CryptoDB
Behzad Abdolmaleki
Publications and invited talks
    Year
  
  
    Venue
  
  
    Title
  
    2025
  
  
    CIC
  
  
    On Quantum Simulation-Soundness
            
      Abstract    
    
<p>  Non-interactive zero-knowledge (NIZK) proof systems are a cornerstone of   modern cryptography, but their security has received little attention in the   quantum settings.   Motivated by improving our understanding of this fundamental primitive against   quantum adversaries, we propose a new definition of security against quantum   adversary.   Specifically, we define the notion of quantum simulation soundness (SS-NIZK),   that allows the adversary to access the simulator in superposition.</p><p>  We show a separation between post-quantum and quantum security of SS-NIZK, and   prove that Sahai’s construction for SS-NIZK (in the CRS model) can be made   quantumly-simulation-sound.   As an immediate application of our new notion, we prove the security of the   Naor-Yung paradigm in the quantum settings, with respect to a strong quantum   IND-CCA security notion.   This provides the quantum analogue of the classical dual key approach to prove   the security of encryption schemes.   Along the way, we introduce a new notion of quantum-query advantage functions,   which may be used as a general framework to show classical/quantum separation   for other cryptographic primitives, and it may be of independent interest. </p>
  
    2025
  
  
    ASIACRYPT
  
  
    Universally Composable Password-Hardened Encryption
            
      Abstract    
    
Password-Hardened Encryption (PHE) protects against offline brute-force attacks by involving an external ratelimiter that enforces rate-limited decryption without learning passwords or keys. Threshold Password-Hardened Encryption (TPHE), introduced by Brost et al. (CCS’20), distributes this trust among multiple ratelimiters. Despite its promise, the security foundations of TPHE remain unclear. We make three contributions:
(1) We uncover a flaw in the proof of Brost et al.’s TPHE scheme, which invalidates its claimed security and leaves the guarantees of existing constructions uncertain;
(2) We provide the first universal composability (UC) formalization of PHE and TPHE, unifying previous fragmented models and supporting key rotation, an essential feature for long-term security and related primitives such as updatable encryption;
(3) We present the first provably secure TPHE scheme, which is both round-optimal and UC-secure, thus composable in real-world settings; and we implement and evaluate our protocol, demonstrating practical efficiency that outperforms prior work in realistic WAN scenarios.
  
    2023
  
  
    ASIACRYPT
  
  
    Two-Round Concurrent 2PC from Sub-Exponential LWE
            
      Abstract    
    
Secure computation is a cornerstone of modern cryptography and a rich body of research is devoted to understanding its round complexity. In this work, we consider two-party computation (2PC) protocols (where both parties receive output) that remain secure in the realistic setting where many instances of the protocol are executed in parallel (concurrent security). We obtain a two-round concurrent-secure 2PC protocol based on a single, standard, post-quantum assumption: The subexponential hardness of the learning-with-errors (LWE) problem. Our protocol is in the plain model, i.e., it has no trusted setup, and it is secure in the super-polynomial simulation framework of Pass (EUROCRYPT 2003). Since two rounds are minimal for (concurrent) 2PC, this work resolves the round complexity of concurrent 2PC from standard assumptions.
  
  As immediate applications, our work establishes feasibility results for interesting cryptographic primitives such as the first two-round password authentication key exchange (PAKE) protocol in the plain model and the first two-round concurrent secure computation protocol for quantum circuits (2PQC).
  
    2022
  
  
    TCC
  
  
    Steganography-Free Zero-Knowledge
            
      Abstract    
    
We revisit the well-studied problem of preventing steganographic communication in multi-party communications. While this is known to be a provably impossible task, we propose a new model that allows circumventing this impossibility. In our model, the parties first publish a single message during an honest \emph{non-interactive} pre-processing phase and then later interact in an execution phase. We show that in this model, it is indeed possible to prevent any steganographic communication in zero-knowledge protocols. Our solutions rely on standard cryptographic assumptions.
  
    2021
  
  
    JOFC
  
  
    On Subversion-Resistant SNARKs
            
      Abstract    
    
While NIZK arguments in the CRS model are widely studied, the question of what happens when the CRS is subverted has received little attention. In ASIACRYPT 2016, Bellare, Fuchsbauer, and Scafuro showed the first negative and positive results, proving also that it is impossible to achieve subversion soundness and (even non-subversion) zero knowledge at the same time. On the positive side, they constructed a sound and subversion-zero knowledge (Sub-ZK) non-succinct NIZK argument for NP. We consider the practically very relevant case of zk-SNARKs. We make Groth’s zk-SNARK for Circuit-SAT from EUROCRYPT 2016 computationally knowledge-sound and perfectly composable Sub-ZK with minimal changes. We only require the CRS trapdoor to be extractable and the CRS to be publicly verifiable. To achieve the latter, we add some new elements to the CRS and construct an efficient CRS verification algorithm. We also provide a definitional framework for knowledge-sound and Sub-ZK SNARKs.
  
    2020
  
  
    PKC
  
  
    On QA-NIZK in the BPK Model
 📺            
      Abstract    
    
Recently, Bellare et al. defined subversion-resistance (security in the case the CRS creator may be malicious) for NIZK. In particular, a Sub-ZK NIZK is zero-knowledge, even in the case of subverted CRS. We study Sub-ZK QA-NIZKs, where the CRS can depend on the language parameter. First, we observe that subversion zero-knowledge (Sub-ZK) in the CRS model corresponds to no-auxiliary-string non-black-box NIZK in the Bare Public Key model, and hence, the use of non-black-box techniques is needed to obtain Sub-ZK. Second, we give a precise definition of Sub-ZK QA-NIZKs that are (knowledge-)sound if the language parameter but not the CRS is subverted and zero-knowledge even if both are subverted. Third, we prove that the most efficient known QA-NIZK for linear subspaces by Kiltz and Wee is Sub-ZK under a new knowledge assumption that by itself is secure in (a weaker version of) the algebraic group model. Depending on the parameter setting, it is (knowledge-)sound under different non-falsifiable assumptions, some of which do not belong to the family of knowledge assumptions.
  Service
- CiC 2025 Editor
- Asiacrypt 2023 Program committee
Coauthors
- Behzad Abdolmaleki (7)
- Saikrishna Badrinarayanan (1)
- Ruben Baecker (1)
- Karim Baghery (1)
- Céline Chevalier (1)
- Ehsan Ebrahimi (1)
- Rex Fernando (1)
- Nils Fleischhacker (1)
- Paul Gerhart (1)
- Vipul Goyal (1)
- Mike Graf (1)
- Abhishek Jain (1)
- Mojtaba Khalili (1)
- Helger Lipmaa (3)
- Giulio Malavolta (3)
- Ahmadreza Rahimi (1)
- Daniel Rausch (1)
- Amit Sahai (1)
- Dominique Schröder (1)
- Janno Siim (2)
- Quoc-Huy Vu (1)
- Michał Zając (3)
