diff --git a/ACNS/presentation/generalsss.tex b/ACNS/presentation/generalsss.tex new file mode 100644 index 0000000000000000000000000000000000000000..807e2a96f8b5a1c556a725f26e0d0bbc2ee56629 --- /dev/null +++ b/ACNS/presentation/generalsss.tex @@ -0,0 +1,4 @@ + +\section{General Access Structures and Secret Sharing Schemes} +\begin{frame} +\end{frame} diff --git a/ACNS/presentation/key_exchange.tex b/ACNS/presentation/key_exchange.tex new file mode 100644 index 0000000000000000000000000000000000000000..87ca35125b2c95017f34d109bfb5ce37c86794e7 --- /dev/null +++ b/ACNS/presentation/key_exchange.tex @@ -0,0 +1,4 @@ + +\section{Actively Secure Key Exchange} +\begin{frame} +\end{frame} diff --git a/ACNS/presentation/main.tex b/ACNS/presentation/main.tex index c9eba663c5f4bc87a31a8dea0da3911c1e406812..85e1df67ff56f32c39954bad77d2a81c89846371 100644 --- a/ACNS/presentation/main.tex +++ b/ACNS/presentation/main.tex @@ -20,9 +20,17 @@ \begin{document} \maketitle -\section{Motivation} -\begin{frame} -\end{frame} +\input{motivation} + +\input{key_exchange} +\input{signatures} +\input{generalsss} + +\section{References} +\begin{frame}[allowframebreaks] + \bibliographystyle{amsalpha} + \bibliography{pqc} +\end{frame} \end{document} diff --git a/ACNS/presentation/motivation.tex b/ACNS/presentation/motivation.tex new file mode 100644 index 0000000000000000000000000000000000000000..eb09918da7ed6797544009ce048686f54d638330 --- /dev/null +++ b/ACNS/presentation/motivation.tex @@ -0,0 +1,82 @@ +\section{Motivation} + +\begin{frame} + \frametitle{Where are we?} + \begin{block}{Hard Homogeneous Spaces} + A hard homogeneous space \(\left(\mathcal E,\mathcal G\right)\) is + \begin{itemize} + \item a set \(\mathcal E\), + \item a group \(\left(\mathcal G,\odot\right)\) and + \item an action \(\ast: \mathcal G\times \mathcal E \to \mathcal E\) + \end{itemize} + \end{block} + + \pause + \begin{block}{Properties of \(\ast\)} + \begin{itemize} + \item Compatibility: \(\forall g,g' \in \mathcal G ~\forall E \in \mathcal E \colon g \ast \left(g'\ast E\right) = \left(g\odot g'\right) E\) + \item Identity: \(\forall E \in \mathcal E \colon i \ast E = E \Leftrightarrow i\) is the neutral element in \(\mathcal G\) + \item Transitivity: \(\forall E,E'\in \mathcal E ~\exists ! g \in \mathcal G \colon g \ast E = E'\) + \end{itemize} + \end{block} +\end{frame} + +\begin{frame} + \frametitle{Key Exchange Mechanisms} + + \begin{center} + \begin{tikzpicture} + \begin{scope}[minimum size = .7cm] + \node [alice] (alice) at (-3,0){Alice}; + \node [bob] (bob) at (3,0){Bob}; + \end{scope} + \pause + \node [left = .5 of alice] (pair) {$\left(\sk,\pk\right)$}; + %\node [above = 3 of alice] (pk) {$\pk$}; + %\draw [->] (alice) -- (pk); + \pause + \node [above = 2.5 of bob] (encaps) {$\encaps \paren* \pk$}; + \node [above = 0.5 of bob] (keybob) {$\key$}; + \node [above = 2.5 of alice] (cipher) {$c$}; + \draw [->] (encaps) -- (cipher); + \draw [->] (encaps) -- (keybob); + \pause + + \node [above = 1.5 of alice] (decaps) {$\decaps\paren *{\sk,c}$}; + \draw [->] (cipher) -- (decaps); + + \node [above = 0.5 of alice] (keyalice) {$\key$}; + \draw [->] (decaps) -- (keyalice); + + \pause + \node [draw, red, inner sep = -.1em, shape = rectangle, fit=(decaps)] {}; + \end{tikzpicture} + \end{center} +\end{frame} + +\begin{frame} + \frametitle{A Decapsulation Protocol with Shared Secret Key \cite{FeoM20}} + + \begin{center} + \begin{tikzpicture} + \def\radius{2.5cm} + \begin{scope}[minimum size = .7cm] + \node [charlie] (sh1) at (40:3cm) {$s_1$}; + \node [dave](sh2) at (140:3cm){$s_2$}; + \node [maninblack] (sh3) at (220:3cm){$s_3$}; + \node [physician] (sh4) at (320:3cm){$s_4$}; + + \node (sk) at (0,0) {$\sk$}; + \draw [help lines] (sk) edge (sh1) edge (sh2) edge (sh3) edge (sh4); + + \pause + \node [right=of sh1] (cipher) {$c$}; + \coordinate [left = of sh2] (bla) ; + \draw [->] (cipher) -- (sh1); + + \end{scope} + \end{tikzpicture} + \end{center} + +\end{frame} + diff --git a/ACNS/presentation/pqc.bib b/ACNS/presentation/pqc.bib new file mode 100644 index 0000000000000000000000000000000000000000..ef8162863c8d648a0566a14336435d9242e4c38f --- /dev/null +++ b/ACNS/presentation/pqc.bib @@ -0,0 +1,493 @@ +@inproceedings{DBLP:conf/crypto/DonFMS19, + author = {Jelle Don and + Serge Fehr and + Christian Majenz and + Christian Schaffner}, + editor = {Alexandra Boldyreva and + Daniele Micciancio}, + title = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle + Model}, + booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International + Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, + Proceedings, Part {II}}, + series = {Lecture Notes in Computer Science}, + volume = {11693}, + pages = {356--383}, + publisher = {Springer}, + year = {2019}, + url = {https://doi.org/10.1007/978-3-030-26951-7\_13}, + doi = {10.1007/978-3-030-26951-7\_13}, + timestamp = {Fri, 09 Apr 2021 18:35:29 +0200}, + biburl = {https://dblp.org/rec/conf/crypto/DonFMS19.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/eurocrypt/BonnetainS20, + author = {Xavier Bonnetain and + Andr{\'{e}} Schrottenloher}, + editor = {Anne Canteaut and + Yuval Ishai}, + title = {Quantum Security Analysis of {CSIDH}}, + booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International + Conference on the Theory and Applications of Cryptographic Techniques, + Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, + series = {Lecture Notes in Computer Science}, + volume = {12106}, + pages = {493--522}, + publisher = {Springer}, + year = {2020}, + url = {https://doi.org/10.1007/978-3-030-45724-2\_17}, + timestamp = {Mon, 04 May 2020 14:35:02 +0200}, + biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/eurocrypt/Peikert20, + author = {Chris Peikert}, + editor = {Anne Canteaut and + Yuval Ishai}, + title = {He Gives C-Sieves on the {CSIDH}}, + booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International + Conference on the Theory and Applications of Cryptographic Techniques, + Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, + series = {Lecture Notes in Computer Science}, + volume = {12106}, + pages = {463--492}, + publisher = {Springer}, + year = {2020}, + url = {https://doi.org/10.1007/978-3-030-45724-2\_16}, + timestamp = {Mon, 04 May 2020 14:35:02 +0200}, + biburl = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@misc{Brandao_Davidson_Vassilev_2020, +title={{NIST roadmap toward criteria for threshold schemes for cryptographic primitives}}, +url={http://dx.doi.org/10.6028/NIST.IR.8214A}, +institution={National Institute of Standards and Technology}, +author={Brandao, Luis T A N and Davidson, Michael and Vassilev, Apostol}, +year={2020}, +month={Jul} } + +@inproceedings{DBLP:conf/ccs/LindellN18, + author = {Yehuda Lindell and + Ariel Nof}, + editor = {David Lie and + Mohammad Mannan and + Michael Backes and + XiaoFeng Wang}, + title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation + and Applications to Cryptocurrency Custody}, + booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and + Communications Security, {CCS} 2018, Toronto, ON, Canada, October + 15-19, 2018}, + pages = {1837--1854}, + publisher = {{ACM}}, + year = {2018}, + url = {https://doi.org/10.1145/3243734.3243788}, + timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, + biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@article{DBLP:journals/iacr/Couveignes06, + author = {Jean Marc Couveignes}, + title = {Hard Homogeneous Spaces}, + journal = {{IACR} Cryptol. ePrint Arch.}, + pages = {291}, + year = {2006}, + url = {http://eprint.iacr.org/2006/291}, + timestamp = {Mon, 11 May 2020 16:00:12 +0200}, + biburl = {https://dblp.org/rec/journals/iacr/Couveignes06.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + + +@inproceedings{DBLP:conf/pqcrypto/CozzoS20, + author = {Daniele Cozzo and + Nigel P. Smart}, + editor = {Jintai Ding and + Jean{-}Pierre Tillich}, + title = {Sashimi: Cutting up {CSI-FiSh} Secret Keys to Produce an Actively Secure + Distributed Signing Protocol}, + booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto + 2020, Paris, France, April 15-17, 2020, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {12100}, + pages = {169--186}, + publisher = {Springer}, + year = {2020}, + url = {{https://doi.org/10.1007/978-3-030-44223-1\_10}}, + timestamp = {Mon, 04 May 2020 13:23:15 +0200}, + biburl = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/asiacrypt/BeullensKV19, + author = {Ward Beullens and + Thorsten Kleinjung and + Frederik Vercauteren}, + editor = {Steven D. Galbraith and + Shiho Moriai}, + title = {{CSI-FiSh:} Efficient Isogeny Based Signatures Through Class Group Computations}, + booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference + on the Theory and Application of Cryptology and Information Security, + Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, + series = {Lecture Notes in Computer Science}, + volume = {11921}, + pages = {227--247}, + publisher = {Springer}, + year = {2019}, + url = {{https://doi.org/10.1007/978-3-030-34578-5\_9}}, + timestamp = {Tue, 26 Nov 2019 14:13:27 +0100}, + biburl = {https://dblp.org/rec/conf/asiacrypt/BeullensKV19.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + + +@inproceedings{DBLP:conf/ima/CozzoS19, + author = {Daniele Cozzo and + Nigel P. Smart}, + editor = {Martin Albrecht}, + title = {Sharing the {LUOV:} Threshold Post-quantum Signatures}, + booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} + 2019, Oxford, UK, December 16-18, 2019, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {11929}, + pages = {128--153}, + publisher = {Springer}, + year = {2019}, + url = {https://doi.org/10.1007/978-3-030-35199-1\_7}, + timestamp = {Thu, 19 Dec 2019 09:27:27 +0100}, + biburl = {https://dblp.org/rec/conf/ima/CozzoS19.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + + +@inproceedings{DBLP:conf/africacrypt/TraversoD018, + author = {Giulia Traverso and + Denise Demirel and + Johannes Buchmann}, + editor = {Antoine Joux and + Abderrahmane Nitaj and + Tajjeeddine Rachidi}, + title = {Performing Computations on Hierarchically Shared Secrets}, + booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference + on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {10831}, + pages = {141--161}, + publisher = {Springer}, + year = {2018}, + url = {{https://doi.org/10.1007/978-3-319-89339-6\_9}}, + timestamp = {Tue, 14 May 2019 10:00:52 +0200}, + biburl = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/icits/TraversoDB16, + author = {Giulia Traverso and + Denise Demirel and + Johannes Buchmann}, + editor = {Anderson C. A. Nascimento and + Paulo S. L. M. Barreto}, + title = {Dynamic and Verifiable Hierarchical Secret Sharing}, + booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} + 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, + series = {Lecture Notes in Computer Science}, + volume = {10015}, + pages = {24--43}, + year = {2016}, + url = {https://doi.org/10.1007/978-3-319-49175-2\_2}, + timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, + biburl = {https://dblp.org/rec/conf/icits/TraversoDB16.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/fc/HerranzS03, + author = {Javier Herranz and + Germ{\'{a}}n S{\'{a}}ez}, + editor = {Rebecca N. Wright}, + title = {Verifiable Secret Sharing for General Access Structures, with Application + to Fully Distributed Proxy Signatures}, + booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, + French West Indies, January 27-30, 2003, Revised Papers}, + series = {Lecture Notes in Computer Science}, + volume = {2742}, + pages = {286--302}, + publisher = {Springer}, + year = {2003}, + url = {{https://doi.org/10.1007/978-3-540-45126-6\_21}}, + timestamp = {Tue, 14 May 2019 10:00:38 +0200}, + biburl = {https://dblp.org/rec/conf/fc/HerranzS03.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/eurocrypt/Stadler96, + author = {Markus Stadler}, + editor = {Ueli M. Maurer}, + title = {Publicly Verifiable Secret Sharing}, + booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference + on the Theory and Application of Cryptographic Techniques, Saragossa, + Spain, May 12-16, 1996, Proceeding}, + series = {Lecture Notes in Computer Science}, + volume = {1070}, + pages = {190--199}, + publisher = {Springer}, + year = {1996}, + url = {https://doi.org/10.1007/3-540-68339-9\_17}, + timestamp = {Tue, 14 May 2019 10:00:53 +0200}, + biburl = {https://dblp.org/rec/conf/eurocrypt/Stadler96.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/crypto/Pedersen91, + author = {Torben P. Pedersen}, + editor = {Joan Feigenbaum}, + title = {Non-Interactive and Information-Theoretic Secure Verifiable Secret + Sharing}, + booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology + Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {576}, + pages = {129--140}, + publisher = {Springer}, + year = {1991}, + url = {{https://doi.org/10.1007/3-540-46766-1\_9}}, + timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, + biburl = {https://dblp.org/rec/conf/crypto/Pedersen91.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/asiacrypt/BackesKP11, + author = {Michael Backes and + Aniket Kate and + Arpita Patra}, + editor = {Dong Hoon Lee and + Xiaoyun Wang}, + title = {Computational Verifiable Secret Sharing Revisited}, + booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference + on the Theory and Application of Cryptology and Information Security, + Seoul, South Korea, December 4-8, 2011. Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {7073}, + pages = {590--609}, + publisher = {Springer}, + year = {2011}, + url = {https://doi.org/10.1007/978-3-642-25385-0\_32}, + timestamp = {Tue, 14 May 2019 10:00:40 +0200}, + biburl = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/ccs/BethKO93, + author = {Thomas Beth and + Hans{-}Joachim Knobloch and + Marcus Otten}, + editor = {Dorothy E. Denning and + Raymond Pyle and + Ravi Ganesan and + Ravi S. Sandhu and + Victoria Ashby}, + title = {Verifiable Secret Sharing for Monotone Access Structures}, + booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and + Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, + pages = {189--194}, + publisher = {{ACM}}, + year = {1993}, + url = {https://doi.org/10.1145/168588.168612}, + timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, + biburl = {https://dblp.org/rec/conf/ccs/BethKO93.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/tcc/Tassa04, + author = {Tamir Tassa}, + editor = {Moni Naor}, + title = {Hierarchical Threshold Secret Sharing}, + booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} + 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {2951}, + pages = {473--490}, + publisher = {Springer}, + year = {2004}, + url = {{https://doi.org/10.1007/978-3-540-24638-1\_26}}, + timestamp = {Tue, 14 May 2019 10:00:47 +0200}, + biburl = {https://dblp.org/rec/conf/tcc/Tassa04.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@article{DBLP:journals/iacr/Thorbek09, + author = {Rune Thorbek}, + title = {Proactive Linear Integer Secret Sharing}, + journal = {{IACR} Cryptol. ePrint Arch.}, + pages = {183}, + year = {2009}, + url = {http://eprint.iacr.org/2009/183}, + timestamp = {Mon, 11 May 2020 15:58:29 +0200}, + biburl = {https://dblp.org/rec/journals/iacr/Thorbek09.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/pkc/DamgardT06, + author = {Ivan Damg{\aa}rd and + Rune Thorbek}, + editor = {Moti Yung and + Yevgeniy Dodis and + Aggelos Kiayias and + Tal Malkin}, + title = {Linear Integer Secret Sharing and Distributed Exponentiation}, + booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference + on Theory and Practice of Public-Key Cryptography, New York, NY, USA, + April 24-26, 2006, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {3958}, + pages = {75--90}, + publisher = {Springer}, + year = {2006}, + url = {{https://doi.org/10.1007/11745853\_6}}, + timestamp = {Fri, 01 May 2020 18:32:25 +0200}, + biburl = {https://dblp.org/rec/conf/pkc/DamgardT06.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DBLP:conf/pqcrypto/BeullensDPV21, + author = {Ward Beullens and + Lucas Disson and + Robi Pedersen and + Frederik Vercauteren}, + editor = {Jung Hee Cheon and + Jean{-}Pierre Tillich}, + title = {{CSI-RAShi:} Distributed Key Generation for {CSIDH}}, + booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto + 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {12841}, + pages = {257--276}, + publisher = {Springer}, + year = {2021}, + url = {{https://doi.org/10.1007/978-3-030-81293-5\_14}}, + timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, + biburl = {https://dblp.org/rec/conf/pqcrypto/BeullensDPV21.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + + +@Article{Shamir:1979:HSS, + author = {Adi Shamir}, + title = {How to Share a Secret}, + journal = {Commun. {ACM}}, + volume = {22}, + number = {11}, + pages = {612--613}, + year = {1979}, + url = {http://doi.acm.org/10.1145/359168.359176}, + timestamp = {Wed, 14 Nov 2018 10:22:34 +0100}, + biburl = {https://dblp.org/rec/journals/cacm/Shamir79.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@InProceedings{Blakley:1979:SCK, + author = "G. R. Blakley", + title = "Safeguarding cryptographic keys", + editor = "Richard E. Merwin and Jacqueline T. Zanca and Merlin. + Smith", + booktitle = "1979 National Computer Conference: June 4--7, 1979, + New York, New York", + volume = "48", + publisher = "AFIPS Press", + address = "pub-AFIPS:adr", + series = "AFIPS Conference proceedings", + pages = "313--317", + year = "1979", + bibdate = "Fri Nov 20 15:54:39 MST 1998", + bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib", + acknowledgement = "Nelson H. F. Beebe, University of Utah, Department + of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake + City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 + 801 581 4148, e-mail: \path|beebe@math.utah.edu|, + \path|beebe@acm.org|, \path|beebe@computer.org| + (Internet), URL: + \path|http://www.math.utah.edu/~beebe/|", + referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL}, + \cite[Ref. 2]{Gemmell:1997:ITC}.", + xxauthor = "R. Blakley", +} + +@inproceedings{LindellN18, + author = {Yehuda Lindell and + Ariel Nof}, + editor = {David Lie and + Mohammad Mannan and + Michael Backes and + XiaoFeng Wang}, + title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation + and Applications to Cryptocurrency Custody}, + booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and + Communications Security, {CCS} 2018, Toronto, ON, Canada, October + 15-19, 2018}, + pages = {1837--1854}, + publisher = {{ACM}}, + year = {2018}, + url = {https://doi.org/10.1145/3243734.3243788}, + timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, + biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DoernerKLS19, + author = {Jack Doerner and + Yashvanth Kondi and + Eysa Lee and + Abhi Shelat}, + title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case}, + booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, + CA, USA, May 19-23, 2019}, + pages = {1051--1066}, + publisher = {{IEEE}}, + year = {2019}, + url = {https://doi.org/10.1109/SP.2019.00024}, + timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, + biburl = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{DoernerKLS18, + author = {Jack Doerner and + Yashvanth Kondi and + Eysa Lee and + Abhi Shelat}, + title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions}, + booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, + 21-23 May 2018, San Francisco, California, {USA}}, + pages = {980--997}, + publisher = {{IEEE} Computer Society}, + year = {2018}, + url = {https://doi.org/10.1109/SP.2018.00036}, + timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, + biburl = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{FeoM20, + author = {Luca De Feo and + Michael Meyer}, + editor = {Aggelos Kiayias and + Markulf Kohlweiss and + Petros Wallden and + Vassilis Zikas}, + title = {Threshold Schemes from Isogeny Assumptions}, + booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference + on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, + May 4-7, 2020, Proceedings, Part {II}}, + series = {Lecture Notes in Computer Science}, + volume = {12111}, + pages = {187--212}, + publisher = {Springer}, + year = {2020}, + url = {{https://doi.org/10.1007/978-3-030-45388-6\_7}}, + timestamp = {Fri, 22 May 2020 21:56:39 +0200}, + biburl = {https://dblp.org/rec/conf/pkc/FeoM20.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} diff --git a/ACNS/presentation/preamble.tex b/ACNS/presentation/preamble.tex index bc5a108dbff7e1c2693180fa72fbedef9c9d0e0b..d5a23e870ee716013315c445bbc914ebadee63a6 100644 --- a/ACNS/presentation/preamble.tex +++ b/ACNS/presentation/preamble.tex @@ -11,7 +11,7 @@ \newcommand\assignTo[2]{#1 \leftarrow #2} %\usepackage{todonotes} %remove for submission %\let\labelindent\relax -\usepackage{enumitem} +%\usepackage{enumitem} \usepackage[english]{babel} \usepackage[utf8]{inputenc} \usepackage{amsmath} @@ -43,7 +43,8 @@ \usepackage{hyphenat} \usepackage{tikz} -\usetikzlibrary{calc,arrows,intersections, through,positioning, matrix} +\usetikzlibrary{arrows,calc,fit, matrix,intersections,positioning, through} +\usepackage{tikzpeople} \usepackage{tcolorbox} %\usepackage{titlesec} diff --git a/ACNS/presentation/signatures.tex b/ACNS/presentation/signatures.tex new file mode 100644 index 0000000000000000000000000000000000000000..abbe11a0ad315a428541a54b988cba82aecda6eb --- /dev/null +++ b/ACNS/presentation/signatures.tex @@ -0,0 +1,4 @@ + +\section{Deriving a Signature Scheme} +\begin{frame} +\end{frame}