September 3-5, 2014, Amalfi, Italy.

Program

Note: The length of each regular talk is 20 minutes. Tuesday, September 2

19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).

Wednesday, September 3

08:30-09:00 Registration
08:50-09:00 Opening Remarks

09:00-10:15 Session I: Key Exchange (Chair: TBA)

  • Universally Composable Non-Interactive Key Exchange
    Eduarda S.V. Freire (Royal Holloway, London, UK), Julia Hesse (Karlsruhe I. of T., Germany), Dennis Hofheinz (Karlsruhe I. of T., Germany)
  • Forward Secure Non-Interactive Key Exchange
    David Pointcheval (ENS, CNRS & INRIA, France), Olivier Sanders (ENS and Orange Labs, France)
  • Secure Key Exchange and Sessions Without Credentials
    Ran Canetti (BU, USA), Vladimir Kolesnikov (Bell Labs, USA), Charles Rackoff (Un.of Toronto, Canada), Yevgeniy Vahlis (Bionym Inc, Canada)
10:15-11:05 Session 2: Multilinear Maps and Obfuscation (Chair: TBA)
  • Relaxed Two-to-one Recoding Schemes
    Omkant Pandey (Un. of Illinois, Urbana-Champaign, USA), Kim Ramchen (Un.of Texas, Austin, USA), Brent Waters (Un. of Texas, Austin, USA)
  • Obfuscation ==> (IND-CPA Security =/=> Circular Security)
    Antonio Marcedone (Cornell Un., USA and Scuola Superiore di Catania, Italy), Claudio Orlandi (Aarhus University, Denmark)
11:05-11:35 Coffee break


11:35-12:35 Session 3: Invited Talk (Chair: TBA)

  • Program Obfuscation via Multilinear Maps
    Sanjam Garg (IBM Research T.J. Watson, USA)
12:35-15:00 Lunch break


15:00-15:50 Session 4: Pseudorandom Function Extensions(Chair: TBA)

  • Constrained Verifiable Random Functions
    Georg Fuchsbauer (Institute of Science and Technology, Austria)
  • Publicly Evaluable Pseudorandom Functions and Their Applications
    Yu Chen (Chinese Academy of Sciences, China), Zongyang Zhang (National Institute of Advanced Industrial Science and Technology, Japan)
15:50-16:20 Coffee break


16:20-18:00 Session 5: Secure Computation - Foundations and Algorithms(Chair: TBA)

  • On the Classification of Finite Boolean Functions up to Fairness
    Nikolaos Makriyannis (Universitat Pompeu Fabra, Barcelona, Spain)
  • Communication-Efficient MPC for General Adversary Structures
    Joshua Lampkins (University of California, Los Angeles, USA), Rafail Ostrovsky (University of California, Los Angeles, USA)
  • Publicly Auditable Secure Multi-Party Computation
    Carsten Baum (Aarhus University, Denmark), Ivan Damgärd (Aarhus University, Denmark), Claudio Orlandi (Aarhus University, Denmark)
  • Reducing the Overhead of MPC over a Large Population
    Ashish Choudhury (IIIT Bangalore, India) Arpita Patra (IISc Bangalore, India), Nigel P. Smart (University of Bristol, UK)

Thursday, September 4

09:00-10:15 Session 6: Network Security (Chair: TBA)

  • Statistics on Password Re-Use and Adaptive Strength for Financial Accounts
    Daniel V. Bailey (Horst Görtz Inst., Germany) Markus Dürmuth (Horst Görtz Inst., Germany), Christof Paar (Horst Görtz Inst., Germany)
  • Efficient Network-Based Enforcement of Data Access Rights
    Paul Giura (AT&T , NY, USA), Vladimir Kolesnikov (Bell Labs, NJ, USA), Aris Tentes (NYU, NY, USA), Yevgeniy Vahlis (Bionym Inc, Canada)
  • EyeDecrypt - Private Interactions in Plain Sight
    Andrea Forte (AT&T Labs, USA), Juan Garay (Yahoo Labs, USA), Trevor Jim (AT&T Labs, USA), Yevgeniy Vahlis (Byonim Inc, Toronto, Canada)
10:15-11:05 Session 7: Functional Encryption (Chair: TBA)
  • Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
    Jie Chen (East China Normal University, Shanghai, China), Hoeteck Wee (ENS Paris, France)
  • Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
    Katsuyuki Takashima (Mitsubishi Electric, Japan)
11:05-11:35 Coffee break


11:35-12:35 Session 8: Invited Talk (Chair: TBA)

  • Functional Encryption and its Impact on Cryptography
    Hoeteck Wee (ENS Paris, France)
12:35-15:00 Lunch break


15:00-15:50 Session 9: Cryptanalysis(Chair: TBA)

  • Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
    Yu Sasaki (NTT Secure Platform Laboratories, Tokyo, Japan), Lei Wang (Nanyang Technological University, Singapore)
  • Improved Indifferentiable Security Analysis of PHOTON
    Yusuke Naito (Mitsubishi Corp. and The Un.of Electro-Comm., Tokyo, Japan), Kazuo Ohta (The Un.of Electro-Comm., Tokyo, Japan)
15:50-16:20 Coffee break


16:20-17:35 Session 10: Secure Computation - Implementation(Chair: TBA)

  • Faster Maliciously Secure Two-Party Computation Using the GPU
    Tore K. Frederiksen (Aarhus Un., Denmark), Thomas P. Jakobsen (Aarhus Un., Denmark), Jesper B. Nielsen (Aarhus Un., Denmark)
  • Systematizing Secure Computation for Research and Decision Support
    Jason Perry (Rutgers Un., USA), Debayan Gupta (Yale Un., USA), Joan Feigenbaum (Yale Un., USA), Rebecca N. Wright (Rutgers Un., USA)
  • An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
    Ivan Damgärd (Aarhus Un., Denmark), Rasmus Lauritsen (Aarhus Un., Denmark), Tomas Toft (Aarhus Un., Denmark)

18:00-20:00 Social event: guided tour of Amalfi

20:30-23:00 Social dinner

Friday, September 5

09:00-10:15 Session 11: Zero Knowledge (Chair: TBA)

  • Efficient NIZK Arguments via Parallel Verification of Benes Networks
    Helger Lipmaa (University of Tartu, Estonia)
  • Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
    Abhishek Jain (Boston University and MIT, USA), Omkant Pandey (UIUC, Urbana-Champaign, USA)
  • On Adaptively Secure Protocols
    Muthuramakrishnan Venkitasubramaniam (University of Rochester, USA)
10:15-11:05 Session 12: Message Authentication (Chair: TBA)
  • Key-Indistinguishable Message Authentication Codes
    Joel Alwen (ETH Zurich, Switzerland), Martin Hirt (ETH Zurich, Switzerland), Ueli Maurer (ETH Zurich, Switzerland), Arpita Patra (IISc Bangalore, India), Pavel Raykov (ETH Zurich, Switzerland)
  • Interactive Encryption and Message Authentication
    Yevgeniy Dodis (New York University, USA), Dario Fiore (IMDEA Software Institute, Madrid, Spain)
11:05-11:35 Coffee break


11:35-12:35 Session 13: Invited Talk (Chair: TBA)

  • Homomorphic Signatures and Message Authentication Codes
    Dario Catalano (University of Catania, Italy)
12:35-15:00 Lunch break


15:00-15:50 Session 14: Proofs of Space and Erasure(Chair: TBA)

  • Efficient Proofs of Secure Erasure
    Nikolaos P. Karvelas (TU Darmstadt, Germany), Aggelos Kiayias (University of Athens, Greece)
  • Proofs of Space: When Space is of the Essence
    Giuseppe Ateniese (Sapienza, Rome, Italy), Ilario Bonacina (Sapienza, Rome, Italy), Antonio Faonio (Sapienza, Rome, Italy), Nicola Galesi (Sapienza, Rome, Italy)
15:50-16:20 Coffee break


16:20-17:35 Session 15: Public-Key Encryption(Chair: TBA)

  • Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Takashi Yamakawa (Tokyo Un., Japan), Shota Yamada (AIST and RISEC, Japan), Koji Nuida (AIST and RISEC, Japan), Goichiro Hanaoka (AIST and RISEC, Japan), Noboru Kunihiro (Tokyo Un., Japan)
  • On Selective-Opening Attacks Against Encryption Schemes
    Rafail Ostrovsky (UCLA, USA), Vanishree Rao (UCLA, USA), Ivan Visconti (Università di Salerno, Italy)
  • Narrow Bandwidth is Not Inherent in Reverse Public-Key Encryption
    David Naccache (ENS, Paris, France), Rainer Steinwandt (Florida Atlantic Un., USA), Adriana Suiárez (Un. de Léon, Spain), Moti Yung (Google and ColumbiaU., USA)