第61期学术报告

报告1题目:more efficient zero-knowledge protocols over ℤ_{2^k} via galois rings报告时间:5月18号上午9:30-10:30报告地点

报告1题目:more efficient zero-knowledge protocols over _{2^k} via galois rings

报告1时间:518号上午930-1030

报告1地点:学院101会议室

报告1摘要:a recent line of works on zero-knowledge (zk) protocols with a vector oblivious linear function evaluation (vole)-based offline phase provides a new paradigm for scalable zk protocols featuring fast proving and small prover memory. very recently, baum et al. (crypto’23) proposed the vole-in-the-head technique, allowing such protocols to become publicly verifiable. many practically efficient protocols for proving circuit satisfiability over any galois field are implemented, while protocols over rings _{2^k} are significantly lagging behind, with only a proof-of-concept pioneering work called appenzeller to brie (ccs’21) and a first proposal called moz_{2^k}arella (crypto22). the ring _{2^{32}} or _{2^{64}} , though highly important (it captures computation in real-life programming and the computer architectures such as cpu words), presents non-trivial difficulties because, for example, unlike galois fields f_{2^k} , the fraction of units in _{2^k} is 1/2. in this work, we first construct zk protocols over a high degree galois ring extension of _{2^k} (fraction of units close to 1) and then convert them to _{2^k} efficiently using amortization techniques. our results greatly change the landscape of zk protocols over _{2^k}.

(1) we propose a competing zk protocol that has many advantages over the state-of-the-art moz_{2^k} are lla. we remove the undesirable dependence of communication complexity on the security parameter, and achieve (strict) linear communication complexity. furthermore, our protocol has better concrete efficiency. for 40, 80 bits soundness on 32, 64-bit cpus, we offer 1.15×–2.9× improvements in communication.

(2) inspired by the recently proposed interactive message authentication code technique (weng et al., ccs’22), we construct a constant round zk protocol over _{2^k} with sublinear (in the circuit size) communication complexity, which was previously achieved only over fields.

(3) we adapt the vole-in-the-head technique, and apply it to our first zk protocol, yielding the first publicly verifiable non-interactive zk over _{2^k} with linear communication complexity. also, we show that the pseudorandom correlation generator approach (incompatible with vole-in-the-head) can be adapted to efficiently implement vole over galois rings, with analysis of the hardness of underlying assumptions.

报告人1:林富春,现为上海交通大学助理研究员,博士毕业于新加坡南洋理工大学(nanyang technological university),先后在加拿大卡尔加里大学(university of calgary)和英国帝国理工学院(imperial college london)从事博士后研究,在编码与密码领域取得一系列重要成果:(1)基于代数格的安全编码和密码方面成果在信息论顶级期刊《ieee trans. information theory》、《中国科学》等国内外学术期刊发表;(2)基于代数编码的安全编码和密码协议方面成果在“四大安全顶会”之一的ccsinfocom等国际学术会议发表;(3)秘密共享与安全多方计算方面成果在“三大密码会”的cryptoasiacryptitcsitc等国际学术会议发表。参与编写由国际crc出版社出版的《physical layer security in wireless communications》著作,主要负责“coding for wiretap channels”部分编写;担任focseurocryptasiacryptieee trans. it等编码与密码领域著名国际学术会议或期刊的审稿人。

 

 

报告2题目:generic construction of trace-and-revoke inner product functional encryption

报告2时间:518号上午1030-1130

报告2地点:学院101会议室

报告2内容简介:叛逆者追踪(traitor tracing)系统是一种多接收方加密,允许权威机构或任意方(在公共可追踪性的情况下)识别出合谋创建了盗版解码器的恶意用户(叛逆者)。 跟踪和撤销(trace-and-revoke)系统是叛逆者跟踪系统的扩展,其中,存在一个用户撤销机制,用来撤销用户(例如,叛逆者)的解密能力。追踪和撤销系统在广播加密(be)、基于身份加密(ibe)和基于属性加密(abe)下得到了广泛的研究,但在函数加密(fe)下研究较少。 本报告将介绍我们构造的一个可追踪和可撤销内积函数加密通用性方案,该工作发表在esorics 2022

报告人2:罗富财,现为浙江工商大学副研究员。主要从事公钥密码、格密码、全同态加密以及可证明安全理论的基础理论和应用研究。在ccf 推荐会议和期刊上以第一作者身份发表近20篇论文,包括 ieee transactions on information forensics and security, ieee transactions on dependable and secure computing, ieee transactions on mobile computing, designs, codes and cryptography,theoretical computer science, the computer journal, esorics 2022。主持一项国家自然科学基金青年项目。


网站地图