Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption

R Chen, X Huang, M Yung - … 2020: 26th International Conference on the …, 2020 - Springer
Motivated by the currently widespread concern about mass surveillance of encrypted
communications, Bellare et al. introduced at CRYPTO 2014 the notion of Algorithm …

Practical algorithm substitution attacks on real-world public-key cryptosystems

H Jiang, J Han, Z Zhang, Z Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The revelations about massive surveillance have created significant interest in algorithm
substitution attack (ASA), where an honest implementation of a cryptographic primitive is …

Subversion-resistant simulation (knowledge) sound NIZKs

K Baghery - Cryptography and Coding: 17th IMA International …, 2019 - Springer
Abstract In ASIACRYPT 2016, Bellare, Fuchsbauer and Scafuro studied security of non-
interactive zero-knowledge (NIZK) arguments in the face of parameter subversion. They …

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

S Chakraborty, C Ganesh, P Sarkar - … on the Theory and Applications of …, 2023 - Springer
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …

Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model

K Baghery, M Sedaghat - … Conference on Cryptology and Network Security, 2021 - Springer
Zk-SNARKs, as the most efficient NIZK arguments in terms of proof size and verification, are
ubiquitously deployed in practice. In applications like Hawk [S&P'16], Gyges [CCS'16] …

Cryptographic reverse firewalls for interactive proof systems

C Ganesh, B Magri, D Venturi - Theoretical Computer Science, 2021 - Elsevier
We study interactive proof systems (IPSes) in a strong adversarial setting where the
machines of honest parties might be corrupted and under control of the adversary. Our aim …

Public immunization against complete subversion without random oracles

G Ateniese, D Francati, B Magri, D Venturi - Applied Cryptography and …, 2019 - Springer
We seek constructions of general-purpose immunizers that take arbitrary cryptographic
primitives, and transform them into ones that withstand a powerful “malicious but proud” …

Reverse firewalls for adaptively secure MPC without setup

S Chakraborty, C Ganesh, M Pancholi… - … Conference on the Theory …, 2021 - Springer
We study Multi-party computation (MPC) in the setting of subversion, where the adversary
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …

[HTML][HTML] Subversion-resilient signatures: Definitions, constructions and applications

G Ateniese, B Magri, D Venturi - Theoretical Computer Science, 2020 - Elsevier
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …

Steganography-Free Zero-Knowledge

B Abdolmaleki, N Fleischhacker, V Goyal… - Theory of Cryptography …, 2022 - Springer
We revisit the well-studied problem of preventing steganographic communication in multi-
party communications. While this is known to be a provably impossible task, we propose a …