Quantum advantage from any non-local game

Y Kalai, A Lombardi, V Vaikuntanathan… - Proceedings of the 55th …, 2023 - dl.acm.org
We show a general method of compiling any k-prover non-local game into a single-prover
(computationally sound) interactive game maintaining the same quantum completeness and …

Provable security analysis of FIDO2

M Barbosa, A Boldyreva, S Chen… - Advances in Cryptology …, 2021 - Springer
We carry out the first provable security analysis of the new FIDO2 protocols, the promising
FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …

Privacy-preserving federated learning against label-flip** attacks on non-iid data

X Shen, Y Liu, F Li, C Li - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Federated learning (FL) has attracted widespread attention in the Internet of Things domain
recently. With FL, multiple distributed devices can cooperatively train a global model by …

Robust and verifiable privacy federated learning

Z Lu, S Lu, X Tang, J Wu - IEEE Transactions on Artificial …, 2023 - ieeexplore.ieee.org
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data.
However, inference attacks can reconstruct raw data using gradients uploaded by users in …

A higher-order indistinguishability logic for cryptographic reasoning

D Baelde, A Koutsos… - 2023 38th Annual ACM …, 2023 - ieeexplore.ieee.org
The field of cryptographic protocol verification in the computational model aims at obtaining
formal security proofs of protocols. To facilitate writing such proofs, which are complex and …

Simulating quantum chaos without chaos

A Gu, Y Quek, S Yelin, J Eisert, L Leone - arxiv preprint arxiv:2410.18196, 2024 - arxiv.org
Quantum chaos is a quantum many-body phenomenon that is associated with a number of
intricate properties, such as level repulsion in energy spectra or distinct scalings of out-of …

A Probabilistic Logic for Concrete Security

D Baelde, C Fontaine, A Koutsos, G Scerri, T Vignon - CSF 2024-, 2024 - hal.science
The Squirrel Prover is a proof assistant designed for the computational verification of
cryptographic protocols. It implements a probabilistic logic that captures cryptographic and …

Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks

Z Lu, SF Lu, YQ Cui, XM Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Federated Learning (FL), a distributed learning paradigm optimizing communication costs
and enhancing privacy by uploading gradients instead of raw data, now confronts security …

Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification

VS Sehrawat, FY Yeo, Y Desmedt - Theoretical Computer Science, 2021 - Elsevier
Secret sharing allows a dealer to distribute a secret among a set of parties such that only
authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat …

GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols

X **e, Y Li, W Zhang, T Wang, S Xu, J Zhu… - 2024 IEEE Symposium …, 2024 - computer.org
Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the
current simulation-based definition of MPC, a security proof consists of a simulator, which is …