Program
19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).
Wednesday, September 3
08:30-09:00 Registration
08:50-09:00 Opening Remarks
09:00-10:15 Session I: Key Exchange (Chair: TBA)
-
Universally Composable Non-Interactive Key Exchange
Eduarda S.V. Freire (Royal Holloway, London, UK), Julia Hesse (Karlsruhe I. of T., Germany), Dennis Hofheinz (Karlsruhe I. of T., Germany) -
Forward Secure Non-Interactive Key Exchange
David Pointcheval (ENS, CNRS & INRIA, France), Olivier Sanders (ENS and Orange Labs, France) -
Secure Key Exchange and Sessions Without Credentials
Ran Canetti (BU, USA), Vladimir Kolesnikov (Bell Labs, USA), Charles Rackoff (Un.of Toronto, Canada), Yevgeniy Vahlis (Bionym Inc, Canada)
-
Relaxed Two-to-one Recoding Schemes
Omkant Pandey (Un. of Illinois, Urbana-Champaign, USA), Kim Ramchen (Un.of Texas, Austin, USA), Brent Waters (Un. of Texas, Austin, USA) -
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone (Cornell Un., USA and Scuola Superiore di Catania, Italy), Claudio Orlandi (Aarhus University, Denmark)
11:35-12:35 Session 3: Invited Talk (Chair: TBA)
- Program Obfuscation via Multilinear Maps
Sanjam Garg (IBM Research T.J. Watson, USA)
15:00-15:50 Session 4: Pseudorandom Function Extensions(Chair: TBA)
-
Constrained Verifiable Random Functions
Georg Fuchsbauer (Institute of Science and Technology, Austria) -
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen (Chinese Academy of Sciences, China), Zongyang Zhang (National Institute of Advanced Industrial Science and Technology, Japan)
16:20-18:00 Session 5: Secure Computation - Foundations and Algorithms(Chair: TBA)
-
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis (Universitat Pompeu Fabra, Barcelona, Spain) -
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins (University of California, Los Angeles, USA), Rafail Ostrovsky (University of California, Los Angeles, USA) -
Publicly Auditable Secure Multi-Party Computation
Carsten Baum (Aarhus University, Denmark), Ivan Damgärd (Aarhus University, Denmark), Claudio Orlandi (Aarhus University, Denmark) -
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury (IIIT Bangalore, India) Arpita Patra (IISc Bangalore, India), Nigel P. Smart (University of Bristol, UK)
Thursday, September 4
09:00-10:15 Session 6: Network Security (Chair: TBA)
-
Statistics on Password Re-Use and Adaptive Strength for Financial Accounts
Daniel V. Bailey (Horst Görtz Inst., Germany) Markus Dürmuth (Horst Görtz Inst., Germany), Christof Paar (Horst Görtz Inst., Germany) -
Efficient Network-Based Enforcement of Data Access Rights
Paul Giura (AT&T , NY, USA), Vladimir Kolesnikov (Bell Labs, NJ, USA), Aris Tentes (NYU, NY, USA), Yevgeniy Vahlis (Bionym Inc, Canada) -
EyeDecrypt - Private Interactions in Plain Sight
Andrea Forte (AT&T Labs, USA), Juan Garay (Yahoo Labs, USA), Trevor Jim (AT&T Labs, USA), Yevgeniy Vahlis (Byonim Inc, Toronto, Canada)
-
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen (East China Normal University, Shanghai, China), Hoeteck Wee (ENS Paris, France) -
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima (Mitsubishi Electric, Japan)
11:35-12:35 Session 8: Invited Talk (Chair: TBA)
- Functional Encryption and its Impact on Cryptography
Hoeteck Wee (ENS Paris, France)
15:00-15:50 Session 9: Cryptanalysis(Chair: TBA)
-
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Yu Sasaki (NTT Secure Platform Laboratories, Tokyo, Japan), Lei Wang (Nanyang Technological University, Singapore) -
Improved Indifferentiable Security Analysis of PHOTON
Yusuke Naito (Mitsubishi Corp. and The Un.of Electro-Comm., Tokyo, Japan), Kazuo Ohta (The Un.of Electro-Comm., Tokyo, Japan)
16:20-17:35 Session 10: Secure Computation - Implementation(Chair: TBA)
-
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore K. Frederiksen (Aarhus Un., Denmark), Thomas P. Jakobsen (Aarhus Un., Denmark), Jesper B. Nielsen (Aarhus Un., Denmark) -
Systematizing Secure Computation for Research and Decision Support
Jason Perry (Rutgers Un., USA), Debayan Gupta (Yale Un., USA), Joan Feigenbaum (Yale Un., USA), Rebecca N. Wright (Rutgers Un., USA) -
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgärd (Aarhus Un., Denmark), Rasmus Lauritsen (Aarhus Un., Denmark), Tomas Toft (Aarhus Un., Denmark)
18:00-20:00 Social event: guided tour of Amalfi
20:30-23:00 Social dinner
Friday, September 5
09:00-10:15 Session 11: Zero Knowledge (Chair: TBA)
-
Efficient NIZK Arguments via Parallel Verification of Benes Networks
Helger Lipmaa (University of Tartu, Estonia) -
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
Abhishek Jain (Boston University and MIT, USA), Omkant Pandey (UIUC, Urbana-Champaign, USA) -
On Adaptively Secure Protocols
Muthuramakrishnan Venkitasubramaniam (University of Rochester, USA)
-
Key-Indistinguishable Message Authentication Codes
Joel Alwen (ETH Zurich, Switzerland), Martin Hirt (ETH Zurich, Switzerland), Ueli Maurer (ETH Zurich, Switzerland), Arpita Patra (IISc Bangalore, India), Pavel Raykov (ETH Zurich, Switzerland) -
Interactive Encryption and Message Authentication
Yevgeniy Dodis (New York University, USA), Dario Fiore (IMDEA Software Institute, Madrid, Spain)
11:35-12:35 Session 13: Invited Talk (Chair: TBA)
- Homomorphic Signatures and Message Authentication Codes
Dario Catalano (University of Catania, Italy)
15:00-15:50 Session 14: Proofs of Space and Erasure(Chair: TBA)
-
Efficient Proofs of Secure Erasure
Nikolaos P. Karvelas (TU Darmstadt, Germany), Aggelos Kiayias (University of Athens, Greece) -
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese (Sapienza, Rome, Italy), Ilario Bonacina (Sapienza, Rome, Italy), Antonio Faonio (Sapienza, Rome, Italy), Nicola Galesi (Sapienza, Rome, Italy)
16:20-17:35 Session 15: Public-Key Encryption(Chair: TBA)
-
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
Takashi Yamakawa (Tokyo Un., Japan), Shota Yamada (AIST and RISEC, Japan), Koji Nuida (AIST and RISEC, Japan), Goichiro Hanaoka (AIST and RISEC, Japan), Noboru Kunihiro (Tokyo Un., Japan) -
On Selective-Opening Attacks Against Encryption Schemes
Rafail Ostrovsky (UCLA, USA), Vanishree Rao (UCLA, USA), Ivan Visconti (Università di Salerno, Italy) -
Narrow Bandwidth is Not Inherent in Reverse Public-Key Encryption
David Naccache (ENS, Paris, France), Rainer Steinwandt (Florida Atlantic Un., USA), Adriana Suiárez (Un. de Léon, Spain), Moti Yung (Google and ColumbiaU., USA)