Quantum advantage from any non-local game
We show a general method of compiling any k-prover non-local game into a single-prover
(computationally sound) interactive game maintaining the same quantum completeness and …
(computationally sound) interactive game maintaining the same quantum completeness and …
Provable security analysis of FIDO2
We carry out the first provable security analysis of the new FIDO2 protocols, the promising
FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …
FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …
Privacy-preserving federated learning against label-flip** attacks on non-iid data
X Shen, Y Liu, F Li, C Li - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Federated learning (FL) has attracted widespread attention in the Internet of Things domain
recently. With FL, multiple distributed devices can cooperatively train a global model by …
recently. With FL, multiple distributed devices can cooperatively train a global model by …
Robust and verifiable privacy federated learning
Z Lu, S Lu, X Tang, J Wu - IEEE Transactions on Artificial …, 2023 - ieeexplore.ieee.org
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data.
However, inference attacks can reconstruct raw data using gradients uploaded by users in …
However, inference attacks can reconstruct raw data using gradients uploaded by users in …
A higher-order indistinguishability logic for cryptographic reasoning
D Baelde, A Koutsos… - 2023 38th Annual ACM …, 2023 - ieeexplore.ieee.org
The field of cryptographic protocol verification in the computational model aims at obtaining
formal security proofs of protocols. To facilitate writing such proofs, which are complex and …
formal security proofs of protocols. To facilitate writing such proofs, which are complex and …
Simulating quantum chaos without chaos
Quantum chaos is a quantum many-body phenomenon that is associated with a number of
intricate properties, such as level repulsion in energy spectra or distinct scalings of out-of …
intricate properties, such as level repulsion in energy spectra or distinct scalings of out-of …
A Probabilistic Logic for Concrete Security
D Baelde, C Fontaine, A Koutsos, G Scerri, T Vignon - CSF 2024-, 2024 - hal.science
The Squirrel Prover is a proof assistant designed for the computational verification of
cryptographic protocols. It implements a probabilistic logic that captures cryptographic and …
cryptographic protocols. It implements a probabilistic logic that captures cryptographic and …
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks
Z Lu, SF Lu, YQ Cui, XM Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Federated Learning (FL), a distributed learning paradigm optimizing communication costs
and enhancing privacy by uploading gradients instead of raw data, now confronts security …
and enhancing privacy by uploading gradients instead of raw data, now confronts security …
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
VS Sehrawat, FY Yeo, Y Desmedt - Theoretical Computer Science, 2021 - Elsevier
Secret sharing allows a dealer to distribute a secret among a set of parties such that only
authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat …
authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat …
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the
current simulation-based definition of MPC, a security proof consists of a simulator, which is …
current simulation-based definition of MPC, a security proof consists of a simulator, which is …