Program
19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).
Wednesday, September 5
08:30-08:50 Registration
08:50-09:00 Opening Remarks
09:00-10:00 Session 1: Invited Talk (Chair: D. Catalano)
-
On The Foundations of Program Obfuscation
Huijia (Rachel) Lin, University of Santa Barbara, CA, USA
10:00-10:30 Coffee break
10:30-12:10 Session 2: Signatures and Watermarking (Chair: I. Visconti)
-
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
M. Abe, M. Ambrona, M. Ohkubo, M. Tibouchi (NTT, Japan - IMDEA, Spain - NICT, Japan) -
Fully Anonymous Group Signature with Verifier-Local Revocation
A. Ishida, Y. Sakai, K. Emura, G. Hanaoka, K. Tanaka (AIST, Japan - NICT, Japan - Tokyo Inst. of Techn., Japan) -
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
D. Fiore, E. Pagnin (IMDEA, Spain - Chalmers U., Sweden) -
Unforgeable Watermarking Schemes with Public Extraction
R. Yang, M.H. Au, J. Lai, Q. Xu, Z. Yu (Shandong U., China - Hong Kong Pol. U. - Jinan U., China)
12:10-15:00 Lunch break
15:00-15:50 Session 3: Composability (Chair: M. Abe)
-
Security Definitions For Hash Functions: Combining UCE and Indierentiabili
D. Jost, U. Maurer (ETH Zurich, Switzerland) -
A Constructive Perspective on Signcryption Security
C. Badertscher, F. Banfi, U. Maurer (ETH Zurich, Switzerland)
15:50-16:20 Coffee break
16:20-17:35 Session 4: Encryption I (Chair: D. Fiore)
-
Function-Revealing Encryption
M. Joye, A. Passelègue (NXP, USA - UCLA, USA) -
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
K. Hara, F. Kitagawa, T. Matsuda, G. Hanaoka, K. Tanaka (Tokyo Inst. of Techn., Japan - AIST, Japan) -
Lizard: Cut off the Tail! A Practical Post-Quantum Public-Key Encryption from LWE and LWR
J.H. Cheon, D. Kim, J. Lee, Y. Song (Seoul national U., Korea - UCSD, USA)
Thursday, September 6
09:00-10:40 Session 5: Multiparty Computation (Chair: A. Passalegue)
-
Reducing Communication Channels in MPC
M. Keller, D. Rotaru, N.P. Smart, T. Wood (U. Bristol, UK - KU Leuven, Belgium) -
Proactive Secure Multiparty Computation with a Dishonest Majority
K. Eldefrawy, R. Ostrovsky, S. Park, M. Yung (SRI, US - UCLA, USA - MIT, USA - Columbia U., USA) -
From Fairness to Full Security in Multiparty Computation
R. Cohen, I. Haitner, E. Omri, L. Rotem (MIT, USA - Northeastern U., USA - Ariel U., Israel - Hebrew U., Israel) -
Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters
R. Inbar, E. Omri, B. Pinkas (Ariel U., Israel - Bar-Ilan U., Israel)
10:40-11:10 Coffee break
11:10-12:25 Session 6: Anonimity and Zero Knowledge (Chair: A. Kiayias)
-
Semantically Secure Anonymity: Foundations of Re-Encryption
A.L. Young, M. Yung (Cryptovirology Labs, USA - Columbia U., USA) -
Securing Abe's Mix-net Against Malicious Veriers via Witness Indistinguishability
E. Boyle, S. Klein, A. Rosen, G. Segev (IDC Herzliya, Israel - MIT, USA - Hebrew U., Israel) -
Zero-Knowledge Protocols for Search Problems
B. Berger, Z. Brakerski (Weizmann, Israel)
12:25-15:00 Lunch break
15:00-15:50 Session 7: Secret Sharing and Oblivious Transfer (Chair: E. Boyle)
-
Evolving Ramp Secret-Sharing Schemes
A. Beimel, H. Othman (Ben Gurion U., Israel) -
Actively Secure OT-Extension from q-ary Linear Codes
I. Cascudo, R.B. Christensen, J. S. Gundersen (Aalborg University, Denmark)
15:50-16:20 Coffee break
16:20-17:35 Session 8: Lattices and Post Quantum Cryptography (Chair: Z. Brakerski)
-
Estimate all the {LWE, NTRU} schemes!
M.R. Albrecht, B.R. Curtis, A. Deo, A. Davidson, R. Player, E.W. Postlethwaite, F. Virdia, T. Wunderer (U. London, UK - Sorbonne U., France - U. Darmstadt, Germany) -
More Effcient Commitments from Structured Lattice Assumptions
C. Baum, I. Damgård, V. Lyubashevsky, S. Oechsner, C. Peikert (Bar-Ilan U., Isarel - Aarhus U., Denmark - IBM Zurich, Switzerland - U. Michigan, USA) -
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
A. Hosoyamada, Y. Sasaki (NTT, Japan)
18:00-20:00 Social event: a guided tour of Amalfi
20:30-23:00 Social dinner
Friday, September 7
09:00-10:00 Session 9: Invited Talk (Chair: D. Catalano)
-
Active Security in a Post-Quantum Setting
Eike Kiltz (Ruhr-Universitat, Bochum, Germany)
10:00-10:30 Coffee break
10:30-11:20 Session 10: Obfuscation (Chair: L. Siniscalchi)
-
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Y. Kang, C. Lin, T. Malkin, M. Raykova (Columbia U., USA) -
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Z. Brakerski, A. Jain, I. Komargodski, A. Passelègue, D. Wichs (Weizman, Israel - UCLA, USA - Cornell, USA - Northeastern U., USA)
-
Secure Two-Party Computation over Unreliable Channels
R. Gelles, A. Paskin-Cherniavsky, V. Zikas (Bar-Ilan U., Israel - Ariel U., Israel - U. of Edinburgh, UK) -
Combining Private Set-Intersection with Secure Two-Party Computation
M. Ciampi, C. Orlandi (U. of Edinburgh, UK - Aarhus University, Denmark)
12:10-15:00 Lunch break
15:00-15:50 Session 12: Protocols (Chair: M. Ciampi)
-
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange
J.Y. Hwang, S. Jarecki, T. Kwon, J. Lee, J.S. Shin, J. Xu (ETRI, Korea -U. California Irvine, USA - Yonsei U., Korea - Seoul U., Korea - Sejong U., Korea) -
On the Security Properties of e-Voting Bulletin Boards
A. Kiayias, A. Kuldmaa, H. Lipmaa, J. Siim, T. Zacharias (U. of Edinburgh, UK - U. of Tartu, Estonia - CEIV, Estonia - STACC, Estonia)
15:50-16:20 Coffee break
16:20-17:35 Session 13: Encryption II (Chair: G. Persiano)
-
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
R. Gay, L. Kowalczyk, H. Wee (ENS, France - Columbia U., USA - CNRS, France) -
Function-Hiding Inner Product Encryption is Practical
S. Kim, K. Lewi, A. Mandal, H. Montgomery, A. Roy, D.J. Wu (Stanford U., USA - Facebook, USA - Fujitsu Labs, USA) -
Compact IBBE and Fuzzy IBE from Simple Assumptions
J. Gong, B. Libert, S.C. Ramanna (ENS, Lyon, France - CNRS, France - Indian Inst. of Techn., Kharagpur, India)
17:35-17:45 Closing remarks