TY - GEN
T1 - Peeking Into the Future
T2 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025
AU - Asharov, Gilad
AU - Chandramouli, Anirudh
AU - Cohen, Ran
AU - Ishai, Yuval
N1 - Publisher Copyright: © International Association for Cryptologic Research 2025.
PY - 2025
Y1 - 2025
N2 - An important requirement in synchronous protocols is that, even when a party receives all its messages for a given round ahead of time, it must wait until the round officially concludes before sending its messages for the next round. In practice, however, implementations often overlook this waiting requirement. This leads to a mismatch between the security analysis and real-world deployments, giving adversaries a new, unaccounted-for capability: the ability to “peek into the future.” Specif-ically, an adversary can force certain honest parties to advance to round r + 1, observe their round r + 1 messages, and then use this information to determine its remaining round r messages.
AB - An important requirement in synchronous protocols is that, even when a party receives all its messages for a given round ahead of time, it must wait until the round officially concludes before sending its messages for the next round. In practice, however, implementations often overlook this waiting requirement. This leads to a mismatch between the security analysis and real-world deployments, giving adversaries a new, unaccounted-for capability: the ability to “peek into the future.” Specif-ically, an adversary can force certain honest parties to advance to round r + 1, observe their round r + 1 messages, and then use this information to determine its remaining round r messages.
UR - http://www.scopus.com/inward/record.url?scp=105004646097&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-91092-0_14
DO - 10.1007/978-3-031-91092-0_14
M3 - منشور من مؤتمر
SN - 9783031910913
T3 - Lecture Notes in Computer Science
SP - 390
EP - 420
BT - Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings
A2 - Fehr, Serge
A2 - Fouque, Pierre-Alain
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 4 May 2025 through 8 May 2025
ER -