Awesome Material

Signature

Threshold ECDSA

  1. Threshold Signatures using Secure Multiparty Computation https://www.ingwb.com/binaries/content/assets/insights/themes/distributed-ledger-technology/ing-releases-multiparty-threshold-signing-library-to-improve-customer-security/threshold-signatures-using-secure-multiparty-computation.pdf
  2. Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators (SP22) https://eprint.iacr.org/2021/1587
  3. MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase https://link.springer.com/chapter/10.1007/978-3-031-15979-4_10
  4. Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model https://eprint.iacr.org/2020/683
  5. Simple Three-Round Multiparty Schnorr Signing with Full Simulatability https://eprint.iacr.org/2022/374
  6. Practical Asynchronous Distributed Key Generation https://ieeexplore.ieee.org/abstract/document/9833584
  7. Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
  8. Threshold cryptosystems from threshold fully homomorphic encryption
  9. Fast multiparty threshold ECDSA with fast trustless setup CCS18
  10. Notes on Threshold EdDSxpSchnorr Signatures https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8214B.ipd.pdf
  11. Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
  12. UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts (金主fireblock)
  13. Threshold and Multi-Signature Schemes from Linear Hash Functions https://eprint.iacr.org/2023/276.pdf
  14. Real Threshold ECDSA. https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f817_paper.pdf
  15. One Round Threshold ECDSA Without Roll Call https://link.springer.com/chapter/10.1007/978-3-031-30872-7_15

Unique Ring Sign

  1. Efficient Unique Ring Signatures From Lattices. Willy
  2. Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. https://eprint.iacr.org/2020/683

BLS Signature

  1. https://www.ietf.org/id/draft-irtf-cfrg-bls-signature-05.html
  2. https://crypto.stanford.edu/~dabo/pubs/papers/BLSmultisig.html
  3. https://alinush.github.io/2020/03/12/scalable-bls-threshold-signatures.html
  4. https://www.qredo.com/qredo-yellow-paper.pdf
  5. Compact Multi-signatures for Smaller Blockchains https://dl.acm.org/doi/abs/10.1007/978-3-030-03329-3_15
  6. hinTS: Threshold Signatures with Silent Setup (BLS) https://eprint.iacr.org/2023/567

Threshold Schnorr

  1. FROST: Flexible Round-Optimized Schnorr Threshold Signatures https://eprint.iacr.org/2020/852.pdf
  2. Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol https://eprint.iacr.org/2021/1658
  3. ROAST: Robust Asynchronous Schnorr Threshold Signatures https://eprint.iacr.org/2022/550
  4. SPRINT: High-Throughput Robust Distributed Schnorr Signatures https://eprint.iacr.org/2023/427
  5. Fully Adaptive Schnorr Threshold Signatures https://eprint.iacr.org/2023/445
  6. Yehuda Lindell: Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. IACR Cryptol. ePrint Arch. 2022: 374 (2022) — how to remove a coordinator
  7. Dan Boneh, Aditi Partap, Lior Rotem. Accountable Threshold Signatures with Proactive Refresh https://eprint.iacr.org/2022/1656.pdf

Secret Sharing

  1. ABY https://github.com/encryptogroup/ABY
  2. ABY2
  3. ABY3 ABY3: A Mixed Protocol Framework for Machine Learning. https://eprint.iacr.org/2018/403.pdf

Distributed Key Generation

  1. CCS02 Asynochronous Verfiable Secret Shairing and Proactive Cryptosystems, https://www.andrew.cmu.edu/user/amitdatt//public/files/MPI-talk.pdf https://cs.brown.edu/research/pubs/pdfs/2002/Cachin-2002-AVS.pdf
  2. Distributed Key Generation for the Internet https://cacr.uwaterloo.ca/techreports/2008/cacr2008-25.pdf
  3. Backes, M., Kate, A., Patra, A.: Computational Verifiable Secret Sharing Revisited. Cryptology ePrint Archive, Report 2011/281 (2011)
  4. Asynchronous Computational VSS with Reduced Communication Complexity. https://eprint.iacr.org/2012/619.pdf
  5. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography https://link.springer.com/article/10.1007/s00145-005-0318-0 (经典基于签名实现BFT)
  6. Practical Signature-Free Asynchronous Common Subset in Constant Time https://eprint.iacr.org/2023/154.pdf
  7. Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience https://eprint.iacr.org/2023/536

Authentication

  1. Orca: Blocklisting in Sender-Anonymous Messaging https://www.usenix.org/system/files/sec22-tyagi.pdf
  2. SoK: Oblivious Pseudorandom Functions https://eprint.iacr.org/2022/302
  3. A Fast and Simple Partially Oblivious PRF, with Applications https://eprint.iacr.org/2021/864.pdf
  4. ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi https://eprint.iacr.org/2022/1286
  5. Might I Get Pwned: A Second Generation Compromised Credential Checking Service https://www.usenix.org/conference/usenixsecurity22/presentation/pal

Computer-based crypto

  1. ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutoria https://bblanche.gitlabpages.inria.fr/proverif/manual.pdf
  2. Verifpal: Cryptographic Protocol Analysis for the Real World https://eprint.iacr.org/2019/971.pdf
  3. A Comparative Study of Formal Verification Techniques for Authentication Protocols https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=7204&context=etd
  4. https://tamarin-prover.github.io/manual/book/003_example.html
  5. Crypto Engineering - verifying security protocols http://www-verimag.imag.fr/~ene/m2p/main.pdf
  6. Model Checking Security Protocols https://people.inf.ethz.ch/basin/pubs/security-modelchecking.pdf
  7. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif https://www.nowpublishers.com/article/Details/SEC-004

credential stuffing

  1. Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein: Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571

PAKE

  1. A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn’t Be Considered UC-Secure)
  2. OPAQUE https://cfrg.github.io/draft-irtf-cfrg-opaque/draft-irtf-cfrg-opaque.html https://eprint.iacr.org/2018/163.pdf
  3. End-to-End Secure Messaging with Traceability Only for Illegal Content: J Bartusek, S Garg, A Jain, GV Policharla https://ia.cr/2022/1643

anonymous token + private information retrival

  1. AdVeil: A Private Targeted Advertising Ecosystem https://eprint.iacr.org/2021/1032.pdf
  2. Ibex: Privacy-preserving ad conversion tracking and bidding https://eprint.iacr.org/2022/1174.pdf
  3. Addax: A fast, private, and accountable ad exchange infrastructure https://eprint.iacr.org/2022/1299.pdf
  4. Formal Security Definition of Metadata-Private Messaging https://eprint.iacr.org/2022/1139.pdf https://anysphere-messaging.com/anysphere-whitepaper.pdf https://github.com/anysphere/anysphere-messaging
  5. Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search
  6. Riposte: An Anonymous Messaging System Handling Millions of Users https://arxiv.org/pdf/1503.06115.pdf
  7. Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. https://eprint.iacr.org/2020/248

Tor

  1. Bypassing Tor Exit Blocking with Exit Bridge Onion Services
  2. Walking Onions: Scaling Anonymity Networks while Protecting Users https://www.usenix.org/conference/usenixsecurity20/presentation/komlo https://blog.ivayloivanov.eu/misc/thesis.pdf

  1. Amos Beimel and Shlomi Dolev. Buses for Anonymous Message Delivery. https://link.springer.com/content/pdf/10.1007/s00145-002-0128-6.pdf
  2. Elli Androulaki and Steven Bellovin. APOD: Anonymous Physical Object Delivery. https://www.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf
  3. AP3: Cooperative, decentralized anonymous communication. https://www.ccs.neu.edu/home/amislove/publications/AP3-SIGOPSEW.pdf
  4. Dissent: Accountable Anonymous Group Messaging. https://www.freehaven.net/anonbib/cache/ccs10-dissent.pdf
  5. Orca: Blocklisting in Sender-Anonymous Messaging. https://www.usenix.org/system/files/sec22summer_tyagi.pdf
  6. Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. https://eprint.iacr.org/2022/1548

Continuous Authentication

  1. A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
  2. Continuous Authentication in Secure Messaging https://eprint.iacr.org/2022/1215.pdf
  3. A Formal Security Analysis of the Signal Messaging Protoco https://eprint.iacr.org/2016/1013
  4. Authenticated Continuous Key Agreement: Active MitM Detection and Prevention https://eprint.iacr.org/2023/228.pdf

FHE

  1. Simple Encrypted Arithmetic Library 2.3.1 https://www.microsoft.com/en-us/research/uploads/prod/2017/11/sealmanual-2-3-1.pdf
  2. ETH Library Pyfhel: PYthon for Homomorphic Encryption Libraries. https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/522339/pyfhel.pdf?sequence=3
  3. Palisade. PPT https://palisade-crypto.org/wp-content/uploads/2021/03/PALISADE-03-26-APPROXIMATE-ARITHMETIC.pdf
  4. Vadim Lyubashevsky Chris Peikert Oded Regev. On Ideal Lattices and Learning with Errors Over Rings https://eprint.iacr.org/2012/230.pdf
  5. Ilia Iliashenko1 and Vincent Zucca. Faster homomorphic comparison operations for BGV and BFV https://eprint.iacr.org/2021/315.pdf
  6. (Leveled) Fully Homomorphic Encryption without Bootstrapping https://people.csail.mit.edu/vinodv/6892-Fall2013/BGV.pdf
  7. Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption https://arxiv.org/pdf/2101.07841.pdf
  8. https://asecuritysite.com/homomorphic/go_lattice_cc5
  9. https://hal.archives-ouvertes.fr/hal-03228168/document CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
  10. multi-key TFHE https://github.com/ilachill/MK-TFHE
  11. https://eprint.iacr.org/2022/915.pdf OpenFHE 一个比较不错的survery
  12. https://palisade-crypto.org/publications/
  13. Pesca: A Privacy-Enhancing Smart-Contract Architecture https://eprint.iacr.org/2022/1119.pdf
  14. CKKS
  15. Multikey FHE

FHE-based MPC

  1. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption (and eprint2011/663, eprint2011/613)
  2. S. Dov Gordon, Feng-Hao Liu, Elaine Shi: Constant-Round MPC with Fairness and Guarantee of Output Delivery. CRYPTO (2) 2015: 63-82 https://eprint.iacr.org/2015/371
  3. Pratyay Mukherjee, Daniel Wichs: Two Round Multiparty Computation via Multi-key FHE. EUROCRYPT (2) 2016: 735-763. https://eprint.iacr.org/2015/345.pdf Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou: Four Round Secure Computation Without Setup. TCC (1) 2017: 645-677.
  4. Eunkyung Kim, Hyang-Sook Lee, and Jeongeun Park. Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS. https://eprint.iacr.org/2018/1156.pdf
    • On the Security of Multikey Homomorphic Encryption. https://eprint.iacr.org/2019/1082.pdf
  5. Multi-Key Homomophic Encryption from TFHE. https://eprint.iacr.org/2019/116.pdf
  6. Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, and Giulio Malavolta. Multi-key Fully-Homomorphic Encryption in the Plain Model. https://eprint.iacr.org/2020/180
  7. Multiparty Reusable Non-Interactive Secure Computation from LWE. https://eprint.iacr.org/2021/378.pdf
  8. Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. https://eprint.iacr.org/2017/956.pdf
  9. Faster Non-interactive Verifiable Computing. https://web.archive.org/web/20220528160638id_/https://eprint.iacr.org/2022/646.pdf
  10. Efficient Threshold FHE with Application to Real-Time Systems. https://eprint.iacr.org/2022/1625.pdf
  11. On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. https://eprint.iacr.org/2023/301.pdf
    • Circuit-Private Multi-Key FHE. https://web.cs.ucla.edu/~rafail/PUBLIC/202.pdf
  12. D. Boneh, S. Eskandarian, L. Hanzlik, and N. Greco. Single Secret Leader Election. https://eprint.iacr.org/2020/025
  13. Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus https://eprint.iacr.org/2023/016.pdf
  14. Threshold-Optimal MPC With Friends and Foes https://eprint.iacr.org/2022/1526.pdf (threshold fhe)
  15. Plug-and-play sanitization for TFHE https://eprint.iacr.org/2022/1438.pdf
  16. Round-Optimal Secure Multi-Party Computation. https://eprint.iacr.org/2017/1056.pdf
  17. Interaction-Preserving Compilers for Secure Computation. https://drops.dagstuhl.de/opus/volltexte/2022/15653/pdf/LIPIcs-ITCS-2022-57.pdf
  18. RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol https://perso.limos.fr/~leorober/file/rmc-pvc.pdf
  1. Unbounded Multi-Party Computation from Learning with Errors. https://eprint.iacr.org/2021/431.pdf
  2. Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. https://eprint.iacr.org/2022/535.pdf

Leader Election

  1. Efficient and Universally Composable Single Secret Leader Election from Pairings https://eprint.iacr.org/2021/344.pdf
  2. A framework for constructing Single Secret Leader Election from MPC. https://eprint.iacr.org/2022/1040.pdf
  3. Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains https://eprint.iacr.org/2023/113.pdf

PIR

  1. Dan B , Gentry C , Halevi S , et al. Private database queries using somewhat homomorphic encryption[J]. Proceedings of the 11th international conference on Applied Cryptography and Network Security, 2013.
  2. XPIR
  3. Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish. Scalable and Private Media Consumption with Popcorn. In Proc. of NSDI 16.
  4. SHECS-PIR: Somewhat Homomorphic Encryption-based Compact and Scalable Private Information Retrieval
  5. Coeus: A System for Oblivious Document Ranking and Retrieval (SOSP '21)
  6. Splinter: Practical Private Queries on Public Data (NSID'17)
  7. Dams, D., Lataille, J., Sanchez, R., Wade, J.: WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery. Cryptology ePrint Archive, Report 2019/855 (2019)
  8. Ali, A., Lepoint, T., Patel, S., Raykova, M., Schoppmann, P., Seth, K., Yeo, K.: Communication–computation trade-offs in PIR. Cryptology ePrint Archive, Report 2019/1483 (2019)
  9. Gentry, C., Halevi, S.: Compressible FHE with applications to PIR. In: Hofheinz, D., Rosen, A. (eds.) TCC 2019, Part II. LNCS, vol. 11892, pp. 438–464. Springer, Heidelberg (Dec 2019)
  10. Authenticated PIR. https://eprint.iacr.org/2023/297.pdf
  11. FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval https://petsymposium.org/popets/2023/popets-2023-0022.pdf

紧密相关文章

  1. Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura: On Private Information Retrieval Supporting Range Queries. ESORICS (2) 2020: 674-694

相等性检测

  1. PiPa (Li Jie)
  2. Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search

FSS and HSS

  1. Function Secret Sharing: Improvements and Extensions https://eprint.iacr.org/2018/707
  2. Boyle, Elette, et al. “Compressing vector OLE.” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018. https://eprint.iacr.org/2019/273
  3. Homomorphic Secret Sharing from Lattices Without FHE https://eprint.iacr.org/2019/129.pdf
  4. On Homomorphic Secret Sharing from Polynomial-Modulus LWE https://eprint.iacr.org/2023/382.pdf
  5. Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation https://eprint.iacr.org/2022/1688.pdf
  6. Private Access Control for Function Secret Sharing https://sachaservanschreiber.com/papers/pacl.pdf
  7. Functional secret sharing and PIR. Notes of Wu. https://crypto.stanford.edu/cs359c/17sp/notes/lec8b.pdf