[crypto] Fwd: CWG Schedule 13 Sep

R. Hirschfeld ray at unipay.nl
Mon Sep 9 23:13:43 CEST 2024



-------- Original Message --------
Subject: CWG Schedule 13 Sep
Date: 2024-09-09 10:04
 From: "Guarise Vieira, Heloise" <h.guarise.vieira at tue.nl>
To:

Dear Crypto Working Group Participant,

Find below the schedule for our meeting this Friday, 13 September, at 
the Kargadoor, in Utrecht.

Let me know if I can further assist you.

Best regards.


10:45h
Access Structure Hiding Verifiable Tensor Designs
Suprita Talnikar

The field of verifiable secret sharing schemes was introduced by Verheul 
et al. and has evolved over time, including well-known examples by 
Feldman and Pedersen. Stinson made advancements in combinatorial 
design-based secret sharing schemes in 2004. Desmedt et al. introduced 
the concept of frameproofness in 2021, while recent research by Sehrawat 
et al. in 2021 focuses on LWE-based access structure hiding verifiable 
secret sharing with malicious-majority settings. Furthermore, Roy et al. 
combined the concepts of reparable threshold schemes by Stinson et al. 
and frameproofness by Desmedt et al. in 2023, to develop extendable 
tensor designs built from balanced incomplete block designs, and also 
presented a frameproof version of their design.
This talk explores ramp-type verifiable secret sharing schemes, and the 
application of hidden access structures in such cryptographic protocols. 
Inspired by Sehrawat et al.'s access structure hiding scheme, we develop 
an $\epsilon$-almost access structure hiding scheme, which is verifiable 
as well as frameproof. We detail how the concept $\epsilon$-almost 
hiding is important for incorporating ramp schemes, thus making a 
fundamental generalisation of this concept.

11:30h - coffee break

11:45h
On Broadcast and Identifiability in MPC
Divya Ravi

TBD

12:30h lunch

14:00h
New Limits of Provable Security and Applications to ElGamal Encryption
Sven Schäge
We provide new results showing that ElGamal encryption cannot be proven 
CCA1-secure – a long-standing open problem in cryptography. Our result 
follows from a very broad, meta-reduction-based impossibility result on 
random self-reducible relations with efficiently re-randomizable 
witnesses. The techniques that we develop allow, for the first time, to 
provide impossibility results for very weak security notions where the 
challenger outputs fresh challenge statements at the end of the security 
game. This can be used to finally tackle encryption-type definitions 
that have remained elusive in the past. We show that our results have 
broad applicability by casting several known cryptographic setups as 
instances of random self-reducible and re-randomizable relations. These 
setups include general semi-homomorphic PKE and the large class of 
certified homomorphic one-way bijections. As a result, we also obtain 
new impossibility results for the IND-CCA1 security of the PKEs of 
Paillier and Damgard–Jurik, and many one-more inversion assumptions like 
the one-more DLOG or the one-more RSA assumption.

14:45h coffee break

15:00h
Towards post-quantum secure PAKE
Silvia  Ritsch

ABSTRACT: Password-based authenticated key exchange (PAKE) protocols 
allow two parties to establish a secure session key using a shared 
password. Unlike traditional methods, PAKE does not require a public-key 
infrastructure (PKI) and is designed to be secure even if the password 
is weak. We revisit OCAKE (ACNS 23), a method for constructing PAKE 
generically using key encapsulation mechanisms (KEMs), including 
post-quantum KEMs like KYBER. The original paper left open the challenge 
of proving security against quantum attackers. To address this, we 
provide a game-based security proof in the BPR model (EUROCRYPT 2000), 
which is a crucial step towards a comprehensive post-quantum security 
proof. Finally, we explore current PQC KEMs that can be integrated into 
our protocol, supported by a proof-of-concept implementation and runtime 
benchmarks.

15:45h end of activities
--

[Image]

Heloise Vieira, PhD
Discrete Mathematics Cluster, Project Leader
Department of Mathematics and Computer Science
Phone number +31 (0)402474864

De Zaale, Eindhoven
05 MetaForum, MF 6.101


More information about the crypto mailing list