Karim Eldefrawy
YOU?
Author Swipe
View article: Entanglement-based Mutual Quantum Distance Bounding
Entanglement-based Mutual Quantum Distance Bounding Open
Mutual distance bounding (DB) protocols enable two distrusting parties to establish an upper-bound on the distance between them. DB has been so far mainly considered in classical settings and for classical applications, especially in wirel…
View article: Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities Open
International audience
View article: CraterLake
CraterLake Open
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due to its prohibitive overheads, about 10,000X over unencryp…
View article: Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head Open
MPC-in-the-Head (MitH) is a general framework that allows constructing efficient Zero Knowledge protocols for general NP-relations from secure multiparty computation (MPC) protocols. In this paper we give the first machine-checked implemen…
View article: Quantum Optimization Heuristics with an Application to Knapsack Problems
Quantum Optimization Heuristics with an Application to Knapsack Problems Open
This paper introduces two techniques that make the standard Quantum Approximate Optimization Algorithm (QAOA) more suitable for constrained optimization problems. The first technique describes how to use the outcome of a prior greedy class…
View article: F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version)
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version) Open
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted serves. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude…
View article: Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version Open
Implementation flaws in cryptographic libraries, design flaws in underlying cryptographic primitives, and weaknesses in protocols using both, can all lead to exploitable vulnerabilities in software. Manually fixing such issues is challengi…
View article: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise Open
Modern society is increasingly surrounded by, and accustomed to, a wide range of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often perform safety-critical functions, e.g., personal medical devices, autom…
View article: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise Open
Modern society is increasingly surrounded by, and accustomed to, a wide range of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often perform safety-critical functions, e.g., personal medical devices, autom…
View article: Formally Verified Hardware/Software Co-Design for Remote Attestation
Formally Verified Hardware/Software Co-Design for Remote Attestation Open
In this work, we take the first step towards formal verification of Remote Attestation (RA) by designing and verifying an architecture called VRASED: Verifiable Remote Attestation for Simple Embedded Devices. VRASED instantiates a hybrid (…
View article: Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security Open
Assuring integrity of information (e.g., data and/or software) is usually accomplished by cryptographic means, such as hash functions or message authentication codes (MACs). Computing such integrity-ensuring functions can be time-consuming…
View article: HYDRA
HYDRA Open
Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of a remote untrusted hardware platform (prover). RA can be used to establish a static or dynamic root of trust in embedded and cyber-physical sy…
View article: HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel) Open
Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of a remote untrusted hardware platform (prover). RA can be used to establish a static or dynamic root of trust in embedded and cyber-physical sy…