I'm excited to dig into the paper! The result is really surprising. Does it imply that you could be key exchange concretely just using something like SHA and argue that its security is based on "standard assumptions" of SHA being an RO?
Or is the construction from the RO un-instantiable somehow?
26.01.2026 01:53
π 2
π 0
π¬ 0
π 0
Most schools have already finished accepting applications, but the door is still open to come to Stevens!! If you know anyone who already has their materials together, they have almost 2 more weeks to submit an application!
02.01.2026 22:51
π 2
π 2
π¬ 0
π 0
Fully-funded PhD Students
I'm looking for PhD students to join me at Stevens!! Please spread the word to anyone looking for an opportunity right across from NYC to research:
* secure data structures (e.g., PIR/ORAM)
* cryptography for AI-related applications (e.g., watermarking, steganography)
13.11.2025 19:44
π 0
π 1
π¬ 0
π 1
Are there good resources to understand concrete limits of steganography in terms of the entropy, false positive rates, support size, etc of both the covertext distribution and the steganographic output distribution?
Ideally, something which uses something like cryptographic syntax too
08.08.2025 18:44
π 1
π 0
π¬ 0
π 0
The Worst Page on the Internet
Neal Agarwal distills digital life to its essence.
βWhen everything on the internet demands attention, paying attention to anything becomes impossible.β @yair-rosenberg.bsky.social unpacks one game creatorβs quest to rescue the internetβs promise from its present:
27.01.2025 13:15
π 89
π 20
π¬ 2
π 4
What exactly is the debate over then? lol
03.01.2025 15:48
π 0
π 0
π¬ 0
π 0
What's the best way to get used to iO tricks in proofs? Just read a bunch of papers?
I've gotten used to some Sahai-Waters ideas, but I feel far away from being able to use iO creatively to prove something new
03.01.2025 15:46
π 0
π 0
π¬ 0
π 0
Is this latest achievement really such an impactful tipping point? I feel like we shouldn't consider completely shifting policy approaches until we move beyond language models as AGI candidates
24.12.2024 15:50
π 1
π 0
π¬ 0
π 0
I just meant the statement "Each iteration should have ~10% chance to find an unsorted pair," which I don't think it true.
My algorithm should work on that specific instance, though, because about 1/4 of the (i,j) pairs are unsorted. (I'm not picking them consecutively)
15.12.2024 00:53
π 0
π 0
π¬ 1
π 0
After reading the solution, I see why this doesn't work β the statement was not just not obvious, it was in fact false
14.12.2024 16:01
π 0
π 0
π¬ 1
π 0
Repeat k~log n times:
choose 2 random indices i < j
if a[i] > a[j] return "unsorted"
return "sorted"
I think the above would work? Each iteration should have ~10% chance to find an unsorted pair (maybe not obvious), so only error with .9^k < 1/poly(n)
14.12.2024 15:56
π 0
π 0
π¬ 1
π 0
EncryptedSystems.org
If youβre curious about the design and analysis of encrypted algorithms and encrypted databases, Iβm putting together a collection of resources at encryptedsystems.org
03.12.2024 16:02
π 49
π 19
π¬ 2
π 1
Iβd be interested to see kills divided number of encounters - I feel like thatβs a better gauge for what to be worried about
24.11.2024 03:17
π 14
π 0
π¬ 3
π 0
Abstract. In this paper, we construct new t-server Private Information Retrieval (PIR) schemes with communication complexity subpolynomial in the previously best known, for all but finitely many t. Our results are based on combining derivatives (in the spirit of Woodruff-Yekhanin) with the Matching Vector based PIRs of Yekhanin and Efremenko. Previously such a combination was achieved in an ingenious way by Dvir and Gopi, using polynomials and derivatives over certain exotic rings, en route to their fundamental result giving the first 2-server PIR with subpolynomial communication.
Our improved PIRs are based on two ingredients:
β’ We develop a new and direct approach to combine derivatives with Matching Vector based PIRs. This approach is much simpler than that of Dvir-Gopi: it works over the same field as the original PIRs, and only uses elementary properties of polynomials and derivatives.
β’ A key subproblem that arises in the above approach is a higher-order polynomial interpolation problem. We show how βsparse S-decoding polynomialsβ, a powerful tool from the original constructions of Matching Vector PIRs, can be used to solve this higher-order polynomial interpolation problem using surprisingly few higer-order evaluations.
Using the known sparse S-decoding polynomials in combination with our ideas leads to our improved PIRs. Notably, we get a 3-server PIR scheme with communication 2^(O^(βΌ)((logn)^(1/3))), improving upon the previously best known communication of $2^{O^\sim( \sqrt{\log n})}$ due to Efremenko.
Image showing part 2 of abstract.
Improved PIR Schemes using Matching Vectors and Derivatives (Fatemeh Ghasemi, Swastik Kopparty, Madhu Sudan) ia.cr/2024/1885
22.11.2024 05:12
π 4
π 2
π¬ 0
π 0
Are these from public posts on Venmo? I didn't think they reveal the amount of money transferred
21.11.2024 19:46
π 1
π 0
π¬ 1
π 0
End-to-End Encryption Is a Critical National Security Tool
Law enforcement and national security officials have fought end-to-end encryption for decadesβbut the technology is more needed than ever.
"For decades, technologists have been making the point that the strongest and best form of communications security is provided by end-to-end encryption; it is well past time for law enforcement to embrace its widespread public use," writes Susan Landau.
21.11.2024 19:17
π 64
π 12
π¬ 1
π 0
Thatβs a cool result! Is there a bound on the runtime of the simulator in terms of the runtime of A?
21.11.2024 12:02
π 0
π 0
π¬ 2
π 0
i started refactoring a bunch of code and then halfway through i changed my mind - i hadn't commited π
19.11.2024 14:49
π 12
π 1
π¬ 0
π 0
ππ»
19.11.2024 13:40
π 1
π 0
π¬ 0
π 0
I just recently started cryptology.city!
I think it could be a useful resource for the cryptology-curious! I drew a lot of inspiration from the Complexity Zoo, which I have personally liked.
Happy to hear ideas on how to tailor the site for crypto though!
05.07.2024 14:49
π 4
π 0
π¬ 0
π 0
Abstract. A zero-bit watermarked language model produces text that is indistinguishable from that of the underlying model, but which can be detected as machine-generated using a secret key. Unfortunately, merely detecting AI-generated spam, say, as watermarked may not prevent future abuses. If we could additionally trace the text to a spammerβs API token or account, we could then cut off their access or pursue legal action.
We introduce multi-user watermarks, which allow tracing model-generated text to individual users or to groups of colluding users. We construct multi-user watermarking schemes from undetectable zero-bit watermarking schemes. Importantly, our schemes provide both zero-bit and multi-user assurances at the same time: detecting shorter snippets just as well as the original scheme, and tracing longer excerpts to individuals. Along the way, we give a generic construction of a watermarking scheme that embeds long messages into generated text.
Ours are the first black-box reductions between watermarking schemes for language models. A major challenge for black-box reductions is the lack of a unified abstraction for robustness β that marked text is detectable even after edits. Existing works give incomparable robustness guarantees, based on bespoke requirements on the language modelβs outputs and the usersβ edits. We introduce a new abstraction to overcome this challenge, called AEB-robustness. AEB-robustness provides that the watermark is detectable whenever the edited text βapproximates enough blocksβ of model-generated output. Specifying the robustness condition amounts to defining approximates, enough, and blocks. Using our new abstraction, we relate the robustness properties of our message-embedding and multi-user schemes to that of the underlying zero-bit scheme, in a black-box way. Whereas prior works only guarantee robustness for a single text generated in response to a single prompt, our schemes are robust against adaptive prompting, a stronger and more natural adversarial model.
Image showing part 2 of abstract.
Enhancing Watermarked Language Models to Identify Users (Aloni Cohen, Alexander Hoover, Gabe Schoenbach) ia.cr/2024/759
20.05.2024 03:20
π 8
π 4
π¬ 0
π 0
I think proofs are great! Even from uncertain assumptions, reductions give us a better understanding of what maybe true and lets us build cool new things
If we were truly stuck waiting for proofs, cryptography wouldn't exist as it does today
01.05.2024 20:19
π 0
π 0
π¬ 0
π 0
Abstract. Structured Encryption (StE) enables a client to securely store and query data stored on an untrusted server. Recent constructions of StE have moved beyond basic queries, and now support large subsets of SQL. However, the security of these constructions is poorly understood, and no systematic analysis has been performed.
We address this by providing the first leakage-abuse attacks against StE for SQL schemes. Our attacks can be run by a passive adversary on a server with access to some information about the distribution of underlying data, a common model in prior work. They achieve partial query recovery against select operations and partial plaintext recovery against join operations. We prove the optimality and near-optimality of two new attacks, in a Bayesian inference framework. We complement our theoretical results with an empirical investigation testing the performance of our attacks against real-world data and show they can successfully recover a substantial proportion of queries and plaintexts.
In addition to our new attacks, we provide proofs showing that the conditional optimality of a previously proposed leakage-abuse attack and that inference against join operations is NP-hard in general.
Image showing part 2 of abstract.
Leakage-Abuse Attacks Against Structured Encryption for SQL (Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song) ia.cr/2024/554
10.04.2024 15:56
π 2
π 1
π¬ 1
π 0
Exactly! The comments like the above are what came up when I was searching, but itβs not what I mean by βa signed punβ
18.03.2024 13:43
π 1
π 0
π¬ 1
π 0
Do users of signed languages use/have a concept similar to the spoken notion of puns? Like mixing or replacing similar signs as a joke
#linguistics
17.03.2024 22:54
π 5
π 0
π¬ 2
π 0
This was a cool paper to see posted! Iβve been curious about this problem for a while now, and it seems like itβs mostly solved
27.02.2024 22:25
π 5
π 0
π¬ 0
π 0
Abstract. We study single-server private information retrieval (PIR) where a client wishes to privately retrieve the x-th entry from a database held by a server without revealing the index x. In our work, we focus on PIR with client pre-processing where the client may compute hints during an offline phase. The hints are then leveraged during queries to obtain sub-linear online time. We present Plinko that is the first single-server PIR with client pre-processing that obtains optimal trade-offs between client storage and query time for all parameters. Our scheme uses tβ=βOΜ(n/r) query time for any client storage size r. This matches known lower bounds of rβ
β
β
tβ=βΞ©(n) up to logarithmic factors for all parameterizations whereas prior works could only match the lower bound when $r = \tilde{O}(\sqrt{n})$. Moreover, Plinko is also the first updateable PIR scheme where an entry can be updated in worst-case OΜ(1) time.
As our main technical tool, we define the notion of an invertible pseudorandom function (iPRF) that generalizes standard PRFs to be equipped with an efficient inversion algorithm. We present a construction of an iPRF from one-way functions where forward evaluation runs in OΜ(1) time and inversion runs in time linear in the inverse set (output) size. Furthermore, our iPRF construction is the first that remains efficient and secure for arbitrary domain and range sizes (including small domains and ranges). In the context of single-server PIR, we show that iPRFs may be used to construct the first hint set representation where finding a hint containing an entry x may be done in OΜ(1) time.
Image showing part 2 of abstract.
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs (Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo) ia.cr/2024/318
26.02.2024 03:09
π 1
π 1
π¬ 0
π 0
STOC Accepted Papers
http://acm-stoc.org/...
19.02.2024 22:32
π 1
π 2
π¬ 0
π 0