Student seminar

     Archives: [2026] [2025] [2024] [2023] [2022] [2021] [2020] [2019] [List of Speakers]

Upcoming Event(s)


[print]
Student Seminar
Date:2026-03-04
Location:M290/online
Schedule: 
14:00Deep Inder Mohan (Georgia Tech):
Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM
Abstract: The Fuchsbauer, Kiltz, and Loss (CRYPTO 2018) claim that (some) hardness results in the algebraic group model imply the same hardness results in the generic group model was recently called into question by Katz, Zhang, and Zhou (ASIACRYPT 2022). The latter gave an interpretation of the claim under which it is incorrect. We give an alternate interpretation under which it is correct, using natural frameworks for capturing generic and algebraic models for arbitrary algebraic structures. Most algebraic analyses in the literature can be captured by our frameworks, making the claim correct for them.

[print]
Student Seminar
Date:2026-02-18
Location:M290/online
Schedule: 
14:00Eugenio Paracucchi (CISPA Helmholtz Center for Information Security):
Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions
Abstract: Blind signatures are fundamental cryptographic primitives enabling privacy-preserving authentication and have seen renewed interest in the post-quantum literature. Existing efficient constructions predominantly rely on Fischlin’s generic paradigm instantiated over lattice assumptions, while blinding techniques for sigma-protocol-based blind signatures remain sparse beyond lattices. Moreover, achieving provable concurrent security under polynomially many sessions has been a longstanding open challenge for this approach in the post-quantum literature as evidenced by the recent attacks in EC’24 and PKC’24. This work broadens the landscape of post-quantum blind signatures by introducing novel techniques and proposing four frameworks based on general cryptographic group actions, without requiring commutativity. Our constructions admit instantiations under diverse post-quantum assumptions, including CSIDH (isogeny-based), LESS (code-based, NIST round-two), and more. These frameworks offer flexible trade-offs in assumptions (from interactive one-more to the standard inversion problem) and key/signature sizes, and culminate in a construction that achieves security under polynomially many concurrent sessions. This enables the first efficient blind signatures from isogenies and codes with provable concurrent security with 4.5 and 64.7 KB respectively. We also outline several directions for optimization and further instantiations for future work.

Past 2026 Event(s)


2026-02-04Student Seminar
  • Valentina Frasca (University of Catania): On the (Un)biasability of Existing Verifiable Random Functions
2026-01-28Student Seminar
  • Pierre Briaud (CNRS, University of Limoges): The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
2026-01-21Student Seminar
  • Yuxi Zheng (EPFL): How to Prove Post-Quantum Security for Succinct Non-Interactive Reductions
2026-01-14Student Seminar
  • Jesko Dujmnovic (Northeastern University and Boston University): When Simple Permutations Mix Poorly
2026-01-07Student Seminar
  • Kewen Wu (School of Mathematics at the Institute for Advanced Study): No exponential quantum speedup for SIS∞ anymore
0.00926s c