Advertisement · 728 × 90

Posts by Philipp Muens

Circularity Based IO, Part 1
Circularity Based IO, Part 1 YouTube video by Simons Institute for the Theory of Computing

Another really good presentation that explains how iO can be constructed from LWE-with-hints in a very intuitive way.

Lots of the schemes have been broken, unfortunately.

However constructing iO from LWE with minor tweaks is still a promising direction.

www.youtube.com/watch?v=NmxZ...

1 day ago 0 0 0 0
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption YouTube video by Simons Institute for the Theory of Computing

This is a great talk that explains why constructing iO from pure LWE is still an open research question.

It also dives into the LWE-with-hints line of work and proposes the new Circular Security with Random Opening assumption.

www.youtube.com/watch?v=H3Qc...

eprint.iacr.org/2025/390

2 days ago 0 0 0 0

This is a great review paper that explains the iO construction "Indistinguishability Obfuscation from Functional Encryption" by Bitansky and Vaikuntanathan in a very digestible manner.

It's highly recommended to take some notes while reading along.

piazza.com/class_profil...

3 days ago 0 0 0 0
Indistinguishable obfuscation. The tech that will solve crypto! - Jordi Baylina
Indistinguishable obfuscation. The tech that will solve crypto! - Jordi Baylina YouTube video by Duct Tape

iO is still highly inefficient, unfortunately.

I hope that we'll get there at some point as iO unlocks a lot of super interesting use cases: www.youtube.com/watch?v=SNnX...

Hardware-based iO seems like a nice stepping stone towards practical iO.

eprint.iacr.org/2025/1989.pdf

1 week ago 1 0 0 0
Making Sense of ZK Virtual Machines A deep dive into how ZKVMs work — from ZK proofs and circuits through arithmetization to building a working STARK-based ZKVM in Rust.

This is an amazing resource to learn how zkVMs work under the hood: ubermensch.blog/articles/mak...

1 week ago 0 0 0 0
Preview
A Universal Blinder: One-round Blind Signatures from FHE We construct compilers that convert any secure signature scheme into a single-round blind signature scheme. An important property of the construction is that the final blind signature has exactly the ...

This is a very interesting paper that uses FHE to turn any signature scheme into a blind signature scheme.

Verifiability is ensured using a zkp.

It also introduces the concept of "committed verifiable FHE" where the verifier doesn't learn the circuit.

eprint.iacr.org/2026/574

3 weeks ago 0 0 0 0

Really good paper that dives very deep into the intricacies of zkVMs.

eprint.iacr.org/2026/525.pdf

4 weeks ago 1 1 0 0
Advertisement
Preview
Broken By Design: A Longitudinal Analysis of Cryptographic Failures in Alipay Mobile Payment Infrastructure We present a systematic security analysis of Alipay's APK signing certificate, issued in 2009 using md5WithRSAEncryption with RSA-1024 and still active in 2026, serving over one billion users. Through...

Interesting paper that shows why it's important to keep your cryptography up to date.

eprint.iacr.org/2026/526

1 month ago 0 0 0 0
Preview
Blind Adaptor Signatures, Revisited: Stronger Security Definitions and Their Construction toward Practical Applications Although both blind signatures and adaptor signatures have individually attracted attention, there is little research on combining these primitives so far. To the best of our knowledge, although the ...

I'm a huge fan of Adaptor Signatures and use them in a project I'm currently working on.

A new paper was just released that studies Blind Adaptor Signatures which is an interesting combination of Blind Signatures and Adaptor Signatures: eprint.iacr.org/2026/060

3 months ago 1 0 0 0
Preview
Go feature: Secret mode Automatically erase memory to prevent secret leaks.

Really excited for the new "Secret Mode" that will land in Go v1.26 and will make operations such as key generation more secure.

antonz.org/accepted/run...

3 months ago 6 0 0 0
Preview
GitHub - Threshold-ML-DSA/Threshold-ML-DSA Contribute to Threshold-ML-DSA/Threshold-ML-DSA development by creating an account on GitHub.

Here's the GitHub repo: github.com/Threshold-ML...

3 months ago 1 0 0 0
Preview
Efficient Threshold ML-DSA Threshold signature schemes allow a group of users to jointly generate a digital signature, providing resilience against faults and enhancing decentralization. With the advent of post-quantum cryptogr...

Really great to see more research on Threshold ML-DSA (fka Dilithium): eprint.iacr.org/2026/013

The code for the implementation can be found here: zenodo.org/records/1796...

3 months ago 1 0 1 0
Preview
LifeXP+: Secure, Usable and Reliable Key Recovery for Web3 Applications In the Web2 world, users control their accounts using credentials such as usernames and passwords, which can be reset or recovered by centralized servers if the user loses them. In the decentralized W...

Key recovery is a tricky problem.

This new paper outlines an interesting approach based on natural language stories which utilizes embeddings behind the scenes.

It's an interesting solution at the intersection of Cryptography and Machine Learning.

eprint.iacr.org/2025/2206

4 months ago 2 0 0 0
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis YouTube video by DEFCONConference

Very interesting talk when it comes to the SotA of Quantum Computing: www.youtube.com/watch?v=OkVY...

5 months ago 3 0 0 0
Advertisement
Preview
GitHub - TECDSA/ecdsa_two_round Contribute to TECDSA/ecdsa_two_round development by creating an account on GitHub.

Here's the code for their implementation: github.com/TECDSA/ecdsa...

6 months ago 2 0 0 0
Preview
Threshold ECDSA in Two Rounds We propose the first two-round multi-party signing protocol for the Elliptic Curve Digital Signature Algorithm (ECDSA) in the threshold-optimal setting, reducing the number of rounds by one compared t...

Great to see some progress towards a Two-Round ECDSA Threshold Signature Scheme: eprint.iacr.org/2025/1696

6 months ago 1 0 1 0
Preview
Context-Dependent Threshold Decryption and its Applications In a threshold decryption system a secret key is split across a number of parties so that any threshold of them can decrypt a given ciphertext. We introduce a new concept in threshold decryption call...

This is an interesting paper that allows for a context to be added to Threshold Decryptions: eprint.iacr.org/2025/279

7 months ago 1 0 0 0
Preview
GitHub - primefactor-io/vtc: Implementation of the Verifiable Timed Commitment scheme Implementation of the Verifiable Timed Commitment scheme - primefactor-io/vtc

Here's a link to the repository and its documentation:

Repository: github.com/primefactor-...
Documentation: pkg.go.dev/github.com/p...

8 months ago 0 0 0 0

To maximize learning I constrained myself to only depend on the standard library and zero 3rd party dependencies.

The whole code is covered with various tests which you can use to see how the implementation can be used in practice.

8 months ago 0 0 1 0

I also had to do a lot of pen-and-paper math to figure out how everything works.

I'm super happy that it's finally out there! I also learned a ton while working on this which is valuable in and of itself.

8 months ago 0 0 1 0

Implementing the Verifiable Timed Commitment scheme was definitely a hard nut to crack.

I started working on this late last year, but there were a lot of missing pieces I had to put in place (e.g. implement the Linearly Homomorphic Time-Lock Puzzle first).

8 months ago 0 0 1 0

One could use this in 2/2 multisigs (e.g. Payment Channels).

Before funding the multisig, we could create a signed refund transaction which is timelocked via a VTC.

The VTC can be opened after time t which allows one to refund themselves if the co-signer doesn't cooperate.

8 months ago 0 0 1 0

Using this, timelock capabilities can be brought to Blockchains that don't have a scripting language.

It furthermore increases privacy as no data regarding the timelock is stored on-chain (the VTC is shared off-chain).

8 months ago 0 0 1 0

This construction has various applications, but the one I'm focusing on is refund transactions.

Rather than using the Blockchain's scripting language you can share an encrypted signature over a refund transaction off-chain.

This signature can then be recovered after time t.

8 months ago 0 0 1 0
Advertisement
Verifiable timed signatures made practical | Cybersecurity Seminars
Verifiable timed signatures made practical | Cybersecurity Seminars YouTube video by Monash Information Technology

The VTC implementation described in the paper is really elegant as it uses Linearly Homomorphic Time-Lock Puzzles to implement the proof via a cut-and-choose mechanism.

I highly recommend you read the paper or watch this presentation to learn more: www.youtube.com/watch?v=X4vO...

8 months ago 0 0 1 0

Verifiability is implemented via a proof which guarantees that the value that can be decrypted after time t is the one that was committed to.

In our example we could provide the public key and the proof guarantees that the encrypted private key corresponds to the public key.

8 months ago 0 0 1 0

A Verifiable Timed Commitment (VTC) allows one to commit to a value that's encrypted "into the future".

For example, I can commit to and encrypt a private key in such a way that it can only be decrypted after time t.

8 months ago 0 0 1 0

Paper: eprint.iacr.org/2020/1563.pdf
Repository: github.com/primefactor-...
Documentation: pkg.go.dev/github.com/p...

8 months ago 0 0 1 0

Excited to share my implementation of the paper "Verifiable Timed Signatures Made Practical" by Thyagarajan et al.

More specifically I implemented the Verifiable Timed Commitment scheme described in section E.

8 months ago 2 0 1 0
Preview
REFHE: Fully Homomorphic ALU We present a fully homomorphic encryption scheme which natively supports arithmetic and logical operations over large "machine words", namely plaintexts of the form $\mathbb{Z}_{2^n}$ (e.g. $n=64$). O...

This is a really interesting FHE paper in which BGV is used to build an ALU to do arithmetic as well as logical operations on messages in Z_2^n (e.g. 64 bit machine words).

eprint.iacr.org/2025/1449

8 months ago 2 1 0 0