Crypto 2019
August 18-22, 2019
Affiliated events
August 17-18, 2019
Santa Barbara, USA
Accepted Papers
In order of submission:
-
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry (Princeton University & NTT Research)
-
Efficient Collision Attack Frameworks for RIPEMD-160
Fukang Liu (East China Normal University, Shanghai, China; University of Hyogo, Hyogo 650-0047, Japan), Christoph Dobraunig (Graz University of Technology, Austria; Radboud University, Nijmegen, The Netherlands), Florian Mendel (Infineon Technologies AG, Germany), Takanori Isobe (NICT Japan; University of Hyogo, Hyogo 650-0047, Japan), Gaoli Wang (East China Normal University, Shanghai, China;), Zhenfu Cao (East China Normal University, Shanghai, China; )
-
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon (Research Institute of Mathematics, Seoul National University, Seoul, Republic of Korea), Wonhee Cho (Seoul National University, Seoul, Republic of Korea), Minki Hhan (Seoul National University, Seoul, Republic of Korea), Jiseung Kim (Seoul National University, Seoul, Republic of Korea), Changmin Lee (ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France )
-
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain ( Université catholique de Louvain), Julien M. Hendrickx (Boston University and Université catholique de Louvain), Clément Massart ( Université catholique de Louvain), Alex Olshevsky (Boston University), François-Xavier Standaert ( Université catholique de Louvain)
-
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han (Shanghai Jiao Tong University), Shengli Liu (Shanghai Jiao Tong University), Lin Lyu (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University)
-
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
Aron Gohr (BSI)
-
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Fuyuki Kitagawa (NTT Secure Platform Laboratories), Ryo Nishimaki (NTT Secure Platform Laboratories), Keisuke Tanaka (Tokyo Institute of Technology), Takashi Yamakawa (NTT Secure Platform Laboratories)
-
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University), Siteng Kang (Penn State), Seunghoon Lee (Purdue University), Lu Xing (Purdue University), Samson Zhou (Indiana University)
-
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques (University of Waterloo), John M. Schanck (University of Waterloo)
-
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas (CWI, Amsterdam, The Netherlands) Maxime Plançon (ENS Paris-Saclay) Benjamin Wesolowski (CWI, Amsterdam, The Netherlands)
-
Leakage-Resilient Secret Sharing and Applications
Akshayaram Srinivasan (UC Berkeley), Prashant Nalini Vasudevan (UC Berkeley)
-
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal (University of Texas at Austin), Sam Kim (Stanford University), Nathan Manohar (UCLA), Brent Waters (University of Texas at Austin and NTT Research), David J. Wu (University of Virginia)
-
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos (Université de Bordeaux), Dario Catalano (Università di Catania, Italy), Fabien Laguillaumie (Université Claude Bernard Lyon 1/LIP, France), Federico Savasta (Università di Catania, Italy / Scuola Superiore di Catania, Italy), Ida Tucker (Ens de Lyon/LIP, France)
-
iO Without Multilinear Maps: New Paradigms via Low-Degree Weak Pseudorandom Generators and Security Amplification
Prabhanjan Ananth (MIT), Aayush Jain (UCLA), Huijia Lin (University of Washington), Christian Matt (Concordium), Amit Sahai (UCLA)
-
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin (Monash University), Ron Steinfeld (Monash University), Joseph K. Liu (Monash University), Dongxi Liu (Data61, CSIRO)
-
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen (Boston University and Northeastern University), abhi shelat (Northeastern University), Daniel Wichs (Northeastern University)
-
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi (DCS Center, Chinese Academy of Sciences and IIE, Chinese Academy of Sciences), Siwei Sun (DCS Center, Chinese Academy of Sciences and IIE, Chinese Academy of Sciences), Yu Sasaki (NTT Secure Platform Laboratories, Japan), Chaoyun Li (imec-COSIC, Dept. Electrical Engineering (ESAT), KU Leuven, Belgium), Lei Hu (DCS Center, Chinese Academy of Sciences and IIE, Chinese Academy of Sciences)
-
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
Sam Kim (Stanford University), David J. Wu (University of Virginia)
-
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh (Aarhus University), Mark Simkin (Aarhus University)
-
Match Me if You Can: Matchmaking Encryption and its Applications
Giuseppe Ateniese (Stevens Institute of Technology, USA), Danilo Francati (Stevens Institute of Technology, USA), David Nunez (NuCypher), Daniele Venturi (Sapienza University of Rome, Italy)
-
Scalable Zero Knowledge with no Trusted Setup
Eli Ben-Sasson (Technion), Iddo Bentov (Cornell Tech), Yinon Horesh (Technion), Michael Riabzev (Technion)
-
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti (IOHK), Yevgeniy Dodis (New York University), Harish Karthikeyan (New York Univserity), Stefano Tessaro (University of Washington)
-
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu (Princeton University), Mark Zhandry (Princeton University)
-
Broadcast and Trace with N^\epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal (UT Austin), Willy Quach (Northeastern University), Brent Waters (UT Austin and NTT Research), Daniel Wichs (Northeastern University)
-
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata (AIST), Ryo Nishimaki (NTT Secure Platform Laboratories), Shota Yamada (AIST), Takashi Yamakawa (NTT Secure Platform Laboratories)
-
Highly Efficient Key Exchange Protocols with Optimal Tightness
Katriel Cohn-Gordon (University of Oxford), Cas Cremers (CISPA Helmholtz Center for Information Security), Kristian Gjøsteen (NTNU - Norwegian University of Science and Technology), Håkon Jacobsen (McMaster University, Hamilton), Tibor Jager (Paderborn University)
-
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal (Carnegie Mellon University), Yanyi Liu (Tsinghua University), Yifan Song (Carnegie Mellon University)
-
Quantum Indistinguishability of Random Sponges
Jan Czajkowski (QuSoft, University of Amsterdam), Andreas Hülsing (Technische Universiteit Eindhoven), Christian Schaffner (QuSoft, University of Amsterdam)
-
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal (CMU), Aayush Jain (UCLA), Amit Sahai (UCLA)
-
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie (UC Berkeley), Jiaheng Zhang (UC Berkeley), Yupeng Zhang (UC Berkeley and Texas A&M), Charalampos Papamanthou (University of Maryland), Dawn Song (UC Berkeley)
-
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
Divesh Aggarwal (National University of Singapore), Ivan Damgård (Aarhus University), Jesper Buus Nielsen (Aarhus University), Maciej Obremski (National University of Singapore), Erick Purwanto (National University of Singapore), João L. Ribeiro (Imperial College London), Mark Simkin (Aarhus University)
-
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don (CWI), Serge Fehr (CWI & Leiden University), Christian Majenz (University of Amsterdam & ILLC), Christian Schaffner (University of Amsterdam & ILLC)
-
Non-Interactive Non-Malleability from Quantum Supremacy
Yael Tauman Kalai (Microsoft Research New England and MIT), Dakshita Khurana (Microsoft Research New England and UIUC)
-
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgård (Aarhus University), Kasper Green Larsen (Aarhus University), Jesper Buus Nielsen (Aarhus University)
-
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek (Princeton University), Fermi Ma (Princeton University), Mark Zhandry (Princeton University)
-
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio (IMDEA Software Institute), Daniele Venturi (Sapienza, University of Rome)
-
Unifying Leakage Models on a Rényi Day
Thomas Prest (PQShield), Dahmun Goudarzi (PQShield), Ange Martinelli (Thales), Alain Passelègue (INRIA, ENS Lyon)
-
Low Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent (Inria), Ferdinand Sibleyras (Inria)
-
Cryptographic Sensing
Yuval Ishai (Technion), Eyal Kushilevitz (Technion), Rafail Ostrovsky (UCLA), Amit Sahai (UCLA)
-
Fully Secure Attribute-Based Encryption for t-CNF from LWE
Rotem Tsabary (Weizmann Institute of Science)
-
Universally Composable Secure Computation with Corrupted Tokens
Nishanth Chandran (Microsoft Research, India), Wutichai Chongchitmate (Chulalongkorn University, Thailand), Rafail Ostrovsky (UCLA, USA), Ivan Visconti (University of Salerno, Italy)
-
Non-Malleable Codes for Decision Trees
Marshall Ball (Columbia University), Siyao Guo (New York University Shanghai), Daniel Wichs (Northeastern University)
-
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag (Cornell Tech), Ilan Komargodski (Cornell Tech --> NTT Research), Rafael Pass (Cornell Tech)
-
On the Plausibility of Fully Homomorphic Encryption for RAMs
Ariel Hamlin (Department of Computer Science, Northeastern University, Boston, Massachusetts, USA.), Justin Holmgren (Department of Computer Science, Princeton University, Princeton, New Jersey, USA.), Mor Weiss (Department of Computer Science, IDC Herzliya, Herzliya, Israel.), Daniel Wichs (Department of Computer Science, Northeastern University, Boston, Massachusetts, USA.)
-
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal (IIT Madras), Monosij Maitra (IIT Madras), Shota Yamada (AIST)
-
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert (University of Michigan), Sina Shiehian (University of Michigan)
-
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas (Bar Ilan University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University), Avishay Yanai (Bar Ilan University)
-
Proofs of Replicated Storage Without Timing Assumptions
Ivan Damgård (Aarhus University), Chaya Ganesh (Aarhus University), Claudio Orlandi (Aarhus University)
-
Memory-Hard Functions from Cryptographic Primitives
Binyi Chen (UC Santa Barbara), Stefano Tessaro (University of Washington)
-
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov (Chinese University of Hong Kong), Yuval Ishai (Technion), Akshayaram Srinivasan (UC Berkeley)
-
ABE for DFA from k-Lin
Junqing Gong (CNRS, ENS and PSL), Brent Waters (University of Texas at Austin and NTT Research), Hoeteck Wee (CNRS, ENS and PSL)
-
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Santanu Sarkar (Indian Institute of Technology Madras, Chennai, India), Lei Hu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Huaxiong Wang (Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University Singapore, Singapore), Yanbin Pan (Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China)
-
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue (NEC Corporation, Japan), Tetsu Iwata (Nagoya University, Japan), Kazuhiko Minematsu (NEC Corporation, Japan), Bertram Poettering (Royal Holloway, University of London, and IBM Research Zurich)
-
Explicit Rate-1 Non-malleable Codes for Local Tampering
Divya Gupta (Microsoft Research), Hemanta K. Maji (Purdue University), Mingyuan Wang (Purdue University)
-
Symmetric Primitives with Structured Secrets
Navid Alamati (University of Michigan), Hart Montgomery (Fujitsu Labs of America), Sikhar Patranabis (IIT Kharagpur)
-
Trapdoor Hash Functions and their Applications
Nico Döttling (CISPA Helmholtz Center), Sanjam Garg (University of California, Berkeley), Yuval Ishai (Technion), Giulio Malavolta (Carnegie Mellon University), Tamer Mour (Weizmann Institute of Science), Rafail Ostrovsky (University of California, Los Angeles)
-
Nonces are Noticed: AEAD Revisited
Mihir Bellare (University of California San Diego), Ruth Ng (University of California San Diego), Bjorn Tackmann (IBM)
-
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta (Carnegie Mellon University), Sri Aravinda Krishnan Thyagarajan (Friedrich-Alexander University Erlangen-Nürnberg )
-
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi (MIT), Willy Quach (Northeastern University), Ron D. Rothblum (Technion), Daniel Wichs (Northeastern University), David J. Wu (University of Virginia)
-
Synchronous, with a Chance of Partition Tolerance
Yue Guo (Cornell and Thunder Research), Rafael Pass (Cornell and Thunder Research), Elaine Shi (Cornell and Thunder Research)
-
Quantum security proofs using semi-classical oracles
Andris Ambainis (University of Latvia), Mike Hamburg (Rambus Security Division), Dominique Unruh (University of Tartu)
-
Subvector Commitments with Applications to Succinct Arguments
Russell W. F. Lai (Friedrich-Alexander University Erlangen-Nürnberg), Giulio Malavolta (Carnegie Mellon University)
-
Reusable Non-Interactive Secure Computation
Melissa Chase (Microsoft Research, Redmond), Yevgeniy Dodis (New York University), Yuval Ishai (Technion), Daniel Kraschewski (TNG Technology Consulting GmbH), Tianren Liu (MIT), Rafail Ostrovsky (UCLA), Vinod Vaikuntanathan (MIT)
-
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula (Weizmann Institute of Science), Brent Waters (University of Texas at Austin and NTT Research)
-
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh (Stanford University), Elette Boyle (IDC Herzliya), Henry Corrigan-Gibbs (Stanford University), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion)
-
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen (University of California, Santa Barbara), Yilei Chen (VISA Research), Kristina Hostáková (TU Darmstadt), Pratyay Mukherjee (VISA Research)
-
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang (School of Computer Science and Technology, Shandong University, Jinan, China; Department of Computing,The Hong Kong Polytechnic University, Hong Kong), Man Ho Au (Department of Computing,The Hong Kong Polytechnic University, Hong Kong), Zhenfei Zhang (Algorand, USA), Qiuliang Xu (School of Software, Shandong University, Jinan, China), Zuoxia Yu (Department of Computing,The Hong Kong Polytechnic University, Hong Kong), William Whyte (Qualcomm Technologies Incorporated, USA)
-
Public-Key Cryptography in the Fine-Grained Setting
Rio LaVigne (MIT), Andrea Lincoln (MIT), Virginia Vassilevska Williams (MIT)
-
The Privacy Blanket of the Shuffle Model
Borja Balle (Independent researcher), James Bell (The Alan Turing Institute), Adria Gascon (The Alan Turing Institute / Warwick University), Kobbi Nissim (Georgetown University)
-
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton (University of Florida), Thomas Shrimpton (University of Florida)
-
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle (IBM Research - Zurich), Vadim Lyubashevsky (IBM Research - Zurich), Gregor Seiler (IBM Research - Zurich, ETH Zurich)
-
Asymmetric Message Franking: Secure Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi (Cornell University), Paul Grubbs (Cornell Tech), Julia Len (Cornell University), Ian Miers (Cornell Tech), Thomas Ristenpart (Cornell Tech)
-
On Round-Optimal Statistical Zero-Knowledge Arguments
Nir Bitansky (Tel Aviv University), Omer Paneth (MIT)
-
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa (NTT Secure Platform Laboratories), Takahiro Matsuda (National Institute of Advanced Industrial Science and Technology), Keisuke Tanaka (Tokyo Institute of Technology)
-
Simple Proofs of Space-Time and Rational Proofs of Storage
Tal Moran (IDC Herzliya), Ilan Orlov (Outbrain)
-
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal (Harvard University), Yi-Hsiu Chen (Harvard University), Thibaut Horel (Harvard University), Salil Vadhan (Harvard University)
-
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley (University of California, Irvine), Stanislaw Jarecki (University of California, Irvine), Jiayu Xu (University of California, Irvine)
-
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
Dan Boneh (Stanford University), Benedikt Bünz (Stanford University), Ben Fisch (Stanford University)
-
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen (imec-COSIC, KU Leuven), Eran Lambooij (University of Haifa), Bart Mennink (Digital Security Group, Radboud University)
-
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle (IDC Herzliya), Geoffroy Couteau (Karlsruhe Institute of Technology), Niv Gilboa (Ben-Gurion University of the Negev), Yuval Ishai (Technion), Lisa Kohl (Karlsruhe Institute of Technology), Peter Scholl (Aarhus University)
-
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park (MIT and Harvard), Adam Sealfon (MIT)