[crypto] Fwd: CWG: 28 Nov schedule
R. Hirschfeld
ray at unipay.nl
Thu Nov 13 20:12:00 CET 2025
-------- Original Message --------
Subject: CWG: 28 Nov schedule
Date: 2025-11-13 16:37
From: "Guarise Vieira, Heloise" <h.guarise.vieira at tue.nl>
To:
Dear all,
Find below the schedule for the Crypto Working Group of 28 November.
The meeting will be held at the Kargadoor, in Utrecht (google maps:
https://maps.app.goo.gl/Ufzj8qNC2DpE6rCU6).
See you there!
10:45h
GNU Taler: Anonymous, ethical and provably secure E-cash system
Elisa Pioldi
GNU Taler is a private-by-design token-based payment system, that offers
cash-like privacy to customers, while ensuring honest income reporting
by merchants, making it ideal for a real-world deployment as a digital
currency since it complies with banking regulations.
Our recent work focuses on analyzing the security of Taler under quantum
attacks, designing a quantum-safe version, enhancing the security
definitions and providing security proofs with concrete bounds.
This talk will be made of two parts: a non-technical overview of the
workings of Taler, including what the difference between Taler and
cryptocurrencies or other payment systems is and which the possible
applications exist; and a technical section, which will focus on Taler's
protocols, the cryptographic primitives that are used, the security
properties that are ensured and the efforts to make the protocol
post-quantum.
11:30h - coffee break
11:45h
Symmetric Primitives for MPC-/ZK-/HE-Applications
Lorenzo Grassi
Modern cryptography has developed many techniques that go well beyond
solving traditional confidentiality and authenticity problems in
two-party communication.
In order to work, such protocols may rely on the evaluation of symmetric
cryptographic primitives, such as Pseudo-Random Functions (PRFs),
symmetric encryption schemes, or hash functions, whose details have a
big impact on the performances of the considered applications. For this
reason, several dedicated MPC-/ZK-/HE-friendly symmetric primitives
(defined especially over prime fields) have recently appeared in the
literature.
In this presentation, we first highlight the design principles of the
symmetric primitives that target MPC-/HE-/ZK-applications, comparing
them with the ones commonly used for "traditional/classical" symmetric
schemes such as AES or Keccak/SHA-3. Next, for each one of the cited
applications, we will present some concrete examples of symmetric
primitives published in the literature, including:
the MPC-friendly block ciphers MiMC (ASIACRYPT 2016) and HadesMiMC
(EUROCRYPT 2020);
the ZK-friendly hash functions Rescue (FSE/ToSC 2020) and Poseidon
(USENIX 2021);
the FHE-friendly stream cipher Rasta (CRYPTO 2018).
12:30h - lunch break
14:00h
Authorized Private Set Intersection
Tjitske Koster
Private Set Intersection (PSI) enables two parties to compute the
intersection of their datasets without revealing any elements outside
the intersection. Many solid protocols exist, but recent attacks have
shown that input privacy can sometimes be compromised - even in
maliciously secure protocols. These attacks make use of malicious input
and our goal today is to protect against this threat.
To mitigate these types of attacks, Authorized PSI (APSI) introduces a
trusted third-party judge who authorizes the input prior to the
intersection. However, trusting a judge with all your elements may be
impractical or undesirable. Building on this idea, Falzon and Markatou
(PETS 2025) proposed Partial-APSI, a privacy-preserving variant of APSI
where only a portion of each input set is revealed to the judge.
Unfortunately, their protocol suffers from substantial bandwidth costs.
In this presentation we will construct a bandwidth-efficient
Partial-APSI protocol that significantly outperforms Falzon and
Markatou’s approach—both in theory and in practice. Together we will
investigate how many elements should be revealed to the judge. A
game-theoretic analysis can help us weigh privacy and verifiability. And
then the final question, can we obtain the same functionality without a
judge?
14:45h - coffee break
15:00h
Wedges, oil, and vinegar
Lars Ran
The Unbalanced Oil and Vinegar construction (UOV) is considered the
backbone of multivariate cryptography. It appeared first in the 90'ties,
and evolved slightly over the years. Today's modern variants - the 4
NIST candidates UOV, MAYO, SNOVA, QRUOV (is it this one you refer to?)
generally don't provide improved security guarantees, and mostly focus
on reducing the public key size. In this talk, we explore a new
key-recovery attack on UOV in characteristic 2.
In this setting the polar forms of the UOV public maps are not only
symmetric, but also alternating. This allows us to view both the public
key (the polar forms) and the secret key (the oil space) as elements of
the exterior algebra. We show how to establish relations between these
elements and demonstrate that the secret oil space can be recovered
using sparse linear algebra.
Our attack achieves improved complexity compared to previous methods,
reducing the claimed security by 4, 11, and 20 bits for uov-Ip, uov-III,
and uov-V, respectively. Moreover, the attack also applies to MAYO2 and
improves on the best attack by 28 bits.
Finally, we present an idea on how to generalize this to odd
characteristic and how this could lead to future improvements.
15:45h end of activities
--
[Image]
Heloise Vieira, PhD
Discrete Mathematics Cluster, Project Leader
Department of Mathematics and Computer Science
Phone number +31 (0)402474864
De Zaale, Eindhoven
05 MetaForum, MF 5.120
More information about the crypto
mailing list