ASIACRYPT 2019:
Shiho Moriai and Steven Galbraith (Eds.):
Kobe, Japan
December 8-12, 2019
Proceedings.
Crypto database info for ASIACRYPT 2019
Organizational Committee
Program Chairs:
Shiho Moriai and Steven Galbraith
General Chair:
Mitsuru Matsui
Program Committee
Shweta Agrawal
Gorjan Alagic
Shi Bai
Zhenzhen Bao
Paulo Barreto
Lejla Batina
Sonia Belaïd
Olivier Blazy
Colin Boyd
Xavier Boyen
Nishanth Chandran
Melissa Chase
Yilei Chen
Chen-Mou Cheng
Nils Fleischhacker
Jun Furukawa
David Galindo
Romain Gay
Jian Guo
Andreas Hülsing
Seokhie Hong
Takanori Isobe
David Jao
Jérémy Jean
Elena Kirshanova
Virginie Lallemand
Jooyoung Lee
Helger Lipmaa
Feng-Hao Liu
Atul Luykx
Hemanta K. Maji
Giorgia Azzurra Marson
Daniel Masny
Takahiro Matsuda
Brice Minaud
David Naccache
Kartik Nayak
Khoa Nguyen
Svetla Nikova
Carles Padró
Jiaxin Pan
Arpita Patra
Thomas Peters
Raphael C.-W. Phan
Duong Hieu Phan
Carla Ràfols
Ling Ren
Yu Sasaki
Junji Shikata
Ron Steinfeld
Qiang Tang
Mehdi Tibouchi
Hoeteck Wee
Mark Zhandry
Fangguo Zhang
- Invited Lecture
- Best Paper
- Lattices (1)
- Middle-Product Learning with Rounding Problem and Its Applications, 55-81, Shi Bai, Zhenfei Zhang, Adeline Roux-Langlois, Weiqiang Wen, Katharina Boudgoust, Dipayan Das
bib info - A Novel CCA Attack Using Decryption Errors Against LAC, 82-111, Thomas Johansson, Qian Guo, Jing Yang
bib info - Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More (eprint version), 112-141, Elaine Shi, Prabhanjan Ananth, Xiong Fan
bib info
- Middle-Product Learning with Rounding Problem and Its Applications, 55-81, Shi Bai, Zhenfei Zhang, Adeline Roux-Langlois, Weiqiang Wen, Katharina Boudgoust, Dipayan Das
- Symmetric Cryptography (1)
- 4-Round Luby-Rackoff Construction is a qPRP, 145-174, Tetsu Iwata, Akinori Hosoyamada
bib info - Indifferentiability of Truncated Random Permutations, 175-195, Jooyoung Lee, Byeonghak Lee, Wonseok Choi
bib info - Anomalies and Vector Space Search: Tools for S-Box Analysis, 196-223, Léo Perrin, Shizhu Tian, Xavier Bonnetain
bib info
- 4-Round Luby-Rackoff Construction is a qPRP, 145-174, Tetsu Iwata, Akinori Hosoyamada
- Isogenies (1)
- CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations, 227-247, Thorsten Kleinjung, Frederik Vercauteren, Ward Beullens
bib info - Verifiable Delay Functions from Supersingular Isogenies and Pairings, 248-277, Christophe Petit, Antonio Sanso, Luca De Feo, Simon Masson
bib info - Strongly Secure Authenticated Key Exchange from Supersingular Isogenies, 278-308, Man Ho Au, Kunpeng Wang, Haiyang Xue, Xiu Xu, Song Tian
bib info
- CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations, 227-247, Thorsten Kleinjung, Frederik Vercauteren, Ward Beullens
- Obfuscation
- Dual-Mode NIZKs from Obfuscation (eprint version), 311-341, Dennis Hofheinz, Bogdan Ursu
bib info - Output Compression, MPC, and iO for Turing Machines, 342-370, Amit Sahai, Brent Waters, Venkata Koppula, Saikrishna Badrinarayanan, Rex Fernando
bib info - Collusion Resistant Watermarking Schemes for Cryptographic Functionalities, 371-398, Junzuo Lai, Man Ho Au, Qiuliang Xu, Zuoxia Yu, Rupeng Yang
bib info
- Dual-Mode NIZKs from Obfuscation (eprint version), 311-341, Dennis Hofheinz, Bogdan Ursu
- Multiparty Computation (1)
- Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound, 401-425, Jiang Zhang, Yu Yu, Shuoyao Zhao, Hanlin Liu
bib info - The Broadcast Message Complexity of Secure Multiparty Computation, 426-455, Sanjam Garg, Abhishek Jain, Aarushi Goel
bib info - Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation, 456-487, Arpita Patra, Divya Ravi
bib info - Efficient UC Commitment Extension with Homomorphism for Free (and Applications), 606-635, Rafael Dowsley, Ignacio Cascudo, Nico Döttling, Bernardo David, Irene Giacomelli, Ivan Damgård
bib info
- Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound, 401-425, Jiang Zhang, Yu Yu, Shuoyao Zhao, Hanlin Liu
- Quantum
- Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice Sieving, 521-551, Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
bib info - Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm, 552-583, Yu Sasaki, María Naya-Plasencia, André Schrottenloher, Akinori Hosoyamada, Xavier Bonnetain
bib info - Quantum Random Oracle Model with Auxiliary Input, 584-614, Keita Xagawa, Takashi Yamakawa, Minki Hhan
bib info - QFactory: Classically-Instructed Remote Secret Qubits Preparation, 615-645, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
bib info
- Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice Sieving, 521-551, Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
- E-cash and blockchain
- Codes
- Lattices (2)
- An LLL Algorithm for Module Lattices, 59-90, Damien Stehlé, Changmin Lee, Alice Pellet-Mary, Alexandre Wallet
bib info - Order-LWE and the Hardness of Ring-LWE with Entropic Secrets, 91-120, Zvika Brakerski, Renen Perlman, Madalina Bolboceanu, Devika Sharma
bib info - On the Non-existence of Short Vectors in Random Module Lattices, 121-150, Ngoc Khanh Nguyen
bib info
- An LLL Algorithm for Module Lattices, 59-90, Damien Stehlé, Changmin Lee, Alice Pellet-Mary, Alexandre Wallet
- Authenticated Encryption
- Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages, 153-182, Elena Andreeva, Arnab Roy, Virginie Lallemand, Reza Reyhanitabar, Damian Vizár, Antoon Purnal
bib info - Anonymous AE, 183-208, Phillip Rogaway, John Chan
bib info - Sponges Resist Leakage: The Case of Authenticated Encryption, 209-240, Jean Paul Degabriele, Christian Janson, Patrick Struck
bib info
- Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages, 153-182, Elena Andreeva, Arnab Roy, Virginie Lallemand, Reza Reyhanitabar, Damian Vizár, Antoon Purnal
- Isogenies (2)
- Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography, 243-272, Michael Naehrig, Joost Renes
bib info - Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves, 273-292, Seokhie Hong, Young-Ho Park, Suhri Kim, Kisoon Yoon
bib info - Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion, 293-322, Yilei Chen, Salim Ali Altuğ
bib info
- Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography, 243-272, Michael Naehrig, Joost Renes
- Multilinear Maps
- On Kilian's Randomization of Multilinear Map Encodings, 325-355, Jean-Sébastien Coron, Hilder V. L. Pereira
bib info - Cryptanalysis of CLT13 Multilinear Maps with Independent Slots, 356-385, Jean-Sébastien Coron, Luca Notarnicola
bib info - Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps, 386-412, Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
bib info
- On Kilian's Randomization of Multilinear Map Encodings, 325-355, Jean-Sébastien Coron, Hilder V. L. Pereira
- Homomorphic Encryption
- Numerical Method for Comparison on Homomorphically Encrypted Numbers, 415-445, Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
bib info - Multi-Key Homomorphic Encryption from TFHE, Hao Chen, Ilaria Chillotti, Yongsoo Song
bib info - Homomorphic Encryption for Finite Automata, 473-502, Shai Halevi, Craig Gentry, Daniele Micciancio, Baiyu Li, Nicholas Genise
bib info
- Numerical Method for Comparison on Homomorphically Encrypted Numbers, 415-445, Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
- Combinatorial Cryptography
- Efficient Explicit Constructions of Multipartite Secret Sharing Schemes, 505-536, Chunming Tang, Qi Chen, Zhiqiang Lin
bib info - Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead, 537-563, Mark Simkin, Michael Raskin
bib info - How to Correct Errors in Multi-server PIR, 564-574, Kaoru Kurosawa
bib info
- Efficient Explicit Constructions of Multipartite Secret Sharing Schemes, 505-536, Chunming Tang, Qi Chen, Zhiqiang Lin
- Multiparty Computation (2)
- UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens, 577-605, Ivan Visconti, Rafail Ostrovsky, Abhishek Jain, Saikrishna Badrinarayanan
bib info - Scalable Private Set Union from Symmetric-Key Techniques, 636-666, Vladimir Kolesnikov, Mike Rosulek, Xiao Wang, Ni Trieu
bib info - Card-Based Cryptography Meets Formal Verification, 488-517, Alexander Koch, Michael Kirsten, Michael Schrempp
bib info
- UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens, 577-605, Ivan Visconti, Rafail Ostrovsky, Abhishek Jain, Saikrishna Badrinarayanan
- Signatures
- Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures, 3-32, Pratyay Mukherjee, Yilei Chen, Nicholas Genise
bib info - Decisional Second-Preimage Resistance: When Does SPR Imply PRE?, 33-62, Daniel J. Bernstein, Andreas Hülsing
bib info - Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions, 63-93, Mohammad Dakhilalian, Daniel Slamanig, Mojtaba Khalili
bib info
- Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures, 3-32, Pratyay Mukherjee, Yilei Chen, Nicholas Genise
- Public Key Encryption (1)
- Simple and Efficient KDM-CCA Secure Public Key Encryption, 97-127, Keisuke Tanaka, Takahiro Matsuda, Fuyuki Kitagawa
bib info - Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem, 128-158, Keisuke Tanaka, Fuyuki Kitagawa, Yusuke Yoshida
bib info - Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications, 159-190, Javier Herranz, Dario Fiore, Antonio Faonio, Carla Ràfols
bib info - iUC: Flexible Universal Composability Made Simple, 191-221, Jan Camenisch, Ralf Küsters, Stephan Krenn, Daniel Rausch
bib info
- Simple and Efficient KDM-CCA Secure Public Key Encryption, 97-127, Keisuke Tanaka, Takahiro Matsuda, Fuyuki Kitagawa
- Side Channels
- Leakage Resilience of the Duplex Construction, 225-255, Bart Mennink, Christoph Dobraunig
bib info - A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules'), 256-284, Elisabeth Oswald, Carolyn Whitnall
bib info - Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages, 285-314, Lejla Batina, Kostas Papagiannopoulos, Christos Andrikos, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
bib info - Simple Refreshing in the Noisy Leakage Model, 315-344, Stefan Dziembowski, Sebastian Faust, Karol Żebrowski
bib info
- Leakage Resilience of the Duplex Construction, 225-255, Bart Mennink, Christoph Dobraunig
- Invited Lecture 2
- Symmetric Cryptography (2)
- The Exchange Attack: How to Distinguish Six Rounds of AES with 288.2 Chosen Plaintexts, 347-370, Sondre Rønjom, Navid Ghaedi Bardeh
bib info - Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC, 371-397, Christian Rechberger, Carlos Cid, Dmitry Khovratovich, Martin R. Albrecht, Lorenzo Grassi, Reinhard Lüftenegger, Markus Schofnegger
bib info - MILP-aided Method of Searching Division Property Using Three Subsets and Applications, 398-427, Jie Guan, Kai Zhang, Bin Hu, Senpeng Wang, Tairong Shi
bib info - Cryptanalysis of GSM Encryption in 2G/3G Networks Without Rainbow Tables, 428-456, Bin Zhang
bib info
- The Exchange Attack: How to Distinguish Six Rounds of AES with 288.2 Chosen Plaintexts, 347-370, Sondre Rønjom, Navid Ghaedi Bardeh
- Functional Encryption
- Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions, 459-488, Junichi Tomida
bib info - Public-Key Function-Private Hidden Vector Encryption (and More), 489-519, Tal Malkin, Abhishek Jain, Mariana Raykova, Alex J. Malozemoff, Brent Carmer, Tancrède Lepoint, Fermi Ma, James Bartusek, Zhengzhong Jin
bib info - Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE, 520-551, Benoît Libert, Radu Titiu
bib info - From Single-Input to Multi-client Inner-Product Functional Encryption, 552-582, Michel Abdalla, Fabrice Benhamouda, Romain Gay
bib info
- Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions, 459-488, Junichi Tomida
- Public Key Encryption (2)
- Rate-1 Trapdoor Functions from the Diffie-Hellman Problem, 585-606, Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Giulio Malavolta, Kevin Liu
bib info - The Local Forking Lemma and Its Application to Deterministic Encryption, 607-636, Mihir Bellare, Wei Dai, Lucy Li
bib info - Fine-Grained Cryptography Revisited, 637-666, Keisuke Tanaka, Yuyu Wang, Shohei Egashira
bib info
- Rate-1 Trapdoor Functions from the Diffie-Hellman Problem, 585-606, Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Giulio Malavolta, Kevin Liu
- Zero Knowledge
- Shorter QA-NIZK and SPS with Tighter Security, 669-699, Masayuki Abe, Miyako Ohkubo, Charanjit S. Jutla, Arnab Roy, Jiaxin Pan, Yuyu Wang
bib info - Efficient Noninteractive Certification of RSA Moduli and Beyond, 700-727, Leonid Reyzin, Sharon Goldberg, Foteini Baldimtsi, Omar Sagga
bib info - Shorter Pairing-Based Arguments Under Standard Assumptions, 728-757, Alonso González, Carla Ràfols
bib info
- Shorter QA-NIZK and SPS with Tighter Security, 669-699, Masayuki Abe, Miyako Ohkubo, Charanjit S. Jutla, Arnab Roy, Jiaxin Pan, Yuyu Wang