Post quantum cryptography

Lattice-Based Accumulator and Application to Anonymous Credential Revocation

Lattice-Based Accumulator and Application to Anonymous Credential Revocation

Victor Youdom Kemmoe from Brown University presents a novel, communication-efficient cryptographic accumulator based on the Module-SIS assumption. This construction is designed for applications like anonymous credential revocation, where elements can be added without needing to update existing membership witnesses, a significant improvement over previous post-quantum schemes.

A Formal Analysis of Apple’s iMessage PQ3 Protocol

A Formal Analysis of Apple’s iMessage PQ3 Protocol

A detailed overview of the formal verification of Apple's iMessage PQ3 protocol using the Tamarin prover. The talk covers PQ3's hybrid cryptographic design, its post-quantum security goals like forward secrecy and post-compromise security, the powerful adversary model it resists, and the successful formal analysis of its unbounded double ratchet structure.