Random Oracle Model Precludes Verifiable Delay Functions
This research fundamentally proves Verifiable Delay Functions cannot exist in the Random Oracle Model, challenging foundational assumptions for secure randomness in decentralized systems.
Standard-Model One-Shot Signatures via Permutable Pseudorandom Permutations for Secure Transactions
A new cryptographic primitive, permutable pseudorandom permutations, enables the first standard-model one-shot signatures, securing single-use digital transactions.
Group Verifiable Random Functions Revolutionize Anonymous Token Issuance
A novel cryptographic primitive, Group Verifiable Random Functions, enables scalable, user-generated anonymous tokens, fundamentally transforming privacy-preserving access control and authentication.
Practical Quantum Public Key Encryption for Noisy Intermediate-Scale Quantum Devices
A noise-resilient quantum-classical public key encryption scheme is designed for current noisy quantum computers, requiring minimal qubits.
Fully Homomorphic Encryption Revolutionizes Blockchain Privacy and Scalability
FHE enables encrypted data computation, fundamentally transforming blockchain privacy and scalability through continuous data confidentiality.
EByFTVeS Fortifies Verifiable Secret Sharing in Privacy-Preserving Machine Learning
A novel Byzantine Fault Tolerant verifiable secret-sharing scheme thwarts adaptive model poisoning attacks, ensuring robust consistency in distributed private machine learning.
Affine One-Wayness: Post-Quantum Temporal Verification Primitive
A new post-quantum cryptographic primitive, Affine One-Wayness (AOW), enables verifiable temporal ordering in distributed systems without trusted authorities, crucial for future blockchain security.
Succinct One-Sided Private Set Intersection for Confidential Data Matching
This research introduces a novel cryptographic primitive enabling private set intersection where one party learns the common elements succinctly, without revealing their own set.
Algebraic Verifiable Delay Functions Vulnerable to Parallel Computation
Cryptanalysis reveals fundamental flaws in algebraic Verifiable Delay Functions, demonstrating parallel computation can bypass intended sequential delays, necessitating new secure designs.
