Peter Scholl
schollster.bsky.social
Peter Scholl
@schollster.bsky.social
Reposted by Peter Scholl
New paper with Vitor Pereira and Peter Scholl (@schollster.bsky.social)!

We found flaws in a supposedly formally verified security proof of LPZK, leading to attacks on soundness and zk.
The culprit: a mismatch between definitions in their code and the original LPZK papers.

cic.iacr.org/p/2/3/24
October 7, 2025 at 7:21 AM
Excited to do more research on the real-world security of MPC with @proofnerd.bsky.social, thanks to this grant. We plan to hire some interns for this next summer.

Congrats to all the other recipients so far, and to Zama for a smooth application process, ~1 month from announcement to notification!
4) Nadia Heninger @nadiaheninger.bsky.social and Miro Haller @mirohaller.bsky.social‬ (UC San Diego),

5) Sabine Oechsner @proofnerd.bsky.social‬ (VU Amsterdam) and Peter Scholl @schollster.bsky.social‬ (Aarhus University),

6) Victor Lomné (Ninja Lab)
June 4, 2025 at 10:15 PM
Happy our paper on the real-world security of MPC implementations is finally out! This project goes back to Frederik & Alexander's masters thesis from 2 years ago @csaudk.bsky.social, it's not easy work but hope to see more of this type of research in future.
Our paper on attacking concurrent MPC implementations is finally on eprint 🎉
(And @schollster.bsky.social will present it at S&P 2025!)

A summary 🧵
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations (Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl) ia.cr/2025/789
May 5, 2025 at 8:12 AM
Reposted by Peter Scholl
Shout-out to my colleagues for the responsible disclosure of security issues in MP-SPDZ. They have been fixed in 2023.
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations (Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl) ia.cr/2025/789
May 5, 2025 at 5:15 AM