Feb. 19, 2024, 1:54 p.m. |

IACR News www.iacr.org

ePrint Report: The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets

Chun Guo, Xiao Wang, Xiang Xie, Yu Yu


Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem in
stances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called
GGMtree that stems from the PRG-to-PRF transformation of Goldreich, Goldwasser, and Micali, with a goal
to provide references for its recently popularized …

access attackers compromise eprint report large mpc report scale security trees wallets wang

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden