|
|
Efficiently Batching Unambiguous Interactive Proofs Friday, November 7, 2025 - 10:30am to 12:00pm We show that if a language $\mathcal{L}$ admits a public-coin unambiguous interactive proof (UIP) with round complexity $\ell$, where $a$ bits are communicated per round, then the \emph{batch language} $\mathcal{L}^{\otimes k}$, i.e. |
|
|
Gödel in Cryptography: Zero-Knowledge for NP With No Interaction, No Setup, and Perfect Soundness Friday, October 24, 2025 - 10:30am to 12:00pm |
|
|
Parallel Repetition for Post-Quantum Arguments Friday, October 17, 2025 - 10:30am to 12:00pm We show that parallel repetition of public-coin interactive arguments reduces the soundness error at an exponential rate even in the post-quantum setting. |
|
|
The Sponge is Quantum Indifferentiable Friday, October 10, 2025 - 10:30am to 12:00pm |
|
|
Succinct Non-interactive Arguments of Proximity Friday, September 26, 2025 - 10:30am to 12:00pm We study succinct non-interactive arguments of proximity (SNAP), which allow a prover to convince a verifier that a statement is true through a short message. |
|
|
How to Verify Any (Reasonable) Distribution Property: Computationally Sound Argument Systems for Distributions Friday, September 19, 2025 - 10:30am to 12:00pm As statistical analyses become increasingly central, there is a growing need to ensure their results are correct. Approximate correctness can be verified by replicating the entire analysis, but can we verify without replication? |
|
|
Succinct Witness Encryption for Batch Languages and Applications Friday, September 12, 2025 - 10:30am to 12:00pm |
|
|
Side Channel Attacks: Lessons Learned or Troubles Ahead? Monday, December 9, 2024 - 4:00pm to 6:00pm The security and architecture communities will remember the past five years as the era of side channels. Starting from Spectre and Meltdown, time and again we have seen how basic performance-improving features can be exploited to violate fundamental security guarantees. |
|
|
Perpetual Encryption Friday, August 16, 2024 - 10:30am to 12:00pm We consider the problem of building a private blockchain (BC) on top of a public one. This has the advantage that users of the private BC do not need to build expensive consensus protocol, while still maintaining privacy. |
|
|
Post-quantum secure signature schemes from isogenies Friday, July 19, 2024 - 10:30am to 12:00pm Most public-key cryptography that is deployed in today’s systems is susceptible to attacks by quantum computers. |