557 lines
27 KiB
BibTeX
557 lines
27 KiB
BibTeX
@misc{
|
||
eatsleeput.com_2022,
|
||
title={{EatSleepUT}},
|
||
url={https://eatsleeput.com/},
|
||
author={EatSleepUT.com},
|
||
year={2022},
|
||
month={Feb},
|
||
note={Archive: https://archive.ph/Gp0Ou}
|
||
}
|
||
|
||
@misc{cohen_2017, title={BitTorrent.org}, url={https://www.bittorrent.org/beps/bep_0003.html}, journal={bep_0003.rst_post}, author={Cohen, Bram}, year={2017}, month={Feb}}
|
||
|
||
@InProceedings{10.1007/3-540-48285-7_24,
|
||
author="Benaloh, Josh
|
||
and de Mare, Michael",
|
||
editor="Helleseth, Tor",
|
||
title="One-Way Accumulators: A Decentralized Alternative to Digital Signatures",
|
||
booktitle="Advances in Cryptology --- EUROCRYPT '93",
|
||
year="1994",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="274--285",
|
||
abstract="This paper describes a simple candidate one-way hash function which satisfies a quasi-commutative property that allows it to be used as an accumulator. This property allows protocols to be developed in which the need for a trusted central authority can be eliminated. Space-efficient distributed protocols are given for document time stamping and for membership testing, and many other applications are possible.",
|
||
isbn="978-3-540-48285-7"
|
||
}
|
||
|
||
@INPROCEEDINGS{6956581,
|
||
author={Ben Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars},
|
||
booktitle={2014 IEEE Symposium on Security and Privacy},
|
||
title={Zerocash: Decentralized Anonymous Payments from Bitcoin},
|
||
year={2014},
|
||
volume={},
|
||
number={},
|
||
pages={459-474},
|
||
doi={10.1109/SP.2014.36}}
|
||
|
||
@article{doi:10.1137/0220068,
|
||
author = {Blum, Manuel and De Santis, Alfredo and Micali, Silvio and Persiano, Giuseppe},
|
||
title = {Noninteractive Zero-Knowledge},
|
||
journal = {SIAM Journal on Computing},
|
||
volume = {20},
|
||
number = {6},
|
||
pages = {1084-1118},
|
||
year = {1991},
|
||
doi = {10.1137/0220068},
|
||
URL = {https://doi.org/10.1137/0220068},
|
||
eprint = {https://doi.org/10.1137/0220068},
|
||
abstract = { This paper investigates the possibility of disposing of interaction between prover and verifier in a zero-knowledge proof if they share beforehand a short random string.Without any assumption, it is proven that noninteractive zero-knowledge proofs exist for some number-theoretic languages for which no efficient algorithm is known.If deciding quadratic residuosity (modulo composite integers whose factorization is not known) is computationally hard, it is shown that the NP-complete language of satisfiability also possesses noninteractive zero-knowledge proofs. }
|
||
}
|
||
|
||
@article{RABIN1983256,
|
||
title = {Transaction protection by beacons},
|
||
journal = {Journal of Computer and System Sciences},
|
||
volume = {27},
|
||
number = {2},
|
||
pages = {256-267},
|
||
year = {1983},
|
||
issn = {0022-0000},
|
||
doi = {https://doi.org/10.1016/0022-0000(83)90042-9},
|
||
url = {https://www.sciencedirect.com/science/article/pii/0022000083900429},
|
||
author = {Michael O. Rabin},
|
||
abstract = {Protocols for implementing contract signing, confidential disclosures, and certified mail in an electronic mail system are proposed. These transactions are provably impossible without a trusted intermediary. However, they can be implemented with just a small probability of a participant cheating his partner, by use of a beacon emitting random integers. Applications include privacy protection of personal information in data banks, as well as the protection of business transactions.}
|
||
}
|
||
|
||
@InProceedings{merkle,
|
||
author="Merkle, Ralph C.",
|
||
editor="Pomerance, Carl",
|
||
title="A Digital Signature Based on a Conventional Encryption Function",
|
||
booktitle="Advances in Cryptology --- CRYPTO '87",
|
||
year="1988",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="369--378",
|
||
abstract="A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the underlying encryption function -- the security does not depend on the difficulty of factoring and the high computational costs of modular arithmetic are avoided. The signature system can sign an unlimited number of messages, and the signature size increases logarithmically as a function of the number of messages signed. Signature size in a `typical' system might range from a few hundred bytes to a few kilobytes, and generation of a signature might require a few hundred to a few thousand computations of the underlying conventional encryption function.",
|
||
isbn="978-3-540-48184-3"
|
||
}
|
||
|
||
@InProceedings{10.1007/978-3-642-02384-2_17,
|
||
author="Maurer, Ueli",
|
||
editor="Preneel, Bart",
|
||
title="Unifying Zero-Knowledge Proofs of Knowledge",
|
||
booktitle="Progress in Cryptology -- AFRICACRYPT 2009",
|
||
year="2009",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="272--286",
|
||
abstract="We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr's protocol for proving knowledge of a discrete logarithm, the Fiat-Shamir and Guillou-Quisquater protocols for proving knowledge of a modular root, protocols for proving knowledge of representations (like Okamoto's protocol), protocols for proving equality of secret values, a protocol for proving the correctness of a Diffie-Hellman key, protocols for proving the multiplicative relation of three commitments (as required in secure multi-party computation), and protocols used in credential systems.",
|
||
isbn="978-3-642-02384-2"
|
||
}
|
||
|
||
@misc{monero,
|
||
author = {Monero Research Lab},
|
||
title = {What is {Monero} ({XMR})?}
|
||
howpublished = {\url{https://www.getmonero.org/get-started/what-is-monero/}}
|
||
}
|
||
|
||
@misc{zcash,
|
||
author = {Electric Coin Company},
|
||
organization = {Electric Coin Company},
|
||
title = {{Zcash Basics -- Zcash Documentation}},
|
||
howpublished = {\url{https://zcash.readthedocs.io/en/latest/rtd_pages/basics.html}}
|
||
}
|
||
|
||
@article{10.1145/116825.116852,
|
||
author = {Goldreich, Oded and Micali, Silvio and Wigderson, Avi},
|
||
title = {Proofs That Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems},
|
||
year = {1991},
|
||
issue_date = {July 1991},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {38},
|
||
number = {3},
|
||
issn = {0004-5411},
|
||
url = {https://doi.org/10.1145/116825.116852},
|
||
doi = {10.1145/116825.116852},
|
||
journal = {J. ACM},
|
||
month = {jul},
|
||
pages = {690–728},
|
||
numpages = {39},
|
||
keywords = {interactive proofs, methodological design of protocols, graph isomorphism, zero-knowledge, one-way functions, proof systems, cryptographic protocols, NP, fault tolerant distributed computing}
|
||
}
|
||
|
||
@article{mohr2007survey,
|
||
title={A survey of zero-knowledge proofs with applications to cryptography},
|
||
author={Mohr, Austin},
|
||
journal={Southern Illinois University, Carbondale},
|
||
pages={1--12},
|
||
year={2007}
|
||
}
|
||
|
||
@Inbook{Shamir1981,
|
||
author="Shamir, Adi
|
||
and Rivest, Ronald L.
|
||
and Adleman, Leonard M.",
|
||
title="Mental Poker",
|
||
bookTitle="The Mathematical Gardner",
|
||
year="1981",
|
||
publisher="Springer US",
|
||
address="Boston, MA",
|
||
pages="37--43",
|
||
abstract="Can two potentially dishonest players play a fair game of poker without using any cards---for example, over the phone? This paper provides the following answers:1No. (Rigorous mathematical proof supplied.)2Yes. (Correct and complete protocol given.)",
|
||
isbn="978-1-4684-6686-7",
|
||
doi="10.1007/978-1-4684-6686-7_5",
|
||
url="https://doi.org/10.1007/978-1-4684-6686-7_5"
|
||
}
|
||
|
||
@article{blum1983coin,
|
||
title={Coin flipping by telephone a protocol for solving impossible problems},
|
||
author={Blum, Manuel},
|
||
journal={ACM SIGACT News},
|
||
volume={15},
|
||
number={1},
|
||
pages={23--27},
|
||
year={1983},
|
||
publisher={ACM New York, NY, USA}
|
||
}
|
||
|
||
@InProceedings{blindsig,
|
||
author="Chaum, David",
|
||
editor="Chaum, David
|
||
and Rivest, Ronald L.
|
||
and Sherman, Alan T.",
|
||
title="Blind Signatures for Untraceable Payments",
|
||
booktitle="Advances in Cryptology",
|
||
year="1983",
|
||
publisher="Springer US",
|
||
address="Boston, MA",
|
||
pages="199--203",
|
||
abstract="Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the new electronic payments system may have a substantial impact on personal privacy as well as on the nature and extent of criminal use of payments. Ideally a new payments system should address both of these seemingly conflicting sets of concerns.",
|
||
isbn="978-1-4757-0602-4"
|
||
}
|
||
|
||
@article{bellare2003one,
|
||
title={The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.},
|
||
author={Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael},
|
||
journal={Journal of Cryptology},
|
||
volume={16},
|
||
number={3},
|
||
year={2003},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@inproceedings{sander1999auditable,
|
||
title={Auditable, anonymous electronic cash},
|
||
author={Sander, Tomas and Ta-Shma, Amnon},
|
||
booktitle={Annual International Cryptology Conference},
|
||
pages={555--572},
|
||
year={1999},
|
||
organization={Springer}
|
||
}
|
||
|
||
@InProceedings{10.1007/978-3-540-89255-7_15,
|
||
author="Camenisch, Jan
|
||
and Chaabouni, Rafik
|
||
and shelat, abhi",
|
||
editor="Pieprzyk, Josef",
|
||
title="Efficient Protocols for Set Membership and Range Proofs",
|
||
booktitle="Advances in Cryptology - ASIACRYPT 2008",
|
||
year="2008",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="234--252",
|
||
abstract="We consider the following problem: Given a commitment to a value $\sigma$, prove in zero-knowledge that $\sigma$ belongs to some discrete set $\Phi$. The set $\Phi$ can perhaps be a list of cities or clubs; often $\Phi$ can be a numerical range such as [1,220]. This problem arises in e-cash systems, anonymous credential systems, and various other practical uses of zero-knowledge protocols.",
|
||
isbn="978-3-540-89255-7"
|
||
}
|
||
|
||
@inproceedings{paillier1999public,
|
||
title={Public-key cryptosystems based on composite degree residuosity classes},
|
||
author={Paillier, Pascal},
|
||
booktitle={International conference on the theory and applications of cryptographic techniques},
|
||
pages={223--238},
|
||
year={1999},
|
||
organization={Springer}
|
||
}
|
||
|
||
@phdthesis{groth2004honest,
|
||
title={Honest verifier zero-knowledge arguments applied},
|
||
author={Groth, Jens},
|
||
year={2004},
|
||
school={BRICS}
|
||
}
|
||
|
||
@manual{random(4),
|
||
title = "random, urandom - kernel random number source devices",
|
||
year = "2017",
|
||
organization = "Linux man-pages project",
|
||
month = "September",
|
||
}
|
||
|
||
@InProceedings{fhe,
|
||
author="Gentry, Craig
|
||
and Sahai, Amit
|
||
and Waters, Brent",
|
||
editor="Canetti, Ran
|
||
and Garay, Juan A.",
|
||
title="Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based",
|
||
booktitle="Advances in Cryptology -- CRYPTO 2013",
|
||
year="2013",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="75--92",
|
||
abstract="We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication is a complicated and expensive step involving ``relinearization''. In this work, we propose a new technique for building FHE schemes that we call the approximate eigenvector method. In our scheme, for the most part, homomorphic addition and multiplication are just matrix addition and multiplication. This makes our scheme both asymptotically faster and (we believe) easier to understand.",
|
||
isbn="978-3-642-40041-4"
|
||
}
|
||
|
||
|
||
@InProceedings{fiatshamir,
|
||
author="Fiat, Amos
|
||
and Shamir, Adi",
|
||
editor="Odlyzko, Andrew M.",
|
||
title="How To Prove Yourself: Practical Solutions to Identification and Signature Problems",
|
||
booktitle="Advances in Cryptology --- CRYPTO' 86",
|
||
year="1987",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="186--194",
|
||
abstract="In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack if factoring is difficult, and typical implementations require only 1{\%} to 4{\%} of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control systems.",
|
||
isbn="978-3-540-47721-1"
|
||
}
|
||
|
||
@misc{tc39,
|
||
author = {TC39},
|
||
title = {BigInt: Arbitrary precision integers in JavaScript},
|
||
year = {2020},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/tc39/proposal-bigint}},
|
||
}
|
||
|
||
@misc{lzstring,
|
||
author = {Pieroxy},
|
||
title = {lz-string: LZ-based compression algorithm for JavaScript},
|
||
year = {2013},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/pieroxy/lz-string}},
|
||
}
|
||
|
||
@misc{ipfs,
|
||
author = {IPFS},
|
||
title = {IPFS Specifications},
|
||
year = {2023},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/ipfs/specs}},
|
||
}
|
||
|
||
@misc{unciv,
|
||
author = {Morgenstern, Yair},
|
||
title = {Unciv - {Civ V} remake for {Android} \& {Desktop}},
|
||
year = {2023},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/yairm210/Unciv}},
|
||
}
|
||
|
||
@misc{msgpack,
|
||
author = {msgpack},
|
||
title = {{MessagePack}: Spec},
|
||
year = {2021},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/msgpack/msgpack}},
|
||
}
|
||
|
||
@misc{jssha,
|
||
author = {Brian Turek},
|
||
title = {{jsSHA: A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family}},
|
||
year = {2022},
|
||
publisher = {GitHub},
|
||
journal = {GitHub repository},
|
||
howpublished = {\url{https://github.com/Caligatio/jsSHA}},
|
||
}
|
||
|
||
@article{RABIN1980128,
|
||
title = {Probabilistic algorithm for testing primality},
|
||
journal = {Journal of Number Theory},
|
||
volume = {12},
|
||
number = {1},
|
||
pages = {128-138},
|
||
year = {1980},
|
||
issn = {0022-314X},
|
||
doi = {https://doi.org/10.1016/0022-314X(80)90084-0},
|
||
url = {https://www.sciencedirect.com/science/article/pii/0022314X80900840},
|
||
author = {Michael O Rabin},
|
||
abstract = {We present a practical probabilistic algorithm for testing large numbers of arbitrary form for primality. The algorithm has the feature that when it determines a number composite then the result is always true, but when it asserts that a number is prime there is a provably small probability of error. The algorithm was used to generate large numbers asserted to be primes of arbitrary and special forms, including very large numbers asserted to be twin primes. Theoretical foundations as well as details of implementation and experimental results are given.}
|
||
}
|
||
|
||
@article{damgard2003,
|
||
author = {Damgård, Ivan and Jurik, Mads and Nielsen, Jesper},
|
||
year = {2003},
|
||
month = {04},
|
||
pages = {371-385},
|
||
title = {A generalization of Paillier’s public-key system with applications to electronic voting},
|
||
volume = {9},
|
||
journal = {International Journal of Information Security},
|
||
doi = {10.1007/s10207-010-0119-9}
|
||
}
|
||
|
||
@book{schneier_1996, place={Estados Unidos}, title={Applied cryptography}, publisher={John Wiley}, author={Schneier, Bruce}, year={1996}}
|
||
|
||
@article{Shor_1997,
|
||
doi = {10.1137/s0097539795293172},
|
||
|
||
url = {https://doi.org/10.1137%2Fs0097539795293172},
|
||
|
||
year = 1997,
|
||
month = {oct},
|
||
|
||
publisher = {Society for Industrial {\&} Applied Mathematics ({SIAM})},
|
||
|
||
volume = {26},
|
||
|
||
number = {5},
|
||
|
||
pages = {1484--1509},
|
||
|
||
author = {Peter W. Shor},
|
||
|
||
title = {Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer},
|
||
|
||
journal = {{SIAM} Journal on Computing}
|
||
}
|
||
|
||
@inproceedings{Boudot2000EfficientPT,
|
||
title={Efficient Proofs that a Committed Number Lies in an Interval},
|
||
author={Fabrice Boudot},
|
||
booktitle={International Conference on the Theory and Application of Cryptographic Techniques},
|
||
year={2000}
|
||
}
|
||
|
||
@misc{
|
||
projectgemini,
|
||
title={{Project Gemini}: Speculative specification},
|
||
url={gemini://gemini.circumlunar.space/docs/specification.gmi},
|
||
journal={Project gemini},
|
||
author={Solderpunk},
|
||
year={2022}
|
||
}
|
||
|
||
@techreport{FIPS202,
|
||
author = {National Institute of Standards and Technology},
|
||
title = {SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions},
|
||
institution = {U.S. Department of Commerce},
|
||
address= {Washington, D.C.},
|
||
DOI = {10.6028/NIST.FIPS.202},
|
||
year = {2015},
|
||
}
|
||
|
||
@inproceedings{Jurik2003ExtensionsTT,
|
||
title={Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols},
|
||
author={Mads Jurik},
|
||
year={2003},
|
||
booktitle={{BRICS} Dissertation Series}
|
||
}
|
||
|
||
@inproceedings{10.1145/3485832.3485842,
|
||
author = {Ma, Huanyu and Han, Shuai and Lei, Hao},
|
||
title = {Optimized Paillier’s Cryptosystem with Fast Encryption and Decryption},
|
||
year = {2021},
|
||
isbn = {9781450385794},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/3485832.3485842},
|
||
doi = {10.1145/3485832.3485842},
|
||
abstract = {In this paper, we propose a new optimization for the Paillier’s additively homomorphic encryption scheme (Eurocrypt’99). At the heart of our optimization is a well-chosen subgroup of the underlying , which is used as the randomness space for masking messages during encryption. The size of the subgroup is significantly smaller than that of , leading to faster encryption and decryption algorithms of our optimization. We establish the one-wayness and semantic security of our optimized Paillier scheme upon those of an optimization (i.e., “Scheme 3”) made by Paillier in Eurocrypt’99. Thus, our optimized scheme is one-way under the partial discrete logarithm (PDL) assumption, and is semantically secure under the decisional PDL (DPDL) assumption. On the other hand, we present a detailed analysis on the concrete security of our optimized scheme under several known methods. To provide 112-bit security, our analysis suggests that a 2048-bit modulus N and a well-chosen subgroup of size 448-bit would suffice. We compare our optimization with existing optimized Paillier schemes, including the Jurik’s optimization proposed by Jurik in his Ph.D. thesis and the Paillier’s optimization in Eurocrypt’99. Our experiments show that, – the encryption of our optimization is about 2.7 times faster than that of the Jurik’s optimization and is about 7.5 times faster than that of the Paillier’s optimization; – the decryption of our optimization is about 4.1 times faster than that of the Jurik’s optimization and has a similar performance with that of the Paillier’s optimization.},
|
||
booktitle = {Annual Computer Security Applications Conference},
|
||
pages = {106–118},
|
||
numpages = {13},
|
||
keywords = {public-key encryption, homomorphic encryption, optimization, provable security},
|
||
location = {Virtual Event, USA},
|
||
series = {ACSAC '21}
|
||
}
|
||
|
||
@inproceedings{10.1145/2809695.2809723,
|
||
author = {Shafagh, Hossein and Hithnawi, Anwar and Droescher, Andreas and Duquennoy, Simon and Hu, Wen},
|
||
title = {Talos: Encrypted Query Processing for the Internet of Things},
|
||
year = {2015},
|
||
isbn = {9781450336314},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2809695.2809723},
|
||
doi = {10.1145/2809695.2809723},
|
||
abstract = {The Internet of Things, by digitizing the physical world, is envisioned to enable novel interaction paradigms with our surroundings. This creates new threats and leads to unprecedented security and privacy concerns. To tackle these concerns, we introduce Talos, a system that stores IoT data securely in a Cloud database while still allowing query processing over the encrypted data. We enable this by encrypting IoT data with a set of cryptographic schemes such as order-preserving and partially homomorphic encryption. In order to achieve this in constrained IoT devices, Talos relies on optimized algorithms that accelerate order-preserving and partially homomorphic encryption by 1 to 2 orders of magnitude. We assess the feasibility of Talos on low-power devices with and without cryptographic accelerators and quantify its overhead in terms of energy, computation, and latency. With a thorough evaluation of our prototype implementation, we show that Talos is a practical system that can provide a high level of security with a reasonable overhead. We envision Talos as an enabler of secure IoT applications.},
|
||
booktitle = {Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems},
|
||
pages = {197–210},
|
||
numpages = {14},
|
||
keywords = {homomorphic encryption, cloud computing, data security, internet of things, computing on encrypted data},
|
||
location = {Seoul, South Korea},
|
||
series = {SenSys '15}
|
||
}
|
||
|
||
@article{ecma2024262,
|
||
title={{ECMAScript} 2024 Language Specification},
|
||
author={ECMA},
|
||
journal={ECMA (European Association for Standardizing Information and Communication Systems), pub-ECMA: adr,},
|
||
url = {https://tc39.es/ecma262}
|
||
year={1999}
|
||
}
|
||
|
||
@inproceedings{bcdg1987,
|
||
author = {Brickell, Ernest F. and Chaum, David and Damg\r{a}rd, Ivan and Graaf, Jeroen van de},
|
||
title = {Gradual and Verifiable Release of a Secret},
|
||
year = {1987},
|
||
isbn = {3540187960},
|
||
publisher = {Springer-Verlag},
|
||
address = {Berlin, Heidelberg},
|
||
abstract = {Protocols are presented allowing someone with a secret discrete logarithm to release it, bit by bit, such that anyone can verify each bit's correctness as they receive it. This new notion of release of secrets generalizes and extends that of the already known exchange of secrets protocols. Consequently, the protocols presented allow exchange of secret discrete logs between any number of parties.The basic protocol solves an even more general problem than that of releasing a discrete log. Given any instance of a discrete log problem in a group with public group operation, the party who knows the solution can make public some interval I and convince anyone that the solution belongs to I , while releasing no additional information, such as any hint as to where in I the solution is.This can be used directly to release a discrete log, or to transfer it securely between different groups, i.e. prove that two instances are related such that knowledge of the solution to one implies knowledge of the solution to the other.We show how this last application can be used to implement a more efficient release protocol by transferring the given discrete log instance to a group with special properties. In this scenario, each bit of the secret can be verified by a single modular squaring, and unlike the direct use of the basic protocol, no interactive proofs are needed after the basic setup has been done.Finally, it is shown how the basic protocol can be used to release the factorization of a public composite number.},
|
||
booktitle = {A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology},
|
||
pages = {156–166},
|
||
numpages = {11},
|
||
series = {CRYPTO '87}
|
||
}
|
||
|
||
@InProceedings{randomoracle,
|
||
author="Pointcheval, David
|
||
and Stern, Jacques",
|
||
editor="Maurer, Ueli",
|
||
title="Security Proofs for Signature Schemes",
|
||
booktitle="Advances in Cryptology --- EUROCRYPT '96",
|
||
year="1996",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="387--398",
|
||
abstract="In this paper, we address the question of providing security proofs for signature schemes in the so-called random oracle model [1]. In particular, we establish the generality of this technique against adaptively chosen message attacks. Our main application achieves such a security proof for a slight variant of the El Gamal signature scheme [4] where committed values are hashed together with the message. This is a rather surprising result since the original El Gamal is, as RSA [11], subject to existential forgery.",
|
||
isbn="978-3-540-68339-1"
|
||
}
|
||
|
||
@inproceedings {wasm,
|
||
author = {Abhinav Jangda and Bobby Powers and Emery D. Berger and Arjun Guha},
|
||
title = {Not So Fast: Analyzing the Performance of {WebAssembly} vs. Native Code},
|
||
booktitle = {2019 USENIX Annual Technical Conference (USENIX ATC 19)},
|
||
year = {2019},
|
||
isbn = {978-1-939133-03-8},
|
||
address = {Renton, WA},
|
||
pages = {107--120},
|
||
url = {https://www.usenix.org/conference/atc19/presentation/jangda},
|
||
publisher = {USENIX Association},
|
||
month = jul,
|
||
}
|
||
|
||
@INPROCEEDINGS{upnp,
|
||
author={Esnaashari, Shadi and Welch, Ian and Komisarczuk, Peter},
|
||
booktitle={2013 27th International Conference on Advanced Information Networking and Applications Workshops},
|
||
title={Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks},
|
||
year={2013},
|
||
volume={},
|
||
number={},
|
||
pages={725-729},
|
||
doi={10.1109/WAINA.2013.225}}
|
||
|
||
@phdthesis{bulletproofs,
|
||
author = {Hasan, Jahid and Xu, Minghai},
|
||
year = {2020},
|
||
month = {06},
|
||
pages = {},
|
||
title = {Bulletproofs: A Non-Interactive Zero Knowledge Proof Protocol For Blockchain Security}
|
||
}
|
||
|
||
@article{bittorrent2008,
|
||
author = {Williams, Christopher},
|
||
date = {2008-06-02},
|
||
title = {{UK cops arrest six alleged BitTorrent music uploaders}},
|
||
journal = {The Register},
|
||
url = {https://www.theregister.com/2008/06/02/onk_further_arrests},
|
||
urldate = {2008-06-02}
|
||
}
|
||
|
||
@misc{bch,
|
||
author = {Bitcoin Cash},
|
||
title = {{Bitcoin Cash -- Peer-to-peer Electronic Cash}},
|
||
howpublished = {\url{https://bitcoincash.org}}
|
||
}
|
||
|
||
@misc{epic,
|
||
author = {{Epic Games}},
|
||
title = {Epic is turning off online services for some older games},
|
||
howpublished = {https://www.epicgames.com/site/en-US/news/epic-is-turning-off-online-services-and-servers-for-some-older-games}}
|
||
|
||
@article{bitcoin08,
|
||
author = {Nakamoto, Satoshi},
|
||
year = {2008},
|
||
month = {10},
|
||
pages = {},
|
||
title = {Bitcoin: A Peer-to-Peer Electronic Cash System},
|
||
journal = {Cryptography Mailing list at https://metzdowd.com}
|
||
}
|
||
|
||
@article{bitcoindeanon,
|
||
author = {Bohannon, John},
|
||
title = {Why criminals can't hide behind {Bitcoin}},
|
||
year = {2016},
|
||
month = {03},
|
||
day = {09},
|
||
howpublished = {\url{https://www.science.org/content/article/why-criminals-cant-hide-behind-bitcoin}}
|
||
}
|
||
|
||
@misc{slsk,
|
||
author = {"Nir"},
|
||
title = {Frequently Asked Questions | Soulseek},
|
||
howpublished = {\url{http://www.soulseekqt.net/news/faq-page#t10n606}}
|
||
}
|
||
|
||
@misc{mozdoc,
|
||
author = {Mozilla},
|
||
title = {{JavaScript} language overview},
|
||
howpublished = {\url{https://developer.mozilla.org/en-US/docs/Web/JavaScript/Language_Overview}}}
|
||
|
||
@misc{matrix,
|
||
author = {{Matrix Spec Core Team}},
|
||
title = {{Matrix Specification}},
|
||
howpublished = {\url{https://spec.matrix.org/latest}}}
|
||
|
||
@misc{xmpp,
|
||
author = {XMPP},
|
||
title = {XMPP Specifications},
|
||
howpublished = {\url{https://xmpp.org/extensions/}}} |