modulus, providing a natural foundation for SNARKs that operate directly over large integers without emulating arithmetic in finite fields. Only two Mod-PCS constructions are known. The first (Campanelli and Hall-Andersen, IACR ePrint 2024) serves primarily as a feasibility result and is impractical and not post-quantum secure due to its reliance...

2026/346 (PDF) Last updated: 2026-02-20
Lighthouse: Single-Server Secure Aggregation with $O(1)$ Server-Committee Communication at Scale
Sanjam Garg, Alireza Kavousi, Dimitris Kolonelos, Erkan Tairi, Zhipeng Wang
Cryptographic protocols

Secure aggregation is a core primitive for privacy-preserving federated learning, enabling a server to compute aggregates of client updates without learning individual inputs. Recent protocols have explored committee-based designs to reduce client overhead and tolerate weakly connected participants. However, existing approaches still incur communication and computation costs that scale with the number of clients and/or the size of model updates. This becomes a serious bottleneck in...

2026/345 (PDF) Last updated: 2026-02-20
Zebra: Arithmetic Garbled RAM for Large Words from DCR
Tianyao Gu, Ashrujit Ghoshal, Elaine Shi
Cryptographic protocols

Garbled RAM is a promising technique for scaling secure two-party computation to large datasets. It features an efficient two-round protocol and supports each memory access with polylogarithmic overhead, thereby avoiding the prohibitive cost of RAM-to-circuit conversion. While earlier works on Garbled RAM primarily focused on establishing theoretical feasibility, recent research has increasingly emphasized concrete efficiency, culminating in constructions that achieve approximately...

2026/339 (PDF) Last updated: 2026-02-25
$\mathsf{Spectra}$: Interval-Agnostic Vector Range Argument for Unstructured Range Assertions
Hao Gao, Qianhong Wu, Bo Qin, Fudong Wu, Zhenyang Ding, Zhiguo Wan
Cryptographic protocols

A structured vector range argument proves that a committed vector $\mathbf{v}$ lies in a well-structured range of the form $[0,2^d-1]$. This structure makes the protocol extremely efficient, although it cannot handle more sophisticated range assertions, such as those arising from non-membership attestations. To address this gap, we study a more general setting not captured by prior constructions. In this setting, for each $i$, the admissible integer set for $v_i$ is a union of $k$ intervals...

2026/337 (PDF) Last updated: 2026-02-20
Efficient, UC-secure and Publicly Auditable MPC from OLE & VOLE-in-the-head
Carsten Baum, Chiara-Marie Zok
Cryptographic protocols

Secure Multiparty Computation (MPC) computes on private input data, but generally does not guarantee correctness of the output towards third parties. This property, also called public auditability, was first studied explicitly by Baum et al. (SCN 2014). Their work and its follow-ups generate a Non-Interactive Zero-Knowledge proof of correctness of the MPC outcome during the MPC protocol, ensuring validity of the output even if all parties are corrupted. In this work, we revisit and...

2026/335 (PDF) Last updated: 2026-02-20
Sumcheck-based zkSNARKs are Non-Malleable
Antonio Faonio, Luigi Russo
Cryptographic protocols

Simulation extractability ensures that any adversary who produces a valid proof must possess a corresponding witness, even after seeing simulated proofs for potentially false statements. This property is vital for preventing malleability attacks and is therefore essential for securely deploying zero-knowledge succinct non-interactive arguments of knowledge (zkSNARKs) in distributed systems. While prior work, particularly the frameworks by Faonio et al. (CCS’24, TCC’23) and Kohlweiss et al....

2026/333 (PDF) Last updated: 2026-02-20
A Cryptographic Framework for Proof of Personhood
Arka Rai Choudhuri, Sanjam Garg, Keewoo Lee, Hart Montgomery, Guru Vamsi Policharla, Rohit Sinha
Cryptographic protocols

We initiate study on how to build a rigorous, cryptographic foundation for *proofs of personhood* - convincing, privacy-preserving evidence that a digital participant is a real, unique, and reputable human, optionally with authenticated attributes such as age or institutional affiliation. Towards this goal, we introduce a framework based on two types of credentials: *personhood credentials* (PHCs), issued by trusted authorities to attest to uniqueness and basic attributes, and *verifiable...

2026/330 (PDF) Last updated: 2026-02-22
SoK: Anonymous Credentials for Digital Identity Wallets
Christian Bormann, Anja Lehmann
Cryptographic protocols

Digital identity wallets are currently being developed around the globe, aiming to provide user-centric and secure authentication. Realizing this in a privacy-preserving manner is paramount, and even mandated in Europe which is developing the European Digital Identity Wallet with planned release in 2026. Current proposals to build these wallets are based on classic signature schemes such as ECDSA, but would benefit greatly from the use of anonymous credentials. Thus, there is currently a...

2026/325 (PDF) Last updated: 2026-02-19
eDAS: Extending Data Availability Sampling with Privacy and Compliance
Isobel Watkins, Nicolas Mohnblatt, Philipp Jovanovic
Cryptographic protocols

A data availability sampling scheme (DAS) allows a network of verifiers to collectively ensure that an untrusted party is correctly storing and distributing some committed data. Importantly, the protocol should not require that the verifiers coordinate or store the full data individually. In this paper, we initiate the study of privacy in DAS schemes: we ask whether the DAS guarantees can be upheld while keeping the committed data secret. We define a natural notion of zero-knowledge for...

2026/324 (PDF) Last updated: 2026-02-19
FLiPD: Privacy-Preserving Federated Learning via Multi-Party Computation and Differential Privacy
Gowri R Chandran, Melek Önen, Thomas Schneider
Cryptographic protocols

Federated Learning (FL) is a collaborative Machine Learning (ML) process where clients locally train an ML model on their private inputs, and send it to a server that aggregates the local model updates to obtain a global model update. FL is widely used in applications where the training data is distributed among several clients, e.g., for next word prediction in Google keyboard (Gboard). Nevertheless, FL faces several challenges concerning privacy and security. 1) Client privacy needs to be...

2026/323 (PDF) Last updated: 2026-02-19
Cryptokinetics
Hadrien Barral, David Naccache, Aleksa Veličković
Cryptographic protocols

Cryptographic operations are momentary. Typically, the verification of a digital signature validates the signer's intervention at a specific moment in the past whereas a successful $\Sigma$-protocol round validates a prover's present existence. While cryptography handles very well the notions of "before" and "after" (typically in the blockchain), it remains blind to physical time. In many practical situations it is important to assess the probability that the legitimate user is still...

2026/320 (PDF) Last updated: 2026-02-26
Statistically Secure Asynchronous MPC with Linear Communication and $\mathcal{O}(n^5)$ Additive Overhead
Xiaoyu Ji, Yifan Song
Cryptographic protocols

Secure multiparty computation (MPC) allows distrusted parties to jointly evaluate a common function while keeping their inputs private. In this work, we focus on improving the communication complexity of information-theoretic asynchronous MPC with optimal resilience ($t < n/3$). The current state-of-the-art work in this setting by Goyal, Liu-Zhang, and Song [Crypto’24] achieves amortized linear communication per gate with $\Omega(n^{14})$ additive overhead. In comparison, the best-known...

2026/319 (PDF) Last updated: 2026-02-19
New Techniques for Information-Theoretic Asynchronous MPC with Abort
Xiaoyu Ji, Yifan Song
Cryptographic protocols

We study the communication complexity of information-theoretic asynchronous multiparty computation (AMPC) with optimal resilience $n=3t+1$ and malicious security. In this setting, the only known result with linear communication per gate is due to Goyal, Liu-Zhang, and Song [CRYPTO ’24]. However, their construction incurs a large communication overhead of $\Omega(n^{14})$ elements that is independent of the circuit size, rendering their result only of theoretical interest. By additionally...

2026/317 (PDF) Last updated: 2026-02-18
Two-Factor Authentication Can Harden Servers Against Offline Password Search
Xavier Boyen, Stanislaw Jarecki, Phillip Nazarian, Jiayu Xu, Tianyu Zheng
Cryptographic protocols

We propose a novel notion of Two-Factor Authenticated Key Exchange (TFA-KE), defined in the universal composability model (UC), which extends asymmetric PAKE (aPAKE) by a 2nd authentication factor in the form of a $t$-bit one-time code computed by a personal device based on a clock or counter. Our notion strengthens the security of standard integration of aPAKE with short authentication codes by additionally slowing down offline brute-force password search in case of server compromise by a...

2026/315 (PDF) Last updated: 2026-02-18
Proving Knowledge of Syndrome Decoding Problems with Soundness
Felice Manganiello, Freeman Slaughter
Cryptographic protocols

This paper introduces a novel set of code-based protocols to demonstrate algebraic relationships in zero knowledge. Specifically, we present a comprehensive collection of secure arguments of knowledge for verifying additive and multiplicative relationships between syndrome-committed secrets, including matrix products, which enable us to construct a generic arithmetic circuit framework. We leverage these primitives to formulate a rich variety of privacy-oriented primitives, such as a...

2026/311 (PDF) Last updated: 2026-02-18
Security of the Fischlin Transform in Quantum Random Oracle Model
Christian Majenz, Jaya Sharma
Cryptographic protocols

The Fischlin transform yields non-interactive zero-knowledge proofs with straight-line extractability in the classical random oracle model. This is done by forcing a prover to generate multiple accepting transcripts through a proof-of-work mechanism. Whether the Fischlin transform is straight-line extractable against quantum adversaries has remained open due to the difficulty of reasoning about the likelihood of query transcripts in the quantum-accessible random oracle model (QROM), even...

2026/310 (PDF) Last updated: 2026-02-18
Bolt: Faster SNARKs from Sketched Codes
Kobi Gurkan, Andrija Novakovic, Ron D. Rothblum
Cryptographic protocols

We introduce Bolt, a new Multilinear Polynomial Commitment Scheme (MLPCS) designed for high-performance SNARKs over binary fields. Bolt is geared towards SNARKs for large computations, in which prover speed is paramount but one can afford slightly larger proofs. The construction is based on the code-switching paradigm; our core technical contribution is a new "proof-system friendly" error-correcting code with extremely efficient encoding both asymptotically and concretely. Bolt offers a...

2026/308 (PDF) Last updated: 2026-02-18
Anamorphic E-Voting: Coercion-Resistant Through Fake and Real Votes
Antonis Michalas
Cryptographic protocols

The paper addresses the challenging and timely issue of vote buying in electronic voting. Electronic voting is a well established process in modern democracies. However, problems such as vote buying continue to pose a significant challenge. This paper aims at addressing this issue by leveraging the novel concept of Anamorphic Encryption to enable voters to cast their original vote together with a hidden ``fake" one. In this way voters can pursue their true preferences unobstructed while...

2026/295 (PDF) Last updated: 2026-02-17
From OT to OLE with Almost-Linear Communication
Geoffroy Couteau, Naman Kumar
Cryptographic protocols

Following the recent work of (Doerner et al., CCS 2025), we introduce an improved reduction of OLE to OT. We prove the following: there is a perfectly-secure OLE-to-OT reduction over any $n$-bit field $\mathbb{F}$ using almost-linear communication $n\cdot 2^{O(\log^{*} n)}$ and almost-constant rounds $O((\log^{*} n)^2)$. In the course of proving our result, we also introduce new perfectly-secure protocols for computing shares of the equality and greater-than predicate on $n$-bit strings in...

2026/294 (PDF) Last updated: 2026-02-24
Post-Quantum Adaptor Signatures with Strong Security from Cryptographic Group Actions
Ryann Cartor, Nathan Daly, Giulia Gaggero, Jason T. LeGrow, Andrea Sanguineti, Silvia Sconza
Cryptographic protocols

We present One Round "Cheating" Adaptor Signatures (OR- CAS): a novel and efficient construction of adaptor signature schemes from CSI-FiSh. Our protocol improves substantially on existing group action-based schemes: Unlike IAS (Tairi et al., FC 2021), our scheme does not require expensive non-interactive zero-knowledge proofs, and unlike adaptor MCSI-FiSh (Jana et al., CANS 2024) our construction does not require any modification to the underlying digital signature scheme. We prove...

2026/292 (PDF) Last updated: 2026-02-24
Crossing with Confidence: Formal Analysis and Model Checking of Blockchain Bridges
Pyrros Chaidos, Pooya Farshim, Denis Firsov, Dimitar Jetchev, Aggelos Kiayias, Markulf Kohlweiss, Anca Nitulescu
Cryptographic protocols

We develop formal code-based security definitions for blockchain bridges and apply them to several bridge architectures deployed in practice. We derive both traditional pen-and-paper proofs and on the other, automated guarantees against bounded counterexamples. The latter is achieved via bounded model checking of our formally specified properties, implemented in Quint, a specification language and model checker closely related to TLA+. Our definitions are expressed in a precise,...

2026/289 (PDF) Last updated: 2026-02-17
Zero-Knowledge Proof-Carrying Data from Accumulation Schemes
Tianyu Zheng, Shang Gao, Xun Liu
Cryptographic protocols

Proof-carrying data (PCD) is a powerful cryptographic primitive for ensuring computational integrity in distributed settings. State-of-the-art PCD constructions based on accumulation schemes achieve practical prover efficiency and support a wide range of applications. However, realizing zero-knowledge for accumulation-based PCD remains challenging, particularly for high-degree relations. Existing solutions often incur substantial overhead due to the need for zero-knowledge in both the...

2026/287 (PDF) Last updated: 2026-02-23
Network-Agnostic Multidimensional Approximate Agreement with Optimal Resilience
Diana Ghinea, Darya Melnyk, Tijana Milentijević
Cryptographic protocols

The Multidimensional Approximate Agreement problem ($D$-AA) considers a setting with $n$ parties with inputs in $\mathbb{R}^D$. Out of the $n$ parties, up to $t$ may be byzantine (malicious). The goal is for the honest parties to obtain $\varepsilon$-close outputs that lie in the honest inputs' convex hull. While tight bounds on the resilience of $D$-AA have been found for the purely synchronous and asynchronous models, this is still an open question for the network-agnostic model. Here, the...

2026/283 (PDF) Last updated: 2026-02-17
Malicious Security Comes Free in SPDZ
Junru Li, Yifan Song
Cryptographic protocols

In this work, we study the concrete efficiency of SPDZ-type MPC protocols in the dishonest majority setting with maximum corruption, where $t=n-1$ out of $n$ parties can be corrupted. In the semi-honest setting, the state-of-the-art SPDZ protocol achieves an amortized communication cost of $4n$ field elements per multiplication gate, assuming a pseudorandom correlation generator (PCG) that prepares random Beaver triples silently in the offline phase. However, achieving security against...

2026/281 (PDF) Last updated: 2026-02-17
Do Androids Dream of a Dead Internet: Interactive Watermarks for Bot Detection
Brennon Brimhall, Harry Eldridge, Maurice Shih, Ian Miers, Matthew Green
Cryptographic protocols

A number of recent works propose watermarking the outputs of large language models (LLMs) but fail to describe who is authorized to watermark the text or check for a watermark. To resolve these problems, we propose interactive watermarking schemes. Our technique leverages the fact that, for many of the cases in which detecting synthetic text is useful, the detector is able to control some part of the prompt that is passed to the LLM. In other words, we propose poisoning the prompt,...

2026/277 (PDF) Last updated: 2026-02-16
Collusion-Minimized TLS Attestation Protocol for Decentralized Applications
Uğur Şen, Murat Osmanoğlu, Oğuz Yayla, Ali Aydın Selçuk, Ali Doğanaksoy
Cryptographic protocols

Transport Layer Security (TLS) attestation protocols are a key building block for decentralized applications that require authenticated off-chain data. However, existing Designed Commitment TLS (DCTLS) constructions rely on designated verifiers, which prevents public verifiability and enables prover–verifier collusion in on-chain settings. To address these limitations, we propose a collusion-minimized TLS attestation framework $\Pi_{\textsf{coll-min}}$ that enables jointly verifiable...

2026/275 (PDF) Last updated: 2026-02-16
PhantomCrypt: Second-Order Deniable Encryption with Post-Quantum Security
Shahzad Ahmad, Stefan Rass, Zahra Seyedi
Cryptographic protocols

Traditional deniable encryption primarily focuses on denying the $content$ of secret communications, allowing plausible alternative plaintexts to be presented in the event of coercion. However, even the recognizable use of deniable encryption may already defeat its purpose, making any revealed plaintext suspicious to a coercer. Hence, for practical deniability, not only does the content need to be deniable, but also the entire use of deniable encryption must be considered. We call this...

2026/273 (PDF) Last updated: 2026-02-16
Weighted Cryptography with Weight-Independent Complexity
Aarushi Goel, Swagata Sasmal, Mingyuan Wang
Cryptographic protocols

Cryptographic primitives involving multiple participants, such as secure multiparty computation (MPC), threshold signatures, and threshold encryption, are typically designed under the assumption that at least a threshold number of participants remain honest and non-colluding. However, many real-world applications require more expressive access structures beyond simple thresholds. A prominent example is the weighted threshold access structure, where each party is assigned a weight and...

2026/266 (PDF) Last updated: 2026-02-16
UltraFold: Efficient Distributed BaseFold from Packed Interleaved Merkle Trees
Wenhao Wang, Fan Zhang
Cryptographic protocols

Transparent, code-based polynomial commitment schemes (PCSs) such as BaseFold (CRYPTO’24) are a compelling building block for large-scale zero-knowledge proofs (ZKPs): they avoid trusted setup, rely on standard hash assumptions, offer post-quantum security, and achieve high performance. As ZKP workloads grow, the polynomials that PCSs must commit to and open increasingly exceed the memory and throughput of a single machine, motivating a scalable distributed version of BaseFold. However,...

2026/264 (PDF) Last updated: 2026-02-15
WillowFold: Secure Aggregation with a Lightweight Committee
Hossein Hafezi, Kasra Abbaszadeh, Adrià Gascón, Phillipp Schoppmann, Mariana Raykova, Benedikt Bünz
Cryptographic protocols

Secure aggregation enables a server to learn the sum of private inputs of clients, while revealing no additional information beyond the final sum. Recent work, Willow (CRYPTO 2025) achieves one--shot secure aggregation in the single-server model with dynamic client participation. To ensure security under these features, Willow relies on an auxiliary committee to verify the correctness of the aggregation. Although this verification requires no private information---broadening the set of...

2026/263 (PDF) Last updated: 2026-02-18
Compact and Statistical NIZK Proofs of Knowledge for Disjunctions from $\Sigma$-Protocols
Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti
Cryptographic protocols

The classical results of Cramer et al. [Crypto’94] showed how to compose $n$ $\Sigma$-protocols with statistical HVZK to obtain an efficient proof of knowledge of their disjunction maintaining statistical HVZK without adding hardness assumptions. The Fiat-Shamir (FS) transform applied to their construction produces a statistical NIZK proof of knowledge in the random oracle (RO) model, but, unfortunately, the proof size in their case is linear in $n$. Recently, there has been increasing...

2026/262 (PDF) Last updated: 2026-02-14
Fuzzy Private Set Intersection from Density-Bounded Assumptions
Seunghun Paik, Jae Hong Seo
Cryptographic protocols

We propose a new fuzzy private set intersection (FPSI) protocol, a two-party functionality that securely identifies similar items across private sets. Our design departs from the prevailing separation-based paradigm in existing constructions. Rather than enforcing common separation-based assumptions, e.g., ``apart by $2\delta$'' or disjoint projection assumptions, we adopt a fundamentally different perspective: we explicitly allow collisions within $\delta$-balls, but require that their...

2026/259 (PDF) Last updated: 2026-02-14
Blockchain Stacking Fraud and Deterrence
Tong Cao, Man Ho Au, Xiapu Luo
Cryptographic protocols

As crypto-assets become increasingly integrated into global financial systems, they are now employed to demonstrate solvency, establish creditworthiness, and satisfy wealth verification requirements for various financial and regulatory purposes. A fundamental challenge in these applications is proving that a given wallet address is controlled exclusively by a single legal entity, as fraudulent multiple claims can undermine the integrity of asset-based verification systems. In this paper,...

2026/258 (PDF) Last updated: 2026-02-17
Lightning, Field-Agnostic Super-Efficient Polynomial Commitment Scheme
Wenjie Qu, Yanpei Guo, Jiaheng Zhang
Cryptographic protocols

Polynomial commitment schemes (PCS) are a fundamental building block of modern zkSNARKs. In this paper, we propose Lightning, a new coding-based PCS that achieves state-of-the-art prover efficiency. Our main technical contribution is a new linear code family, the Lightning code, which can be instantiated from any base code with constant relative distance. Compared to the base code, Lightning code significantly reduces encoding cost by trading off relative distance. We integrate...

2026/257 (PDF) Last updated: 2026-02-13
Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples
Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
Cryptographic protocols

We revisit the question of minimizing the overhead of security against malicious parties in dishonest-majority secure computation. A leading approach, pioneered by the SPDZ line of protocols, uses homomorphic MACs to authenticate computation: Parties effectively compute a MAC on the computation output using authenticated multiplication triples (AMT). However, securely generating these AMTs presently sits as the cost bottleneck. In this work, we introduce a new technique for enabling...

2026/255 (PDF) Last updated: 2026-02-13
On Compressing Non-Additive Correlations
Geoffroy Couteau, Alexander Koch, Nikolas Melissaris, Peter Scholl, Sacha Servan-Schreiber, Xiaxi Ye
Cryptographic protocols

Compressing correlated randomness is a key component of secure computation protocols in the silent preprocessing model and has received significant attention in recent years. However, to date, all known constructions are restricted to generating additive correlations, where the parties receive additive shares of a relation. The only known exceptions are constructions from indistinguishability obfuscation. In this work, we initiate the study of compressing useful forms of correlated...

2026/249 (PDF) Last updated: 2026-02-25
Have Your CKAKE and Eat it, Too: Efficient, Composable KEM-Authenticated Key Exchange
Myrto Arapinis, Christopher Battarbee, Mina Doosti
Cryptographic protocols

We report on a novel authenticated key-exchange (AKE) protocol where the authentication is achieved entirely by key-encapsulation mechanisms (KEMs). Techniques to achieve AKE with KEMs have been known for some time, but have received renewed attention in a post-quantum world; in contrast to classical cryptography, the data corresponding to the NIST post-quantum KEM standard is a significant save on bandwidth compared to the signature standard. Previous KEM-authenticated AKE protocols are not...

2026/247 (PDF) Last updated: 2026-02-13
Efficient Pairing-Based Batch Arguments for NP with a Constant-Size Proof
Zhe Jiang, Kai Zhang, Junqing Gong, Haifeng Qian
Cryptographic protocols

Non-interactive Batch arguments (BARGs) for NP relations enable a prover to generate a single succinct proof for multiple NP instances, significantly amortizing verification costs. While recent pairing-based BARGs achieve impressive results, their practical efficiency remains limited by proof sizes and verifier pairing operations that scale linearly with the size of the Boolean circuit computing the NP relation. In this work, we present a novel pairing-based BARG construction that achieves...

2026/246 (PDF) Last updated: 2026-02-13
Highly Efficient and Round-Optimal Asymmetric PAKE
Zachary Barbanell, Jiayu Xu
Cryptographic protocols

An asymmetric Password-Authenticated Key Exchange (aPAKE) protocol allows a client, who holds a raw password, and a server, who holds a one-way mapping of the password, to jointly establish a cryptographically strong session key, without an authenticated channel. The standard security definition for aPAKE is in the Universal Composability (UC) framework. Despite its great potential of being used in practice, existing aPAKE protocols are either not round-optimal, computationally inefficient,...

2026/243 (PDF) Last updated: 2026-02-16
Towards Making Doubly-Efficient PIR Practical
Pan Xiao, Heng Zhang, Rending Ouyang, Cong Zhang, Jian Liu, Kui Ren, Chun Chen
Cryptographic protocols

Doubly-efficient private information retrieval (DEPIR) enables sublinear per-query work (in the database size $N$) for both client and server, while requiring no client state. Despite its theoretical promise, single-server DEPIR exhibits a prohibitive concrete efficiency gap: for $N=2^{23}$, the state-of-the-art construction (Eurocrypt '25) requires a 733TB server state and over $2^{37}$ online RAM/Disk reads, rending it infeasible to execute. This paper advances single-server DEPIR...

2026/242 (PDF) Last updated: 2026-02-13
Neo and SuperNeo: Post-quantum folding with pay-per-bit costs over small fields
Wilson Nguyen, Srinath Setty
Cryptographic protocols

We construct the first folding scheme that simultaneously achieves six desirable properties: plausible post-quantum security, pay-per-bit commitment costs, field-native arithmetic (the sum-check and norm checks run purely over a small field), support for general (non-SIMD) constraint systems, small-field support (e.g., Goldilocks), and low recursion overheads. No existing scheme satisfies all six: group-based schemes (e.g., HyperNova) lack post-quantum security and are tied to large...

2026/239 (PDF) Last updated: 2026-02-14
Optimal Best-of-Both-Worlds Consensus
Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
Cryptographic protocols

Consensus protocols face a fundamental trade-off: synchrony enables higher fault tolerance, whereas asynchrony provides responsiveness (latency proportional to actual network delays) and security under arbitrary delays. In particular, synchronous consensus achieves optimal resilience up to $t<n/2$ corruptions but relies on worst-case delay bounds that affect both latency and security, whereas asynchronous consensus tolerates only $t<n/3$ corruptions. Two approaches have sought orthogonal...

2026/234 (PDF) Last updated: 2026-02-12
When Trying to Catch Cheaters Breaks the MPC (Full Version)
Andreas Brüggemann, Thomas Schneider
Cryptographic protocols

The paper is currently under embargo as it identifies vulnerabilities which still are to be fixed. The paper will be released on March 15, 2026.

2026/231 (PDF) Last updated: 2026-02-11
RAGtime-PIANO: Efficient Secure Remote RAG
Antonia Januszewicz, Jiachen Zhao, Meng Jiang, Taeho Jung
Cryptographic protocols

Retrieval Augmented Generation (RAG) can enhance the performance of Large Language Models (LLMs) when used in conjunction with a comprehensive knowledge database. However, the space required to store the necessary information can be taxing when RAG is used locally. As such, the concept of RAG-as-a-Service (RaaS) has emerged, in which third-party servers can be used to process client queries via an external database. Unfortunately, using such a service would expose the client's query to a...

2026/230 (PDF) Last updated: 2026-02-11
Rule Variant Restrictions for the Tamarin Prover
Felix Linker
Cryptographic protocols

We introduce an optimization to the Tamarin prover that reduces its search space. The optimization applies to protocol models that use equational theories with cancellative operators, for example, when modelling Diffie-Hellman groups or bilinear pairings. We prove the optimization's soundness and evaluate its performance.

2026/222 (PDF) Last updated: 2026-02-10
ITSAKE: an unconditionally secure authenticated key establishment protocol
Pierre-Alain Jacqmin, Jean Liénardy
Cryptographic protocols

We introduce $\textrm{ITSAKE}$, a 2-message Information-Theoretic Secure Authenticated Key Establishment protocol. That is, $\textrm{ITSAKE}$ is a protocol to establish keys between two parties from a pre-shared secret. Beside correctness and key indistinguishability, it offers entity authentication and perfect forward secrecy. Moreover, synchronization problems are avoided because $\textrm{ITSAKE}$ satisfies the weak synchronization robustness property. The main advantage of...

2026/221 (PDF) Last updated: 2026-02-10
Spinel: A Post-Quantum Signature Scheme Based on $\mathrm{SL}_n(\mathbb{F}_p)$ Hashing
Asmaa Cherkaoui, Faraz Heravi, Delaram Kahrobaei, Siamak F. Shahandashti
Cryptographic protocols

The advent of quantum computation compels the cryptographic community to design digital signature schemes whose security extends beyond the classical hardness assumptions. In this work, we introduce Spinel, a post-quantum digital signature scheme that combines the proven security of SPHINCS+ (CCS 2019) with a new family of algebraic hash functions (Adv. Math. Commun. 2025) derived from the Tillich-Zémor paradigm (Eurocrypt 2008) with security rooted in the hardness of navigating expander...

2026/217 (PDF) Last updated: 2026-02-10
Cavefish: Communication-Optimal Light Client Protocol for UTxO Ledgers
Aggelos Kiayias, Marc Roeschlin, Polina Vinogradova, Pyrros Chaidos
Cryptographic protocols

Blockchain light clients (LCs) are agents with limited resources that are not able or not willing to maintain a fully validated copy of the ledger. They rely on service providers (SPs), typically full nodes, to access data required for tasks such as constructing transactions or interacting with off-chain applications. We introduce Cavefish, a novel protocol for UTxO-based platforms that enables LCs to submit transactions with minimal trust, storage, and computation overheads. Cavefish...

2026/216 (PDF) Last updated: 2026-02-12
ECHO: Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning
Yufei Duan, Yun Li, Zhicong Huang, Cheng Hong, Tao Wei, Chao Zhang
Cryptographic protocols

Secure three-party computation with an honest majority is one of the most efficient settings in secure computation, and has been widely adopted in practical applications. However, achieving malicious security in this setting incurs significant concrete efficiency penalties, which could be an order of magnitude worse than that of their semi-honest counterparts. Covert security offers a potential security-efficiency trade-off by detecting malicious behavior with a certain probability (such as...

2026/214 (PDF) Last updated: 2026-02-10
Cavern: Efficient Honest-Majority Maliciously Secure $(2+1)$-PC for $\mathbb{Z}_{2^n}$ via DPF
Yang Liu, Liang Feng Zhang
Cryptographic protocols

We introduce Cavern, a new maliciously secure $(2+1)$-PC protocol for efficient piecewise polynomial (i.e., spline) evaluation on additively secret shared inputs over the ring $\mathbb{Z}_{2^n}$ in the preprocessing model, where parties obtain input-independent correlated randomness in an offline phase, which they then use to run an efficient protocol in the input-dependent online phase. This $(2+1)$ party structure can alternatively be instantiated between two parties with the aid of a...

2026/212 (PDF) Last updated: 2026-03-01
PANCAKE: A SNARK with Plonkish Constraints, Almost-Free Additions, No Permutation Check, and a Linear-Time Prover
Yuxi Xue, Peimin Gao, Xingye Lu, Man Ho Au
Cryptographic protocols

We present \(\mathsf{Pancake}\), a linear-time SNARK with a circuit-specific setup that eliminates the explicit representation and separate verification of addition gates in Plonkish constraint systems. Specifically, we consolidate wiring constraints and addition-gate constraints into a single family of general linear constraints, which can be enforced efficiently via a single sumcheck protocol. As a result, \(\mathsf{Pancake}\) achieves ``almost-free'' addition gates, which significantly...

2026/210 (PDF) Last updated: 2026-02-09
How to Classically Verify a Quantum Cat without Killing It
Yael Tauman Kalai, Dakshita Khurana, Justin Raizes
Cryptographic protocols

Existing protocols for classical verification of quantum computation (CVQC) consume the prover's witness state, requiring a new witness state for each invocation. Because QMA witnesses are not generally clonable, destroying the input witness means that amplifying soundness and completeness via repetition requires many copies of the witness. Building CVQC with low soundness error that uses only *one* copy of the witness has remained an open problem so far. We resolve this problem by...

2026/207 (PDF) Last updated: 2026-02-09
$\mathsf{SoK}$: On Cryptography for Multi-Cloud Storage
Dayane Horkos, Ludovic Perret
Cryptographic protocols

This paper is a Systematization of Knowledge ($\mathsf{SoK}$) on cryptography applied in Multi-Cloud Storage ($\mathsf{MCS}$) schemes. Such techniques distribute and fragment data among multiple cloud providers to strengthen confidentiality, integrity, and availability compared to single-cloud deployments. Over the past decade, many cryptographic mechanisms have been proposed to secure outsourced data. However, the lack of unified framework has led to fragmented terminology, inconsistent...

2026/204 (PDF) Last updated: 2026-02-09
Malicious Private Set Union with Two-Sided Output
Sihang Pu, Jiahui Gao, Ni Trieu
Cryptographic protocols

Private Set Union (PSU) allows two parties to compute the union of their private sets without revealing any additional information---in particular, it hides their common elements (the intersection). Although recent years have seen significant progress under the semi-honest model, resulting in several efficient two-party PSU protocols, notable gaps remain: (1) some prior works model the semi-honest PSU functionality inaccurately, and (2) practical and scalable maliciously secure protocols...

2026/202 (PDF) Last updated: 2026-02-08
ZKBoost: Zero-Knowledge Verifiable Training for XGBoost
Nikolas Melissaris, Jiayi Xu, Antigoni Polychroniadou, Akira Takahashi, Chenkai Weng
Cryptographic protocols

Gradient boosted decision trees, particularly XGBoost, are among the most effective methods for tabular data. As deployment in sensitive settings increases, cryptographic guarantees of model integrity become essential. We present ZKBoost, the first zero-knowledge proof of training (zkPoT) protocol for XGBoost, enabling model owners to prove correct training on a committed dataset without revealing data or parameters. We make three key contributions: (1) a fixed-point XGBoost implementation...

2026/200 (PDF) Last updated: 2026-02-08
Plonk Without Random Oracles
Georg Fuchsbauer, Marek Sefranek
Cryptographic protocols

Plonk is one of the most influential and widely used zk-SNARKs, with proofs of constant size (0.5 kB), sublinear verification time, and circuit-independent setup. All prior security analyses of Plonk—of both knowledge soundness and zero knowledge (ZK)—are in the random-oracle model (ROM), which recent work has shown to be especially problematic in the context of proof systems. Moreover, a security proof in the ROM does not justify using a system recursively, a powerful technique currently...

2026/199 (PDF) Last updated: 2026-02-21
zkAgent: Verifiable Agent Execution via One-Shot Complete LLM Inference Proof
Lizheng Wang, Hancheng Lou, Chongrong Li, Yu Yu, Yuncong Hu
Cryptographic protocols

Recent advances in large language models have enabled LLM-based agents to move beyond text generation toward long-term execution involving tool use, multi-step interactions, and autonomous decision-making. However, the agent provider may be compromised and return malicious outputs. As agents increasingly manage sensitive data and financial assets, such misbehavior can cause severe real-world harm. Recent work leverages zero-knowledge proofs to verify the correctness of LLM inference,...

2026/196 (PDF) Last updated: 2026-02-06
Faster Pseudorandom Correlation Generators via Walsh-Hadamard Transform
Zhe Li, Hongqing Liu, Chaoping Xing, Yizhou Yao, Chen Yuan
Cryptographic protocols

The past few years have witnessed the growing importance of pseudorandom correlation generators (PCGs) for generating correlated randomness with sublinear communication. To date, quasi-linear time PCGs for oblivious linear evaluation (OLE) over arbitrary finite fields have been constructed under either Ring-LPN or Quasi-Abelian syndrome decoding (QA-SD) assumptions, with a throughput of millions of OLEs per second demonstrated, in particular, for binary field. However, many modern MPC...

2026/193 (PDF) Last updated: 2026-02-05
On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of Knowledge
Thomas den Hollander, Marzio Mula, Daniel Slamanig, Sebastian A. Spindler
Cryptographic protocols

Zero-knowledge proofs of knowledge of isogenies constitute a key building block in the design of isogeny-based signature schemes and have numerous other practical applications. A recent line of work investigated such proofs based on generic proof systems, e.g., zk-SNARKs, along with a suitable arithmetization and in particular rank-1 constraint systems (R1CS). Cong, Lai and Levin (ACNS'23) considered proving the knowledge of an isogeny of degree $2^k$ between supersingular elliptic curves...

2026/186 (PDF) Last updated: 2026-02-05
Bitcoin PIPEs v2
Michel Abdalla, Brent Carmer, Muhammed El Gebali, Handan Kilinc-Alper, Mikhail Komarov, Yaroslav Rebenko, Lev Soukhanov, Erkan Tairi, Elena Tatuzova, Patrick Towa
Cryptographic protocols

Covenants and ZKP verification directly on Bitcoin L1 have long been regarded as infeasible due to the limited expressiveness of Bitcoin Script and the absence of covenant-enabling opcodes such as OP_CAT, OP_CTV, OP_VAULT or OP_CSFS. These limitations have prevented the realization of zkRollups, trustless bridges, and programmable vaults natively on Bitcoin. This work introduces Bitcoin PIPEs v2, an upgrade to the original Bitcoin PIPEs approach focusing on emulating missing covenant...

2026/181 (PDF) Last updated: 2026-02-06
Towards Public Tracing: Collaborative Traceable Secret Sharing
Pousali Dey, Rittwik Hajra, Subha Kar, Soumit Pal
Cryptographic protocols

In a $(t,n)$-threshold secret sharing scheme, secrecy holds as long as fewer than $t$ servers collude. If $f < t$ parties are corrupt and they sell their shares, there is no mechanism to hold them accountable in classical secret sharing schemes. Goyal–Song–Srinivasan [CRYPTO'21] introduced Traceable Secret Sharing ($\mathsf{TSS}$) and later Boneh–Partap–Rotem [CRYPTO'24] made it practical: $f<t$ corrupt servers produce a reconstruction box $\mathcal{R}$ that, given $t-f$ extra shares,...

2026/174 (PDF) Last updated: 2026-02-05
STIP: Efficient and Secure Non-Interactive Transformer Inference via Compact Packing
Zihao Wang, Rongmao Chen, Xinwen Gao, Yi Wang, Lin Liu, Zixin Lan, Zhaoyu Wang, Shaojing Fu, Qiong Wang, Xinyi Huang
Cryptographic protocols

Secure TransFormer Inference (STFI) for LLMs aims to protect both user inputs and model parameters. Fully Homomorphic Encryption (FHE) offers a promising approach for STFI due to its non-interactivity, which eliminates communication overhead. However, FHE-based STFI incurs significant computational costs compared to plaintext inference. Recent advancements have accelerated inference by optimizing packing strategies and reducing the number of rotations. Despite these improvements, several...

2026/173 (PDF) Last updated: 2026-02-02
Eidolon: A Practical Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks
Asmaa Cherkaoui, Ramón Flores, Delaram Kahrobaei, Richard C. Wilson
Cryptographic protocols

We propose Eidolon, a practical post-quantum signature scheme grounded in the NP-complete $k$-colorability problem. Our construction generalizes the Goldreich–Micali–Wigderson zero-knowledge protocol to arbitrary $k \geq 3$, applies the Fiat–Shamir transform, and uses Merkle-tree commitments to compress signatures from $O(tn)$ to $O(t \log n)$. Crucially, we generate hard instances via planted “quiet” colorings that preserve the statistical profile of random graphs. We present the first...

2026/170 (PDF) Last updated: 2026-02-02
gcVM: Publicly Auditable MPC via Garbled Circuits with Applications to Private EVM-Compatible Computation
Avishay Yana, Meital Levy, Mike Rosulek, Hila Dahari-Garbian
Cryptographic protocols

Blockchains have achieved substantial progress in scalability and fault tolerance, yet they remain fundamentally limited in confidentiality, hindering adoption by businesses, communities, and individuals who require privacy-preserving computations. Existing zero-knowledge (ZK) solutions provide partial privacy guarantees but struggle with performance and composability, especially for multi-party computations over shared private state. In this work, we introduce gcVM, a novel extension to...

2026/166 (PDF) Last updated: 2026-02-01
Fuzzy Enhanced Private Set Union in Hamming and Minkowski Spaces
Qiang Liu, JaeYoung Bae, Hyung Tae Lee, Joon-Woo Lee
Cryptographic protocols

Private Set Union (PSU) enables two parties holding private sets $X$ and $Y$ to compute their union $X\cup Y$ without revealing anything else. Enhanced PSU (ePSU) further eliminates during-execution leakage, but existing constructions are limited to exact matching. This restriction is inadequate for many real-world applications involving noisy data, approximate representations, or feature embeddings, where similarity is naturally defined via distance metric rather than strict equality. ...

2026/159 (PDF) Last updated: 2026-01-31
Dinocchio: Distributed Prover for Ring Arithmetic
Katerina Sotiraki, Yunhao Wang, Fan Zhang
Cryptographic protocols

Nearly all existing SNARK systems are optimized for arithmetic over finite fields. Using them to prove statements involving ring arithmetic, which underlies lattice-based cryptography and fully homomorphic encryption (FHE), incurs substantial overhead. Consequently, practical deployments of FHE often rely on the \textit{honest-but-curious} assumptions, leaving a gap in the verifiability of the FHE computation. Several recent works have explored zero-knowledge proofs tailored to lattice-based...

2026/158 (PDF) Last updated: 2026-01-30
Setup Protocols for Sender Anonymity
Tian Huang, Jiatai Zhang, Megumi Ando
Cryptographic protocols

Anonymous communication is essential for secure and private interactions over public networks. Existing solutions that provide provable anonymity rely on the so-called simple I/O setting, where every participant sends and receives the same number of messages, masking their true communication pattern. The only known way to enforce this setting is through dialing protocols. Such protocols establish pairwise conversations, but each recipient inevitably learns who attempted to contact them,...

2026/156 (PDF) Last updated: 2026-01-30
Hachi: Efficient Lattice-Based Multilinear Polynomial Commitments over Extension Fields
Ngoc Khanh Nguyen, George O'Rourke, Jiapeng Zhang
Cryptographic protocols

In this work, we present Hachi, a concretely efficient multilinear polynomial commitment scheme that offers succinct proof sizes of $\mathrm{poly}(\ell,\lambda)$ and achieves a “square-root” verifier time complexity of $\tilde{O}(\sqrt{2^\ell \lambda})$ for $\ell$-variate polynomials under the Module-SIS assumption. Compared to the current state-of-the-art scheme, Greyhound (CRYPTO~2024), Hachi provides an asymptotic improvement of $\tilde{O}(\lambda)$ in verification time, which translates...

2026/147 (PDF) Last updated: 2026-01-30
OptiBridge: A Trustless, Cost-Efficient Bridge Between the Lightning Network and Ethereum
Mohsen Minaei, Duc V. Le, Pedro Moreno-Sanchez
Cryptographic protocols

Bridges, protocols that enforce a state transition on a destination ledger conditioned on an event on a source ledger, are central to modern DeFi. Conventional designs implicitly assume the source ledger event is publicly observable, an assumption that breaks with Layer-2 payment channels such as the Lightning Network, where state updates occur off-chain between counterparties and are invisible to others. This state of affairs advocates for new bridge designs for this setting. This paper...

2026/145 (PDF) Last updated: 2026-02-16
Round-Optimal GUC-Secure Blind Signatures from Minimal Computational and Setup Assumptions
Michele Ciampi, Pierpaolo Della Monica, Ivan Visconti
Cryptographic protocols

A blind signature scheme is an interactive protocol that enables a user to obtain a signature on a message without revealing any information about the message–signature pair to the signer. Despite more than 40 years of research, all existing constructions suffer from at least two of the following limitations. 1. The protocol is not round-optimal, requiring more than two messages to be exchanged during the signature phase. 2. There is only game-based security and/or lack of...

2026/144 (PDF) Last updated: 2026-01-29
Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index
Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
Cryptographic protocols

Recently, the notion of dynamic zk-SNARKs was introduced. A dynamic zk-SNARK augments a standard zk-SNARK with an efficient update algorithm. Given a valid source statement-witness pair $(x,w)$ together with a verifying proof $p$, and a valid target statement-witness pair $(x',w')$, the update algorithm outputs a verifying proof $p'$ for $(x',w')$. Crucially, $p'$ is not recomputed from scratch; instead, the update algorithm takes time roughly proportional to the Hamming distance between...

2026/143 (PDF) Last updated: 2026-01-30
A Unified Treatment of Reachability and Indistinguishability Properties: First-Order Logic with Overwhelming Truth
Gergei Bana, Mitsuhiro Okada
Cryptographic protocols

In the formal verification of complexity-theoretic properties of cryptography, researchers have traditionally attempted to capture ``overwhelming truth'' (satisfaction with all but negligible probability) via satisfaction on individual traces of probabilistic execution. However, this approach introduces significant complexity when quantification is present: satisfaction of existential quantification over traces often produces witnesses---such as nonce-guessing oracles---that witnesses that,...

2026/140 (PDF) Last updated: 2026-01-29
On the Necessity of Public Contexts in Hybrid KEMs: A Case Study of X-Wing
Taehun Kang, Changmin Lee, Yongha Son
Cryptographic protocols

Post-quantum migration must balance two risks: future quantum breaks of classical cryptography and residual uncertainty in newly standardized post-quantum cryptography (PQC). Hybrid Key Encapsulation Mechanisms (KEMs) hedge by combining a classical and a PQC component. Prior work shows that optimized combiners may omit large public inputs from the final key-derivation step, but only if the derived key remains bound to the ciphertext transcript and, in multi-target settings, to the intended...

2026/136 (PDF) Last updated: 2026-02-13
Private Proofs of When and Where
Uma Girish, Grzegorz Gluch, Shafi Goldwasser, Tal Malkin, Leo Orshansky, Henry Yuen
Cryptographic protocols

Position verification schemes are interactive protocols where entities prove their physical location to others; this enables interactive proofs for statements of the form "I am at a location L." Although secure position verification cannot be achieved with classical protocols (even with computational assumptions), they are feasible with quantum protocols. In this paper we introduce the notion of zero-knowledge position verification, which generalizes position verification in two ways: 1....

2026/126 (PDF) Last updated: 2026-01-27
Censorship Resistance vs Throughput in Multi-Proposer BFT Protocols
Fatima Elsheimy, Ioannis Kaklamanis, Sarisht Wadhwa, Charalampos Papamanthou, Fan Zhang
Cryptographic protocols

Censorship resistance and high throughput are two key benefits of modern multi-proposer BFT protocols (such as Aptos and Sui). However, in existing designs these two properties are at odds: censorship resistance is typically achieved through duplicating transactions, which in turn harms throughput. This leaves open the question of whether it is possible to improve both properties simultaneously. In this paper, we formally study the trade-offs between censorship resistance and throughput...

2026/118 (PDF) Last updated: 2026-02-15
Practical Subvector Commitments with Optimal Opening Complexity
Matteo Campanelli
Cryptographic protocols

We introduce a simple pairing-based vector commitment with subvector opening where, after a one-time preprocessing, the prover can open a subvector of size $\ell$ in linear time. Our focus is on practically relevant solutions compatible with already deployed setups—specifically, the powers-of-$\tau$ setup used by KZG and many popular SNARKs. We achieve substantial concrete speedups over aSVC (Tomescu et al., SCN 2020), the state of the art in deployable subvector commitments with $O(\ell...

2026/112 (PDF) Last updated: 2026-01-23
PETCHA: Post-quantum Efficient Transciphering with ChaCha
Antonio Guimarães, Gabriela M. Jacob, Hilder V. L. Pereira
Cryptographic protocols

Fully Homomorphic Encryption (FHE) is a powerful primitive which allows a computationally weak client to outsource computation to a powerful server while maintaining privacy. However, FHE typically suffers from high ciphertext expansion, meaning that the amount of data the client has to send to the server increases by many orders of magnitude after it is encrypted. To solve this problem, the approach known as transciphering consists in combining symmetric encryption with FHE. The most common...

2026/111 (PDF) Last updated: 2026-01-23
Structured Matrix Constraint Systems for Architecture-Hiding Succinct Zero-Knowledge Proofs for Neural Networks
Mingshu Cong, Sherman S. M. Chow, Tsz Hon Yuen, Siu-Ming Yiu
Cryptographic protocols

Succinct zero-knowledge machine learning (zkML) uses zk succinct non-interactive arguments of knowledge (zkSNARKs) to prove neural-network (NN) computations with logarithmic-size proofs. However, general-purpose zkSNARKs do not scale in zkML because compiling matrix-heavy NNs into arithmetic circuits is memory-prohibitive. Existing zkML methods rely on rank-1 constraint systems (R1CS) to hide NN architectures while retaining succinctness. Removing circuit-based representations, it has...

2026/109 (PDF) Last updated: 2026-01-23
Concretely Efficient Blind Signatures Based on VOLE-in-the-Head Proofs and the MAYO Trapdoor
Carsten Baum, Marvin Beckmann, Ward Beullens, Shibam Mukherjee, Christian Rechberger
Cryptographic protocols

Blind signatures (Chaum, CRYPTO 82) are important building blocks in many privacy-preserving applications, such as anonymous credentials or e-cash schemes. Recent years saw a strong interest in building Blind signatures from post-quantum assumptions, primarily from lattices. While performance has improved, no construction has reached practical efficiency in terms of computation and communication. The state of the art requires at least $20$ KB size of communication for each showing of a...

2026/105 (PDF) Last updated: 2026-01-29
Privacy-Preserving LLM Inference in Practice: A Comparative Survey of Techniques, Trade-Offs, and Deployability
Davide Andreoletti, Alessandro Rudi, Emanuele Carpanzano, Francesco Lelli, Tiziano Leidi
Cryptographic protocols

Large Language Models (LLMs) are increasingly deployed as cloud services, raising practical concerns about the confidentiality of user prompts and generated completions. In this paper, we survey privacy-preserving inference solutions for Transformer-based LLMs with the explicit goal of supporting operational choices in real-world deployments. We adopt a strong operational notion of privacy: only the client can read the prompt and the corresponding completion, end to end. The review is...

2026/103 (PDF) Last updated: 2026-01-22
When Only Parts Matter: Efficient Privacy-Preserving Analytics with Fully Homomorphic Encryption
Alexandros Bakas, Dimitrios Schoinianakis
Cryptographic protocols

The increasing reliance on cloud-based computation for data-intensive applications raises critical concerns about data confidentiality. Fully Homomorphic Encryption (FHE) provides strong theoretical guarantees by allowing computations over encrypted data, but its high computational cost limits its practicality in large-scale scenarios such as image analysis or matrix-based workloads. In this work, we introduce $\Pi_{ROI}$, a hybrid privacy-preserving computation protocol that leverages...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.