Skip to main content

Showing 1–4 of 4 results for author: Künzler, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.05932  [pdf, ps, other

    cs.CR

    Combating Reentrancy Bugs on Sharded Blockchains

    Authors: Roman Kashitsyn, Robin Künzler, Ognjen Marić, Lara Schmid

    Abstract: Reentrancy is a well-known source of smart contract bugs on Ethereum, leading e.g. to double-spending vulnerabilities in DeFi applications. But less is known about this problem in other blockchains, which can have significantly different execution models. Sharded blockchains in particular generally use an asynchronous messaging model that differs substantially from the synchronous and transactiona… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    ACM Class: D.2.3; D.2.4; C.2.4

  2. arXiv:1312.2490  [pdf, ps, other

    cs.CC cs.CR

    A New View on Worst-Case to Average-Case Reductions for NP Problems

    Authors: Thomas Holenstein, Robin Künzler

    Abstract: We study the result by Bogdanov and Trevisan (FOCS, 2003), who show that under reasonable assumptions, there is no non-adaptive worst-case to average-case reduction that bases the average-case hardness of an NP-problem on the worst-case complexity of an NP-complete problem. We replace the hiding and the heavy samples protocol in [BT03] by employing the histogram verification protocol of Haitner, M… ▽ More

    Submitted 24 March, 2014; v1 submitted 9 December, 2013; originally announced December 2013.

    ACM Class: F.0; E.3

  3. arXiv:1312.2483  [pdf, ps, other

    cs.CC cs.CR

    A Protocol for Generating Random Elements with their Probabilities

    Authors: Thomas Holenstein, Robin Künzler

    Abstract: We give an AM protocol that allows the verifier to sample elements x from a probability distribution P, which is held by the prover. If the prover is honest, the verifier outputs (x, P(x)) with probability close to P(x). In case the prover is dishonest, one may hope for the following guarantee: if the verifier outputs (x, p), then the probability that the verifier outputs x is close to p. Simple e… ▽ More

    Submitted 24 March, 2014; v1 submitted 9 December, 2013; originally announced December 2013.

    ACM Class: F.1.3

  4. arXiv:1011.1264  [pdf, other

    cs.CR cs.CC cs.IT

    Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited

    Authors: Thomas Holenstein, Robin Künzler, Stefano Tessaro

    Abstract: We consider the cryptographic problem of constructing an invertible random permutation from a public random function (i.e., which can be accessed by the adversary). This goal is formalized by the notion of indifferentiability of Maurer et al. (TCC 2004). This is the natural extension to the public setting of the well-studied problem of building random permutations from random functions, which was… ▽ More

    Submitted 1 June, 2011; v1 submitted 4 November, 2010; originally announced November 2010.

    Comments: Reduced number of rounds from 18 to 14 as this is sufficient for the proof, improved presentation of several lemmas and introduction