Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
- research-articleAugust 2024
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun
New Generation Computing (NEWG), Volume 42, Issue 3Pages 449–477https://doi.org/10.1007/s00354-024-00274-1AbstractA zero-knowledge proof (ZKP) allows a prover to prove to a verifier that it knows some secret, such as a solution to a difficult puzzle, without revealing any information about it. In recent years, ZKP protocols using only a deck of playing cards ...
- research-articleJuly 2024
Transferable, Auditable and Anonymous Ticketing Protocol
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1911–1927https://doi.org/10.1145/3634737.3645008Digital ticketing systems typically offer ticket purchase, refund, validation, and, optionally, anonymity of users. However, it would be interesting for users to transfer their tickets, as is currently done with physical tickets. We propose Applause, a ...
- research-articleOctober 2023
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality
AbstractWe consider swarms of luminous myopic opaque robots that run in synchronous Look-Compute-Move cycles. These robots have no global compass, but agree on a common chirality. In this context, we propose optimal solutions to the perpetual exploration ...
Highlights- Exploring a finite grid is not possible with only two disoriented oblivious robots.
- Exploring a finite grid is not possible with only three disoriented oblivious robots and visibility range 1.
- Exploring a finite grid is possible ...
-
- research-articleOctober 2023
Perpetual torus exploration by myopic luminous robots
AbstractWe study perpetual torus exploration for swarms of autonomous, anonymous, uniform, and luminous robots. We consider robots with only few capabilities. They have a finite limited vision (myopic), they can only see robots at distance one or two. We ...
Highlights- We define the perpetual exploration problem on Torus graphs by simple mobile robots.
- We prove that the problem is not solvable with only two robots with limited visibility.
- We give optimal algorithms under visibility 1 and 2, and ...
- research-articleSeptember 2023
Physical ZKP protocols for Nurimisaki and Kurodoko
AbstractProving to someone else the knowledge of a secret without revealing any of its information is an interesting feature in cryptography. The best solution to solve this problem is a Zero-Knowledge Proof (ZKP) protocol.
...
- ArticleAugust 2023
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun
Advances in Information and Computer SecurityPages 255–272https://doi.org/10.1007/978-3-031-41326-1_14AbstractA zero-knowledge proof (ZKP) allows a party to prove to another party that it knows some secret, such as the solution to a difficult puzzle, without revealing any information about it. We propose a physical zero-knowledge proof using only a deck ...
- research-articleAugust 2023
SAMBA: a generic framework for secure federated multi-armed bandits (extended abstract)
IJCAI '23: Proceedings of the Thirty-Second International Joint Conference on Artificial IntelligenceArticle No.: 772, Pages 6863–6867https://doi.org/10.24963/ijcai.2023/772We tackle the problem of secure cumulative reward maximization in multi-armed bandits in a cross-silo federated learning setting. Under the orchestration of a central server, each data owner participating at the cumulative reward computation has the ...
- research-articleAugust 2023
How fast do you heal?: a taxonomy for post-compromise security in secure-channel establishment
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 331, Pages 5917–5934Post-Compromise Security (PCS) is a property of secure-channel establishment schemes, which limits the security breach of an adversary that has compromised one of the end-point to a certain number of messages, after which the channel heals. An attractive ...
- research-articleMay 2023
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring
- Loïc Crombez,
- Guilherme D. Da Fonseca,
- Florian Fontan,
- Yan Gerard,
- Aldo Gonzalez-Lorenzo,
- Pascal Lafourcade,
- Luc Libralesso,
- Benjamin Momège,
- Jack Spalding-Jamieson,
- Brandon Zhang,
- Da Wei Zheng
ACM Journal of Experimental Algorithmics (JEA), Volume 28Article No.: 1.2, Pages 1–13https://doi.org/10.1145/3588869CG:SHOP is an annual geometric optimization challenge and the 2022 edition proposed the problem of coloring a certain geometric graph defined by line segments. Surprisingly, the top three teams used the same technique, called conflict optimization. This ...
- ArticleDecember 2023
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside
AbstractTrick-taking games are traditional card games played all over the world. There are many such games, and most of them can be played online through dedicated applications, either for fun or for betting money. However, these games have an intrinsic ...
- research-articleJune 2023
Generic Privacy Preserving Private Permissioned Blockchains
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 1585–1592https://doi.org/10.1145/3555776.3577735Private permissioned blockchains are becoming gradually more sought-after. Such systems are reachable by authorized users, and tend to be completely transparent to whoever interacts with the blockchain. In this paper, we mitigate the latter. Authorized ...
- research-articleJune 2023
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 1558–1565https://doi.org/10.1145/3555776.3577680The verification of computations performed by an untrusted server is a cornerstone for delegated computations, especially in multi-clients setting where inputs are provided by different parties. Assuming a common secret between clients, a garbled circuit ...
- research-articleMarch 2023
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 2Pages 1378–1389https://doi.org/10.1109/TDSC.2022.3154585The stochastic multi-armed bandit is a classical reinforcement learning model, where a learning agent sequentially chooses an action (pull a bandit arm) and the environment responds with a stochastic reward drawn from an unknown distribution associated ...
- research-articleJanuary 2023
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits
We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks dutifully, but tries to gain ...
- ArticleApril 2023
- ArticleJanuary 2023
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric
AbstractRecent works to improve privacy in permissioned blockchains like Hyperledger Fabric rely on Idemix, the only anonymous credential system that has been integrated to date. The current Idemix implementation in Hyperledger Fabric (v2.4) only supports ...
- ArticleJanuary 2023
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
AbstractAttack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an ...
- ArticleNovember 2022
Card-Based ZKP Protocol for Nurimisaki
Stabilization, Safety, and Security of Distributed SystemsPages 285–298https://doi.org/10.1007/978-3-031-21017-4_19AbstractProving to someone else the knowledge of a secret without revealing any of its information is an interesting feature in cryptography. The best solution to solve this problem is a Zero-Knowledge Proof (ZKP) protocol.
Nurimisaki is a Nikoli puzzle. ...