Abstract
An important requirement in synchronous protocols is that, even when a party receives all its messages for a given round ahead of time, it must wait until the round officially concludes before sending its messages for the next round. In practice, however, implementations often overlook this waiting requirement. This leads to a mismatch between the security analysis and real-world deployments, giving adversaries a new, unaccounted-for capability: the ability to “peek into the future.” Specif-ically, an adversary can force certain honest parties to advance to round r + 1, observe their round r + 1 messages, and then use this information to determine its remaining round r messages.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings |
| Editors | Serge Fehr, Pierre-Alain Fouque |
| Publisher | Springer Science and Business Media Deutschland GmbH |
| Pages | 390-420 |
| Number of pages | 31 |
| ISBN (Print) | 9783031910913 |
| DOIs | |
| State | Published - 2025 |
| Event | 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 - Madrid, Spain Duration: 4 May 2025 → 8 May 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 15605 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 |
|---|---|
| Country/Territory | Spain |
| City | Madrid |
| Period | 4/05/25 → 8/05/25 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2025.