Asiacrypt 2018:
Thomas Peyrin and Steven D. Galbraith (Eds.):
Asiacrypt 2018,
Brisbane, Australia
December 02-06, 2018
Proceedings.
Organizational Committee
Program Chairs:
General Chair:
General Chair:
Thomas Peyrin and Steven D. Galbraith
Josef Pieprzyk
Josef Pieprzyk
Program Committee
Martin R. Albrecht
Prabhanjan Ananth
Lejla Batina
Sonia Belaid
Daniel J. Bernstein
Chris Brzuska
Bernardo David
Nico Döttling
Léo Ducas
Jens Groth
Dawu Gu
Goichiro Hanaoka
Viet Tung Hoang
Takanori Isobe
Jérémy Jean
Stefan Kölbl
Ilan Komargodski
Kaoru Kurosawa
Virginie Lallemand
Gaëtan Leurent
Benoît Libert
Helger Lipmaa
Atul Luykx
Stefan Mangard
Bart Mennink
Brice Minaud
Mridul Nandi
Khoa Nguyen
Svetla Nikova
Elisabeth Oswald
Arpita Patra
Giuseppe Persiano
Carla Ràfols
Amin Sakzad
Jae Hong Seo
Ling Song
Douglas Stebila
Marc Stevens
Qiang Tang
Mehdi Tibouchi
Yosuke Todo
Dominique Unruh
Gilles Van Assche
Frederik Vercauteren
Bo-Yin Yang
Yu Yu
Aaram Yun
- IACR Distinguished Lecture 25 Years of Linear Cryptanalysis - Early History and Path Search Algorithm by Mitsuru Matsui
- Best Paper Award
- Post-Quantum Cryptanalysis
- Practical Attacks Against the Walnut Digital Signature Scheme, 35-61, Simon R. Blackburn, Ward Beullens
bib info - Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme, 62-92, Jean-Pierre Tillich, Thomas Debris-Alazard
bib info - An Efficient Structural Attack on NIST Submission DAGS, 93-118, Alain Couvreur, Elise Barelli
bib info
- Practical Attacks Against the Walnut Digital Signature Scheme, 35-61, Simon R. Blackburn, Ward Beullens
- Encrypted Storage
- Pattern Matching on Encrypted Streams, 121-148, Pierre-Alain Fouque, Olivier Sanders, Cristina Onete, Nicolas Desmoulins
bib info - SQL on Structurally-Encrypted Databases, 149-180, Seny Kamara, Tarik Moataz
bib info - Parameter-Hiding Order Revealing Encryption, 181-210, David Cash, Feng-Hao Liu, Mark Zhandry, Cong Zhang, Adam O'Neill
bib info
- Pattern Matching on Encrypted Streams, 121-148, Pierre-Alain Fouque, Olivier Sanders, Cristina Onete, Nicolas Desmoulins
- Symmetric-Key Constructions I
- Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security, 213-243, Lei Wang, Chun Guo
bib info - Short Variable Length Domain Extenders with Beyond Birthday Bound Security, 244-274, Mridul Nandi, Bart Mennink, Yu Long Chen
bib info - Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions, 275-304, Kan Yasuda, Akinori Hosoyamada
bib info
- Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security, 213-243, Lei Wang, Chun Guo
- Lattice Crypto I
- Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ, 369-404, Damien Stehlé, Shi Bai, Weiqiang Wen
bib info - Quantum Lattice Enumeration and Tweaking Discrete Pruning, 405-434, Phong Q. Nguyen, Yoshinori Aono, Yixin Shen
bib info - On the Hardness of the Computational Ring-LWR Problem and Its Applications, 435-464, Zhenfeng Zhang, Zhenfei Zhang, Long Chen
bib info
- Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ, 369-404, Damien Stehlé, Shi Bai, Weiqiang Wen
- Symmetric-Key Constructions II
- Lattice Crypto II
- On the Statistical Leak of the GGH13 Multilinear Map and Some Variants, 465-493, Léo Ducas, Alice Pellet-Mary
bib info - LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS, 494-524, Pierre-Alain Fouque, Mehdi Tibouchi, Jonathan Bootle, Thomas Espitau, Claire Delaplace
bib info
- On the Statistical Leak of the GGH13 Multilinear Map and Some Variants, 465-493, Léo Ducas, Alice Pellet-Mary
- Quantum Symmetric Cryptanalysis
- Zero Knowledge
- Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution, 595-626, Jens Groth, Jonathan Bootle, Andrea Cerulli, Mary Maller, Sune Jakobsen
bib info - Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications, 627-656, Masayuki Abe, Miyako Ohkubo, Charanjit S. Jutla, Arnab Roy
bib info
- Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution, 595-626, Jens Groth, Jonathan Bootle, Andrea Cerulli, Mary Maller, Sune Jakobsen
- Invited Talk
Picnic: Postquantum signatures from zero-knowledge proofs by Melissa Chase - JoC Paper I
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model, 253-282, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata
bib info - Symmetric-Key Cryptanalysis
- Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints, 3-34, Lei Hu, Bing Sun, Patrick Derbez, Yosuke Todo, Siwei Sun, Danping Shi
bib info - Cryptanalysis of MORUS, 35-64, Gaëtan Leurent, Yu Sasaki, Maria Eichlseder, Martin M. Lauridsen, Brice Minaud, Tomer Ashur, Yann Rotella, Benoît Viguier
bib info - New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions, 65-95, Jian Guo, San Ling, Ling Song, Danping Shi
bib info - On the Concrete Security of Goldreich's Pseudorandom Generator, 96-124, Geoffroy Couteau, Pierrick Méaux, Yann Rotella, Mélissa Rossi, Aurélien Dupin
bib info
- Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints, 3-34, Lei Hu, Bing Sun, Patrick Derbez, Yosuke Todo, Siwei Sun, Danping Shi
- Public Key and Identity-Based Encryption
- A Framework for Achieving KDM-CCA Secure Public-Key Encryption, 127-157, Keisuke Tanaka, Fuyuki Kitagawa
bib info - Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism, 158-189, Bao Li, Xianhui Lu, Bei Liang, Haiyang Xue, Jingnan He
bib info - Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks, 190-220, Dennis Hofheinz, Dingding Jia, Jiaxin Pan
bib info - Short Digital Signatures and ID-KEMs via Truncation Collision Resistance, 221-250, Tibor Jager, Rafael Kurek
bib info
- A Framework for Achieving KDM-CCA Secure Public-Key Encryption, 127-157, Keisuke Tanaka, Fuyuki Kitagawa
- Side Channels
- New Instantiations of the CRYPTO 2017 Masking Schemes, 285-314, Pierre Karpman, Daniel S. Roche
bib info - Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures, 315-342, Florian Mendel, Stefan Mangard, Maria Eichlseder, Christoph Dobraunig, Robert Primas, Hannes Gross
bib info - Tight Private Circuits: Achieving Probing Security with the Least Refreshing, 343-372, Matthieu Rivain, Sonia Belaïd, Dahmun Goudarzi
bib info - Attacks and Countermeasures for White-box Designs, 373-402, Alex Biryukov, Aleksei Udovenko
bib info
- New Instantiations of the CRYPTO 2017 Masking Schemes, 285-314, Pierre Karpman, Daniel S. Roche
- Signatures
- Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys, 405-434, Michael Backes, Jonas Schneider, Lucjan Hanzlik, Kamil Kluczniak
bib info - Compact Multi-signatures for Smaller Blockchains, 435-464, Gregory Neven, Dan Boneh, Manu Drijvers
bib info - Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption, 465-492, Sherman S. M. Chow, Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong
bib info - Attribute-Based Signatures for Unbounded Languages from Standard Assumptions, 493-522, Nuttapong Attrapadung, Goichiro Hanaoka, Yusuke Sakai, Shuichi Katsumata
bib info
- Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys, 405-434, Michael Backes, Jonas Schneider, Lucjan Hanzlik, Kamil Kluczniak
- Invited Talk
Democracy, security and evidence: let's have all three by Vanessa Teague - JoC Paper II
Learning Strikes Again: The Case of the DRS Signature Scheme, 525-543, Léo Ducas, Yang Yu
bib info - Leakage-Resilient Cryptography & Functional/Inner Product/Predicate Encryption I
- How to Securely Compute with Noisy Leakage in Quasilinear Complexity, 547-574, Antoine Joux, Matthieu Rivain, Dahmun Goudarzi
bib info - Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation, 575-606, Hong-Sheng Zhou, Yu Chen, Yuyu Wang
bib info - Unbounded Inner Product Functional Encryption from Bilinear Maps, 609-639, Katsuyuki Takashima, Junichi Tomida
bib info - Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption, 640-672, Tatsuaki Okamoto, Katsuyuki Takashima, Pratish Datta
bib info - Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding, 673-702, Hoeteck Wee, Jie Chen, Junqing Gong
bib info
- How to Securely Compute with Noisy Leakage in Quasilinear Complexity, 547-574, Antoine Joux, Matthieu Rivain, Dahmun Goudarzi
- MPC
- On Multiparty Garbling of Arithmetic Circuits, 3-33, Aner Ben-Efraim
bib info -
FreeIF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free, 34-58, Vladimir Kolesnikov
bib info - Secure Computation with Low Communication from Cross-Checking, 59-85, S. Dov Gordon, Samuel Ranellucci, Xiao Wang
bib info - Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT), 86-117, Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
bib info - Non-interactive Secure Computation from One-Way Functions, 118-138, Ivan Visconti, Rafail Ostrovsky, Abhishek Jain, Saikrishna Badrinarayanan
bib info
- On Multiparty Garbling of Arithmetic Circuits, 3-33, Aner Ben-Efraim
- Functional/Inner Product/Predicate Encryption II
- Decentralized Multi-Client Functional Encryption for Inner Product, 703-732, David Pointcheval, Duong Hieu Phan, Romain Gay, Jérémy Chotard, Edouard Dufour Sans
bib info - Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p, 733-764, Fabien Laguillaumie, Guilhem Castagnos, Ida Tucker
bib info
- Decentralized Multi-Client Functional Encryption for Inner Product, 703-732, David Pointcheval, Duong Hieu Phan, Romain Gay, Jérémy Chotard, Edouard Dufour Sans
- ORAM
- Secret Sharing
- Homomorphic Secret Sharing for Low Degree Polynomials, 279-309, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
bib info - Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols, 332-362, Amos Beimel, Naty Peter
bib info - Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem, 310-331, Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
bib info
- Homomorphic Secret Sharing for Low Degree Polynomials, 279-309, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
- Real World Protocols
- A Universally Composable Framework for the Privacy of Email Ecosystems, 191-221, Aggelos Kiayias, Thomas Zacharias, Pyrros Chaidos, Olga Fourtounelli
bib info - State Separation for Code-Based Game-Playing Proofs, 222-249, Markulf Kohlweiss, Cédric Fournet, Chris Brzuska, Antoine Delignat-Lavaud, Konrad Kohbrok
bib info - Security of the Blockchain Against Long Delay Attack, 250-275, Yuliang Zheng, Quan Yuan, Puwen Wei
bib info
- A Universally Composable Framework for the Privacy of Email Ecosystems, 191-221, Aggelos Kiayias, Thomas Zacharias, Pyrros Chaidos, Olga Fourtounelli
- Isogeny Crypto
- Towards Practical Key Exchange from Ordinary Isogeny Graphs, 365-394, Benjamin Smith, Luca De Feo, Jean Kieffer
bib info - CSIDH: An Efficient Post-Quantum Commutative Group Action, 395-427, Tanja Lange, Wouter Castryck, Joost Renes, Chloe Martindale, Lorenz Panny
bib info - Computing Supersingular Isogenies on Kummer Surfaces, 428-456, Craig Costello
bib info
- Towards Practical Key Exchange from Ordinary Isogeny Graphs, 365-394, Benjamin Smith, Luca De Feo, Jean Kieffer
- Foundations
- Robustly Reusable Fuzzy Extractor from Standard Assumptions, 459-489, Shengli Liu, Yunhua Wen
bib info - Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH, 490-518, Tibor Jager, Jiaxin Pan, Rafael Kurek
bib info - Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove, 519-550, Marc Fischlin, Jean Paul Degabriele
bib info
- Robustly Reusable Fuzzy Extractor from Standard Assumptions, 459-489, Shengli Liu, Yunhua Wen