Crypto 2018 Program
Total Page:16
File Type:pdf, Size:1020Kb
Crypto 2018 Program Sunday, August 19, 2018 17:00–20:00 Registration Location: Anacapa Formal Lounge 17:30–21:30 Reception Dinner Location: Anacapa Lawn Monday, August 20, 2018 7:30–8:45 Breakfast Location: De La Guerra Dining Commons Opening remarks 8:50–9:00 Location: Corwin Pavilion Chair: Crypto General Chair, Tal Rabin Secure Messaging Round Optimal MPC Location: Lotte Lehman Hall Location: Corwin Pavilion Chair: Kenny Paterson Chair: Fabrice Benhamouda Towards Bidirectional Ratcheted Key Exchange Round-Optimal Secure Multiparty Bertram Poettering, Paul Rösler Computation with Honest Majority Royal Holloway, University of London, Ruhr University Bochum Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Optimal Channel Security Against Fine-Grained Goel, Abhishek Jain State Compromise: The Safety of Messaging MIT, JHU Joseph Jaeger, Igors Stepanovs On the Exact Round Complexity of Secure UC San Diego Three-Party Computation Out-of-Band Authentication in Group Messaging: Arpita Patra, Divya Ravi Computational, Statistical, Optimal Indian Institute of Science, India 9:05–10:25 Lior Rotem, Gil Segev Soft Merge with the next talk: Promise Hebrew University of Jerusalem Zero Knowledge and its Applications to Round Optimal MPC Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai UCLA, CMU, JHU, MIT and Microsoft Research Round-Optimal Secure Multi-Party Computation Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam IBM, Bar Ilan University, Cornell-Tech / University of Rochester, University of Rochester 10:20–10:50 Coffee Break Implementations and Physical Attacks Foundations Location: Lotte Lehman Hall Location: Corwin Pavilion Chair: Tancrède Lepoint Chair: Daniel Wichs Faster Homomorphic Linear Transformations in Yes, There is an Oblivious RAM Lower HElib Bound! 10:50–11:40 Shai Halevi, Victor Shoup Kasper Green Larsen, Jesper Buus Nielsen IBM Research, NYU Aarhus University CAPA: The Spirit of Beaver against Physical Attacks Constrained PRFs for NC1 in Traditional Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Groups Svetla Nikova, Ventzislav Nikov, Nigel P. Smart Nuttapong Attrapadung, Takahiro Matsuda, Ryo KU Leuven, imec - Cosic, Leuven, Belgium, Square Inc., San Nishimaki, Shota Yamada, Takashi Yamakawa Francisco, USA, NXP Semiconductors, Leuven, Belgium AIST, NTT Secure Platform Laboratories 11:40–11:45 Track-switch Break 1 Monday, August 20, 2018 IACR Distinguished Lecture Location: Corwin Pavilion Chair: Tal Rabin 11:45–12:45 From Idea to Impact, the Crypto story: What's next? Shafi Goldwasser Berkeley and MIT 12:50–14:00 Lunch Location: De La Guerra Dining Commons Authenticated and Format-Preserving Lattices Encryption Location: Corwin Pavilion Location: Lotte Lehman Hall Chair: Daniele Micciancio Chair: Aishwarya Thiruvengadam GGH15 Beyond Permutation Branching Fast Message Franking: From Invisible Programs: Proofs, Attacks, and Salamanders to Encryptment Candidates Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee Woodage Boston University, MIT, CNRS and ENS, PSL 14:15–15:30 NYU, Cornell Tech, Royal Holloway Lower Bounds on Lattice Enumeration Indifferentiable Authenticated Encryption with Extreme Pruning Manuel Barbosa, Pooya Farshim Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, INESC TEC and FC University of Porto, DI/ENS, CNRS, PSL Junji Shikata University and Inria, Paris, France NICT, Inria and CNRS, JFLI, University of Tokyo, The Curse of Small Domains: New Attacks on Bank of Japan, Yokohama National University Format-Preserving Encryption Dissection-BKW Viet Tung Hoang, Stefano Tessaro, Ni Trieu Andre Esser, Felix Heuer, Robert Kübler, Alexander Florida State University, UCSB, Oregon State University May, Christian Sohler Ruhr University Bochum, TU Dortmund 15:30–16:00 Coffee Break Cryptanalysis Lattice-based Zero Knowledge Location: Lotte Lehman Hall Location: Corwin Pavilion Chair: Viet Tung Hoang Chair: Anna Lysyanskaya Cryptanalysis via algebraic spans Sub-Linear Lattice-Based Zero-Knowledge Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban Arguments for Arithmetic Circuits Bar-Ilan University Carsten Baum, Jonathan Bootle, Andrea Cerulli, Improved Division Property Based Cube Attacks Rafael del Pino, Jens Groth, Vadim Lyubashevsky Exploiting Algebraic Properties of Superpoly Bar Ilan University, UCL, IBM Research - Zurich Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Lattice-Based Zero-Knowledge Arguments 16:00–17:15 Isobe, Willi Meier for Integer Relations University of Luxembourg, Luxembourg, State Key Laboratory Benoît Libert, San Ling, Khoa Nguyen, Huaxiong of Cryptology, P.O. Box 5159, Beijing 100878, China, NTT Wang Secure Platform Laboratories, Japan, imec-COSIC, Dept. CNRS and ENS de Lyon (France), Nanyang Electrical Engineering (ESAT), KU Leuven, Belgium, University Technological University (Singapore) of Hyogo, Japan, FHNW, Switzerland Multi-Theorem Preprocessing NIZKs from Generic Attacks against Beyond-Birthday-Bound Lattices MACs Sam Kim, David J. Wu Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras Stanford University Inria, 19:00–21:00 Dinner Location: Anacapa Lawn Tuesday, August 21, 2018 7:30–8:35 Breakfast Location: De La Guerra Dining Commons 2 Tuesday, August 21, 2018 Searchable Encryption and Efficient MPC Differential Privacy Location: Corwin Pavilion Location: Lotte Lehman Hall - starts at 8:55 Chair: Mike Rosulek Chair: Alexandra Boldyreva SPDZ2k: Efficient MPC mod 2^k for Dishonest Structured Encryption and Leakage Majority Suppression Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Seny Kamara, Tarik Moataz, Olga Ohrimenko Chaoping Xing Brown University, Microsoft Research CWI, Amsterdam, Aarhus University, Aarhus Univerity, Nanyang Technological University, Singapore Soft Merge with the next talk: Searchable Encryption with Optimal Yet Another Compiler for Active Security or: Efficient Locality: Achieving Sublogarithmic MPC Over Arbitrary Rings Ivan Damgård, Claudio Orlandi, Mark Simkin Read Efficiency Aarhus University Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou TinyKeys: A New Approach to Efficient Multi-Party University of Maryland, Hong Kong University of Computation 8:40–10:20 Science and Technology Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria- Tight Tradeoffs in Searchable Vazquez Bar-Ilan University, KU Leuven, Aarhus University, University of Symmetric Encryption Bristol Gilad Asharov, Gil Segev, Ido Shahaf Cornell Tech, Hebrew University of Jerusalem Fast Large-Scale Honest-Majority MPC for Malicious Soft Merge with the next talk: Hardness Adversaries Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo of Non-Interactive Differential Privacy Kikuchi, Yehuda Lindell, Ariel Nof from One-Way Functions NTT Secure Platform Laboratories, University of Pennsylvania and Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, University of Maryland, Bar-Ilan University Daniel Wichs Columbia University, Northeastern University Risky Traitor Tracing and New Differential Privacy Negative Results Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters UT Austin 10:20–10:50 Coffee Break Secret Sharing Quantum Cryptography I Location: Lotte Lehman Hall Location: Corwin Pavilion Chair: Hoeteck Wee Chair: Alexandra Boldyreva Non-Malleable Secret Sharing for Quantum FHE (Almost) As Secure As Classical General Access Structures Zvika Brakerski Vipul Goyal, Ashutosh Kumar Weizmann Institute of Science CMU, UCLA IND-CCA-secure Key Encapsulation Mechanism in the On the Local Leakage Resilience of Quantum Random Oracle Model, Revisited Linear Secret Sharing Schemes Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced 10:50–11:40 Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin Computing, Zhengzhou, Henan, China, TCA Laboratory, State Key IBM Research, MIT, Technion Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, TCA Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, University of Chinese Academy of Sciences, Beijing, China, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China, CAS Center for Excellence and Synergetic Innovation Center in Quantum information and Quantum Physics,USTC, Hefei, Anhui, China 11:40–11:45 Track-switch Break 3 Tuesday, August 21, 2018 Encryption Quantum Cryptography II Location: Lotte Lehman Hall Location: Corwin Pavilion Chair: Ananth Raghunathan Chair: Chitchanok Chuengsatiansup Threshold Cryptosystems From Pseudorandom Quantum States Threshold Fully Homomorphic Zhengfeng Ji, Yi-Kai Liu, Fang Song Encryption University of Technology Sydney, University of Maryland and Dan Boneh, Rosario Gennaro, Steven Goldfeder, NIST, Portland State University Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Soft Merge with the next talk: Quantum Attacks Amit Sahai against Indistinguishablility Obfuscators Proved Stanford University, City College of New York, Secure in the Weak Multilinear Map Model Princeton University, UCLA and Center for Alice Pellet-Mary 11:45–12:40 Encrypted Functionalities Univ Lyon, CNRS, ENS de Lyon, Inria, UCBL, LIP, Lyon, France. Multi-Input Functional Encryption for Cryptanalyses of Branching Program Obfuscations Inner Products: