[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

Efficient schemes for committing authenticated encryption

M Bellare, VT Hoang - Annual International Conference on the Theory and …, 2022 - Springer
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

On committing authenticated-encryption

J Chan, P Rogaway - European Symposium on Research in Computer …, 2022 - Springer
We provide a strong definition for committing authenticated-encryption (cAE), as well as a
framework that encompasses earlier and weaker definitions. The framework attends not only …

Anonymous, robust post-quantum public key encryption

P Grubbs, V Maram, KG Paterson - … on the Theory and Applications of …, 2022 - Springer
A core goal of the NIST PQC competition is to produce PKE schemes which, even if attacked
with a large-scale quantum computer, maintain the security guarantees needed by …

MEGA: malleable encryption goes awry

M Backendal, M Haller… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
MEGA is a leading cloud storage platform with more than 250 million users and 1000
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …

Caveat Implementor! Key Recovery Attacks on MEGA

MR Albrecht, M Haller, L Mareková… - … Conference on the Theory …, 2023 - Springer
MEGA is a large-scale cloud storage and communication platform that aims to provide end-
to-end encryption for stored data. A recent analysis by Backendal, Haller and Paterson …

Janus: Fast privacy-preserving data provenance for TLS 1.3

J Lauinger, J Ernstberger, A Finkenzeller… - Cryptology ePrint …, 2023 - eprint.iacr.org
Web users can gather data from secure endpoints and demonstrate the provenance of
sensitive data to any third party by using privacy-preserving TLS oracles. In practice, privacy …

Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security

R Takeuchi, Y Todo, T Iwata - IACR Transactions on Symmetric …, 2024 - tosc.iacr.org
This paper examines the security of Rocca, an authenticated encryption algorithm designed
for Beyond 5G/6G contexts. Rocca has been revised multiple times in the initialization and …

The indifferentiability of the duplex and its practical applications

JP Degabriele, M Fischlin, J Govinden - … on the Theory and Application of …, 2023 - Springer
The Duplex construction, introduced by Bertoni et al.(SAC 2011), is the Swiss Army knife of
permutation-based cryptography. It can be used to realise a variety of cryptographic objects …