Signature
Threshold ECDSA
- Threshold Signatures using Secure Multiparty Computation https://www.ingwb.com/binaries/content/assets/insights/themes/distributed-ledger-technology/ing-releases-multiparty-threshold-signing-library-to-improve-customer-security/threshold-signatures-using-secure-multiparty-computation.pdf
- Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators (SP22) https://eprint.iacr.org/2021/1587
- MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase https://link.springer.com/chapter/10.1007/978-3-031-15979-4_10
- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model https://eprint.iacr.org/2020/683
- Simple Three-Round Multiparty Schnorr Signing with Full Simulatability https://eprint.iacr.org/2022/374
- Practical Asynchronous Distributed Key Generation https://ieeexplore.ieee.org/abstract/document/9833584
- Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
- Threshold cryptosystems from threshold fully homomorphic encryption
- Fast multiparty threshold ECDSA with fast trustless setup CCS18
- Notes on Threshold EdDSxpSchnorr Signatures https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8214B.ipd.pdf
- Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
- UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts (金主fireblock)
- Threshold and Multi-Signature Schemes from Linear Hash Functions https://eprint.iacr.org/2023/276.pdf
- Real Threshold ECDSA. https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f817_paper.pdf
- One Round Threshold ECDSA Without Roll Call https://link.springer.com/chapter/10.1007/978-3-031-30872-7_15
Unique Ring Sign
- Efficient Unique Ring Signatures From Lattices. Willy
- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. https://eprint.iacr.org/2020/683
BLS Signature
- https://www.ietf.org/id/draft-irtf-cfrg-bls-signature-05.html
- https://crypto.stanford.edu/~dabo/pubs/papers/BLSmultisig.html
- https://alinush.github.io/2020/03/12/scalable-bls-threshold-signatures.html
- https://www.qredo.com/qredo-yellow-paper.pdf
- Compact Multi-signatures for Smaller Blockchains https://dl.acm.org/doi/abs/10.1007/978-3-030-03329-3_15
- hinTS: Threshold Signatures with Silent Setup (BLS) https://eprint.iacr.org/2023/567
Threshold Schnorr
- FROST: Flexible Round-Optimized Schnorr Threshold Signatures https://eprint.iacr.org/2020/852.pdf
- Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol https://eprint.iacr.org/2021/1658
- ROAST: Robust Asynchronous Schnorr Threshold Signatures https://eprint.iacr.org/2022/550
- SPRINT: High-Throughput Robust Distributed Schnorr Signatures https://eprint.iacr.org/2023/427
- Fully Adaptive Schnorr Threshold Signatures https://eprint.iacr.org/2023/445
- Yehuda Lindell: Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. IACR Cryptol. ePrint Arch. 2022: 374 (2022) — how to remove a coordinator
- Dan Boneh, Aditi Partap, Lior Rotem. Accountable Threshold Signatures with Proactive Refresh https://eprint.iacr.org/2022/1656.pdf
Secret Sharing
- ABY https://github.com/encryptogroup/ABY
- ABY2
- ABY3 ABY3: A Mixed Protocol Framework for Machine Learning. https://eprint.iacr.org/2018/403.pdf
Distributed Key Generation
- CCS02 Asynochronous Verfiable Secret Shairing and Proactive Cryptosystems, https://www.andrew.cmu.edu/user/amitdatt//public/files/MPI-talk.pdf https://cs.brown.edu/research/pubs/pdfs/2002/Cachin-2002-AVS.pdf
- Distributed Key Generation for the Internet https://cacr.uwaterloo.ca/techreports/2008/cacr2008-25.pdf
- Backes, M., Kate, A., Patra, A.: Computational Verifiable Secret Sharing Revisited. Cryptology ePrint Archive, Report 2011/281 (2011)
- Asynchronous Computational VSS with Reduced Communication Complexity. https://eprint.iacr.org/2012/619.pdf
- Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography https://link.springer.com/article/10.1007/s00145-005-0318-0 (经典基于签名实现BFT)
- Practical Signature-Free Asynchronous Common Subset in Constant Time https://eprint.iacr.org/2023/154.pdf
- Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience https://eprint.iacr.org/2023/536
Authentication
- Orca: Blocklisting in Sender-Anonymous Messaging https://www.usenix.org/system/files/sec22-tyagi.pdf
- SoK: Oblivious Pseudorandom Functions https://eprint.iacr.org/2022/302
- A Fast and Simple Partially Oblivious PRF, with Applications https://eprint.iacr.org/2021/864.pdf
- ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi https://eprint.iacr.org/2022/1286
- Might I Get Pwned: A Second Generation Compromised Credential Checking Service https://www.usenix.org/conference/usenixsecurity22/presentation/pal
Computer-based crypto
- ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutoria https://bblanche.gitlabpages.inria.fr/proverif/manual.pdf
- Verifpal: Cryptographic Protocol Analysis for the Real World https://eprint.iacr.org/2019/971.pdf
- A Comparative Study of Formal Verification Techniques for Authentication Protocols https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=7204&context=etd
- https://tamarin-prover.github.io/manual/book/003_example.html
- Crypto Engineering - verifying security protocols http://www-verimag.imag.fr/~ene/m2p/main.pdf
- Model Checking Security Protocols https://people.inf.ethz.ch/basin/pubs/security-modelchecking.pdf
- Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif https://www.nowpublishers.com/article/Details/SEC-004
credential stuffing
- Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571
PAKE
- A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn’t Be Considered UC-Secure)
- OPAQUE https://cfrg.github.io/draft-irtf-cfrg-opaque/draft-irtf-cfrg-opaque.html https://eprint.iacr.org/2018/163.pdf
- End-to-End Secure Messaging with Traceability Only for Illegal Content: J Bartusek, S Garg, A Jain, GV Policharla https://ia.cr/2022/1643
- AdVeil: A Private Targeted Advertising Ecosystem https://eprint.iacr.org/2021/1032.pdf
- Ibex: Privacy-preserving ad conversion tracking and bidding https://eprint.iacr.org/2022/1174.pdf
- Addax: A fast, private, and accountable ad exchange infrastructure https://eprint.iacr.org/2022/1299.pdf
- Formal Security Definition of Metadata-Private Messaging https://eprint.iacr.org/2022/1139.pdf https://anysphere-messaging.com/anysphere-whitepaper.pdf https://github.com/anysphere/anysphere-messaging
- Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search
- Riposte: An Anonymous Messaging System Handling Millions of Users https://arxiv.org/pdf/1503.06115.pdf
- Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. https://eprint.iacr.org/2020/248
Tor
- Bypassing Tor Exit Blocking with Exit Bridge Onion Services
- Walking Onions: Scaling Anonymity Networks while Protecting Users https://www.usenix.org/conference/usenixsecurity20/presentation/komlo
https://blog.ivayloivanov.eu/misc/thesis.pdf
- Amos Beimel and Shlomi Dolev. Buses for Anonymous Message Delivery. https://link.springer.com/content/pdf/10.1007/s00145-002-0128-6.pdf
- Elli Androulaki and Steven Bellovin. APOD: Anonymous Physical Object Delivery. https://www.cs.columbia.edu/~smb/papers/APOD_PETS09.pdf
- AP3: Cooperative, decentralized anonymous communication. https://www.ccs.neu.edu/home/amislove/publications/AP3-SIGOPSEW.pdf
- Dissent: Accountable Anonymous Group Messaging. https://www.freehaven.net/anonbib/cache/ccs10-dissent.pdf
- Orca: Blocklisting in Sender-Anonymous Messaging. https://www.usenix.org/system/files/sec22summer_tyagi.pdf
- Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. https://eprint.iacr.org/2022/1548
Continuous Authentication
- A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
- Continuous Authentication in Secure Messaging https://eprint.iacr.org/2022/1215.pdf
- A Formal Security Analysis of the Signal Messaging Protoco https://eprint.iacr.org/2016/1013
- Authenticated Continuous Key Agreement: Active MitM Detection and Prevention https://eprint.iacr.org/2023/228.pdf
FHE
- Simple Encrypted Arithmetic Library 2.3.1 https://www.microsoft.com/en-us/research/uploads/prod/2017/11/sealmanual-2-3-1.pdf
- ETH Library Pyfhel: PYthon for Homomorphic Encryption Libraries. https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/522339/pyfhel.pdf?sequence=3
- Palisade. PPT https://palisade-crypto.org/wp-content/uploads/2021/03/PALISADE-03-26-APPROXIMATE-ARITHMETIC.pdf
- Vadim Lyubashevsky Chris Peikert Oded Regev. On Ideal Lattices and Learning with Errors Over Rings https://eprint.iacr.org/2012/230.pdf
- Ilia Iliashenko1 and Vincent Zucca. Faster homomorphic comparison operations for BGV and BFV https://eprint.iacr.org/2021/315.pdf
- (Leveled) Fully Homomorphic Encryption without Bootstrapping https://people.csail.mit.edu/vinodv/6892-Fall2013/BGV.pdf
- Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption https://arxiv.org/pdf/2101.07841.pdf
- https://asecuritysite.com/homomorphic/go_lattice_cc5
- https://hal.archives-ouvertes.fr/hal-03228168/document CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
- multi-key TFHE https://github.com/ilachill/MK-TFHE
- https://eprint.iacr.org/2022/915.pdf OpenFHE 一个比较不错的survery
- https://palisade-crypto.org/publications/
- Pesca: A Privacy-Enhancing Smart-Contract Architecture https://eprint.iacr.org/2022/1119.pdf
- CKKS
- Multikey FHE
FHE-based MPC
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption (and eprint2011/663, eprint2011/613)
- S. Dov Gordon, Feng-Hao Liu, Elaine Shi: Constant-Round MPC with Fairness and Guarantee of Output Delivery. CRYPTO (2) 2015: 63-82 https://eprint.iacr.org/2015/371
- Pratyay Mukherjee, Daniel Wichs: Two Round Multiparty Computation via Multi-key FHE. EUROCRYPT (2) 2016: 735-763. https://eprint.iacr.org/2015/345.pdf
Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou: Four Round Secure Computation Without Setup. TCC (1) 2017: 645-677.
- Eunkyung Kim, Hyang-Sook Lee, and Jeongeun Park. Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS. https://eprint.iacr.org/2018/1156.pdf
- On the Security of Multikey Homomorphic Encryption. https://eprint.iacr.org/2019/1082.pdf
- Multi-Key Homomophic Encryption from TFHE. https://eprint.iacr.org/2019/116.pdf
- Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, and Giulio Malavolta. Multi-key Fully-Homomorphic Encryption in the Plain Model. https://eprint.iacr.org/2020/180
- Multiparty Reusable Non-Interactive Secure Computation from LWE. https://eprint.iacr.org/2021/378.pdf
- Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. https://eprint.iacr.org/2017/956.pdf
- Faster Non-interactive Verifiable Computing. https://web.archive.org/web/20220528160638id_/https://eprint.iacr.org/2022/646.pdf
- Efficient Threshold FHE with Application to Real-Time Systems. https://eprint.iacr.org/2022/1625.pdf
- On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. https://eprint.iacr.org/2023/301.pdf
- Circuit-Private Multi-Key FHE. https://web.cs.ucla.edu/~rafail/PUBLIC/202.pdf
- D. Boneh, S. Eskandarian, L. Hanzlik, and N. Greco. Single Secret Leader Election. https://eprint.iacr.org/2020/025
- Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus https://eprint.iacr.org/2023/016.pdf
- Threshold-Optimal MPC With Friends and Foes https://eprint.iacr.org/2022/1526.pdf (threshold fhe)
- Plug-and-play sanitization for TFHE https://eprint.iacr.org/2022/1438.pdf
- Round-Optimal Secure Multi-Party Computation. https://eprint.iacr.org/2017/1056.pdf
- Interaction-Preserving Compilers for Secure Computation. https://drops.dagstuhl.de/opus/volltexte/2022/15653/pdf/LIPIcs-ITCS-2022-57.pdf
- RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol https://perso.limos.fr/~leorober/file/rmc-pvc.pdf
- Unbounded Multi-Party Computation from Learning with Errors. https://eprint.iacr.org/2021/431.pdf
- Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. https://eprint.iacr.org/2022/535.pdf
Leader Election
- Efficient and Universally Composable Single Secret Leader Election from Pairings https://eprint.iacr.org/2021/344.pdf
- A framework for constructing Single Secret Leader Election from MPC. https://eprint.iacr.org/2022/1040.pdf
- Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains https://eprint.iacr.org/2023/113.pdf
PIR
- Dan B , Gentry C , Halevi S , et al. Private database queries using somewhat homomorphic encryption[J]. Proceedings of the 11th international conference on Applied Cryptography and Network Security, 2013.
- XPIR
- Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish. Scalable and Private Media Consumption with Popcorn. In Proc. of NSDI 16.
- SHECS-PIR: Somewhat Homomorphic Encryption-based Compact and Scalable Private Information Retrieval
- Coeus: A System for Oblivious Document Ranking and Retrieval (SOSP '21)
- Splinter: Practical Private Queries on Public Data (NSID'17)
- Dams, D., Lataille, J., Sanchez, R., Wade, J.: WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery. Cryptology ePrint Archive, Report 2019/855 (2019)
- Ali, A., Lepoint, T., Patel, S., Raykova, M., Schoppmann, P., Seth, K., Yeo, K.: Communication–computation trade-offs in PIR. Cryptology ePrint Archive, Report 2019/1483 (2019)
- Gentry, C., Halevi, S.: Compressible FHE with applications to PIR. In: Hofheinz, D., Rosen, A. (eds.) TCC 2019, Part II. LNCS, vol. 11892, pp. 438–464. Springer, Heidelberg (Dec 2019)
- Authenticated PIR. https://eprint.iacr.org/2023/297.pdf
- FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval https://petsymposium.org/popets/2023/popets-2023-0022.pdf
紧密相关文章
- Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On Private Information Retrieval Supporting Range Queries. ESORICS (2) 2020: 674-694
相等性检测
- PiPa (Li Jie)
- Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search
FSS and HSS
- Function Secret Sharing: Improvements and Extensions https://eprint.iacr.org/2018/707
- Boyle, Elette, et al. “Compressing vector OLE.” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018. https://eprint.iacr.org/2019/273
- Homomorphic Secret Sharing from Lattices Without FHE https://eprint.iacr.org/2019/129.pdf
- On Homomorphic Secret Sharing from Polynomial-Modulus LWE https://eprint.iacr.org/2023/382.pdf
- Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation https://eprint.iacr.org/2022/1688.pdf
- Private Access Control for Function Secret Sharing https://sachaservanschreiber.com/papers/pacl.pdf
- Functional secret sharing and PIR. Notes of Wu. https://crypto.stanford.edu/cs359c/17sp/notes/lec8b.pdf