Newest Questions
32,058 questions
0
votes
0
answers
14
views
Modular binomial exponent manipulation and assumption of coprimality
I was looking a problem around a system of modular binomials that are:
When I hit a point I couldn't go further I found out on internet what a person did and could not understand what he did with an ...
0
votes
1
answer
61
views
Is Homomorphic Encryption constructed like a Header?
New to homomorphic encryption here... but are there fields in homomorphic encryption (like headers) where each field has a unique key? For example, suppose I have $4$ fields $<a> <b> <c&...
1
vote
0
answers
19
views
Two related question on MQ cryptosystems
Is it true that MQ is very hard when the number of equations ($m$) equals the number of unknowns ($n$)? According to https://eprint.iacr.org/2010/596.pdf , this is true going by the mentions of:
... ...
7
votes
2
answers
674
views
Strength of AES when 32-bits of the 128-bit key are known?
This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
0
votes
0
answers
23
views
Is this PRF + nullifier + signature construction secure for one-time tokens in a non-currency setting?
I am designing a non-currency protocol that enforces one anonymous action per legitimate purchase (in my case: one review per purchase). I would like to sanity-check the following construction built ...
1
vote
1
answer
46
views
ML-DSA without lattice
Community convention remainder first: no cryptanalysis request on full scheme barring able to formulate questions on specific building blocks, so here it goes:
Q: Suppose we replace the matrix ...
3
votes
0
answers
37
views
Use of symmetric remainder (balanced mod) to eliminate branching in polynomial additions for lattice-based cryptography: prior art/known limitations?
I have been exploring a formulation of integer division where the remainder is taken from the symmetric interval:
$$[−⌊d/2⌋,⌊d/2⌋]$$
instead of the classical interval:
$$[0,d)$$
Mathematically this is ...
2
votes
1
answer
588
views
Why can't you reverse engineer a valid ML-DSA secret key from a public key?
ML-DSA works using vectors and matrices of polynomials. Each polynomial has coefficients in a finite field $\mathbb{F}_q$ - This group of polynomials is a ring denoted $R_q$.
Matrix-vector ...
4
votes
1
answer
265
views
Why doesn't Learning With Errors use pseudoinverses?
The goal behind solving Learning with Errors (LWE) is to solve a system of equations modulo q with a small, random error. My thought is that because these equations would have a solution outside the ...
1
vote
0
answers
60
views
What is the real philosophical (geometric) reason for using a (discrete) Gaussian distribution for errors in the LWE problem?
I've stumbled upon a PhD thesis, "Smoothening Functions and the Homomorphism Learning Problem" [Ruzi-Lopez, Waterloo2020].
Before coming across this thesis, I thought (discrete) Gaussian ...
0
votes
0
answers
45
views
Universal one-way function from Rule 110 cellular automaton?
Are you aware of any examples of universal one-way function construction using a cellular automaton (for instance Turing-complete Rule 110) or of any sufficiently strong cryptographic hash function ...
1
vote
1
answer
23
views
Can one call transition of tables from unencrypted to encrypted state in MariaDB using the file_key_management plugin key rotation?
In MariaDB it is possible to apply data-at-rest encryption using a plugin called file_key_management. This plugin uses a plain text file containing one ore more keys which are ids assigned like this (...
2
votes
0
answers
26
views
Two hole hidden number problem, calculating the limits of solvability
I'm a bit stuck on the problem mentioned in the title. It seems from the ctf writeup that I am going through and trying to understand.
Here is the link for the in depth explanation:
https://ctftime....
3
votes
0
answers
68
views
What's the point of the X-Wing hybrid KEM?
As I understand it, X-Wing is an optimisation over GHP18, in which it is proven in Lemma 3 that there exists standard notion PRF, when used as KEM combiner, the resulting KEM will not be IND-CCA ...
2
votes
0
answers
44
views
Why ABY3 achieves 4k communications in semi-honest setting and 11k communications in malicious setting?
I read the ABY3 paper. First of all, I noticed that the labels for "malicious" and "semi-honest" are swapped Table 2.
Additionally, I don’t understand why ABY3 achieves 4k ...