[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …
ongoing effort to build a quantum computer urges the cryptography community to develop …
Efficient pseudorandom correlation generators: Silent OT extension and more
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
We put forth new protocols for oblivious transfer extension and vector OLE, called Silver, for
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
Oblivious key-value stores and amplification for private set intersection
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
Compressing vector OLE
Oblivious linear-function evaluation (OLE) is a secure two-party protocol allowing a receiver
to learn any linear combination of a pair of field elements held by a sender. OLE serves as a …
to learn any linear combination of a pair of field elements held by a sender. OLE serves as a …
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
Efficient pseudorandom correlation generators from ring-LPN
Secure multiparty computation can often utilize a trusted source of correlated randomness to
achieve better efficiency. A recent line of work, initiated by Boyle et al.(CCS 2018, Crypto …
achieve better efficiency. A recent line of work, initiated by Boyle et al.(CCS 2018, Crypto …
[PDF][PDF] BIKE: bit flip** key encapsulation
4 Design Rationale and Considerations (2. B. 6) 11 4.1 What is BIKE and how should it be
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …