September 3-5, 2014, Amalfi, Italy.
Accepted papers
-
Universally Composable Non-Interactive Key Exchange
Eduarda S.V. Freire (Royal Holloway, University of London, United Kingdom),
Julia Hesse (Karlsruhe Institute of Technology, Germany),
Dennis Hofheinz (Karlsruhe Institute of Technology, Germany)
-
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima (Mitsubishi Electric, Japan)
-
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore K. Frederiksen (Aarhus University, Denmark),
Thomas P. Jakobsen (Aarhus University, Denmark),
Jesper B. Nielsen (Aarhus University, Denmark)
-
Key-Indistinguishable Message Authentication Codes
Joel Alwen (ETH Zurich, Switzerland),
Martin Hirt (ETH Zurich, Switzerland),
Ueli Maurer (ETH Zurich, Switzerland),
Arpita Patra (IISc Bangalore, India),
Pavel Raykov (ETH Zurich, Switzerland)
-
Forward Secure Non-Interactive Key Exchange
David Pointcheval (ENS, CNRS & INRIA, France),
Olivier Sanders (ENS and Orange Labs, France)
-
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis (Universitat Pompeu Fabra, Barcelona, Spain)
-
Efficient Proofs of Secure Erasure
Nikolaos P. Karvelas (TU Darmstadt, Germany),
Aggelos Kiayias (University of Athens, Greece)
-
Interactive Encryption and Message Authentication
Yevgeniy Dodis (New York University, USA),
Dario Fiore (IMDEA Software Institute, Madrid, Spain)
-
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen (East China Normal University, Shanghai, China),
Hoeteck Wee (ENS Paris, France)
-
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone (Cornell University, USA and Scuola Superiore di Catania, University of Catania, Italy),
Claudio Orlandi (Aarhus University, Denmark)
-
Publicly Auditable Secure Multi-Party Computation
Carsten Baum (Aarhus University, Denmark),
Ivan Damgärd (Aarhus University, Denmark),
Claudio Orlandi (Aarhus University, Denmark)
-
Statistics on password re-use and adaptive strength for financial accounts
Daniel V. Bailey (Horst Görtz Institute for IT Security, Germany)
Markus Dürmuth (Horst Görtz Institute for IT Security, Germany),
Christof Paar (Horst Görtz Institute for IT Security, Germany)
-
Generic Attacks on Strengthened HMAC: $n$-bit Secure HMAC Requires Key in All Blocks
Yu Sasaki (NTT Secure Platform Laboratories, Tokyo, Japan),
Lei Wang (Nanyang Technological University, Singapore)
-
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins (University of California, Los Angeles, USA),
Rafail Ostrovsky (University of California, Los Angeles, USA)
-
Improved Indifferentiable Security Analysis of PHOTON
Yusuke Naito (Mitsubishi Electric Corporation and The University of Electro-Communications, Tokyo, Japan),
Kazuo Ohta (The University of Electro-Communications, Tokyo, Japan)
-
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
Takashi Yamakawa (The University of Tokyo, Japan),
Shota Yamada (AIST and RISEC, Japan),
Koji Nuida (AIST and RISEC, Japan),
Goichiro Hanaoka (AIST and RISEC, Japan),
Noboru Kunihiro (The University of Tokyo, Japan)
-
Secure Key Exchange and Sessions Without Credentials
Ran Canetti (Boston University, USA),
Vladimir Kolesnikov (Bell Labs, USA),
Charles Rackoff (University of Toronto, Canada),
Yevgeniy Vahlis (Bionym Inc, Toronto, Canada)
-
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury (IIIT Bangalore, India)
Arpita Patra (IISc Bangalore, India),
Nigel P. Smart (University of Bristol, UK)
-
Relaxed Two-to-one Recoding Schemes
Omkant Pandey (University of Illinois, Urbana-Champaign, USA),
Kim Ramchen (University of Texas at Austin, USA),
Brent Waters (University of Texas at Austin, USA)
-
Constrained Verifiable Random Functions
Georg Fuchsbauer (Institute of Science and Technology, Austria)
-
Systematizing Secure Computation for Research and Decision Support
Jason Perry (Rutgers University, USA),
Debayan Gupta (Yale University, USA),
Joan Feigenbaum (Yale University, USA),
Rebecca N. Wright (Rutgers University, USA)
-
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese (Sapienza Univ. of Rome, Italy),
Ilario Bonacina (Sapienza Univ. of Rome, Italy),
Antonio Faonio (Sapienza Univ. of Rome, Italy),
Nicola Galesi (Sapienza Univ. of Rome, Italy)
-
Efficient Network-Based Enforcement of Data Access Rights
Paul Giura (AT&T Security Research Center, New York, NY, USA),
Vladimir Kolesnikov (Bell Labs, Murray Hill, NJ, USA),
Aris Tentes (New York University, New York, USA),
Yevgeniy Vahlis (Bionym Inc, Toronto, Canada)
-
Efficient NIZK Arguments via Parallel Verification of Benes Networks
Helger Lipmaa (University of Tartu, Estonia)
-
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgärd (Aarhus University, Denmark),
Rasmus Lauritsen (Aarhus University, Denmark),
Tomas Toft (Aarhus University, Denmark)
-
On Selective-Opening Attacks Against Encryption Schemes
Rafail Ostrovsky (UCLA, USA)
Vanishree Rao (UCLA, USA),
Ivan Visconti (University of Salerno, Italy)
-
EyeDecrypt -- Private Interactions in Plain Sight
Andrea Forte (AT&T Labs, USA),
Juan Garay (Yahoo Labs, USA),
Trevor Jim (AT&T Labs, USA),
Yevgeniy Vahlis (Byonim Inc, Toronto, Canada)
-
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
Abhishek Jain (Boston University and MIT, USA),
Omkant Pandey (UIUC, Urbana-Champaign, USA)
-
Narrow Bandwidth is Not Inherent in Reverse Public-Key Encryption
David Naccache (ENS, Paris, France),
Rainer Steinwandt (Florida Atlantic University, USA),
Adriana Suiárez (Universidad de Léon, Spain),
Moti Yung (Google Inc. and Columbia University)
-
On Adaptively Secure Protocols
Muthuramakrishnan Venkitasubramaniam (University of Rochester, USA)
-
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen (Chinese Academy of Sciences, China),
Zongyang Zhang (National Institute of Advanced Industrial Science and Technology, Japan)