This work addresses the problem of planting and defending cryptographic-based
backdoors in artificial intelligence (AI) models. The motivation comes from our
lack of understanding and the implications of using cryptographic techniques
for planting undetectable backdoors under theoretical assumptions in the large
AI model systems deployed in practice. Our app