CRYPTO 2019:
Daniele Micciancio and Alexandra Boldyreva (Eds.):
Crypto 2019
Santa Barbara, CA, USA
August 18-22, 2021
Proceedings.
Crypto database info for CRYPTO 2019
Organizational Committee
Program Chairs:
Daniele Micciancio and Alexandra Boldyreva
General Chair:
Daniele Micciancio and Alexandra Boldyreva
General Chair:
Muthuramakrishnan Venkitasubramaniam
Program Committee
Manuel Barbosa
Zvika Brakerski
Mark Bun
Ran Canetti
Dario Catalano
Alessandro Chiesa
Sherman S. M. Chow
Kai-Min Chung
Jean-Sébastien Coron
Nico Döttling
Jean Paul Degabriele
Orr Dunkelman
Tim Güneysu
Felix Günther
Rosario Gennaro
Siyao Guo
Sean Hallgren
Carmit Hazay
Susan Hohenberger
Sorina Ionica
Bhavana Kanukurthi
Vladimir Kolesnikov
Anja Lehmann
Vadim Lyubashevsky
Ilya Mironov
Michael Naehrig
Svetla Nikova
Ryo Nishimaki
Omer Paneth
Charalampos Papamanthou
Chris Peikert
Giuseppe Persiano
Christophe Petit
Thomas Peyrin
Benny Pinkas
Bertram Poettering
Mariana Raykova
Silas Richelson
Adeline Roux-Langlois
Peter Scholl
Dominique Schröder
Thomas Shrimpton
Damien Stehlé
Björn Tackmann
Keisuke Tanaka
Eran Tromer
Daniele Venturi
Xiao Wang
Xiaoyun Wang
Bogdan Warinschi
Mor Weiss
- Lattice-Based ZK
- Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors, 89-114, Chris Peikert, Sina Shiehian
bib info, video - Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications, 115-146, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu
bib info, video - Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications, 147-175, William Whyte, Man Ho Au, Qiuliang Xu, Zuoxia Yu, Rupeng Yang, Zhenfei Zhang
bib info, video - Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs, 176-202, Vadim Lyubashevsky, Jonathan Bootle, Gregor Seiler
bib info, video
- Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors, 89-114, Chris Peikert, Sina Shiehian
- Symmetric Cryptography
- Seedless Fruit Is the Sweetest: Random Number Generation, Revisited, 205-234, Yevgeniy Dodis, Stefano Tessaro, Sandro Coretti, Harish Karthikeyan
bib info, video - Nonces Are Noticed: AEAD Revisited, 235-265, Mihir Bellare, Björn Tackmann, Ruth Ng
bib info, video - How to Build Pseudorandom Functions from Public Random Permutations, 266-293, Bart Mennink, Eran Lambooij, Yu Long Chen
bib info, video
- Seedless Fruit Is the Sweetest: Random Number Generation, Revisited, 205-234, Yevgeniy Dodis, Stefano Tessaro, Sandro Coretti, Harish Karthikeyan
- Mathematical Cryptanalysis
- New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, 297-321, Huaxiong Wang, Lei Hu, Jun Xu, Yanbin Pan, Santanu Sarkar
bib info, video - On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm, 322-351, Léo Ducas, Benjamin Wesolowski, Maxime Plançon
bib info, video
- New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, 297-321, Huaxiong Wang, Lei Hu, Jun Xu, Yanbin Pan, Santanu Sarkar
- Proofs of storage
- Invited talk
Jonathan
Katz; University of Maryland)
video - Non-Malleable Codes
- Non-malleable Codes for Decision Trees, 413-434, Daniel Wichs, Siyao Guo, Marshall Ball
bib info, video - Explicit Rate-1 Non-malleable Codes for Local Tampering, 435-466, Hemanta K. Maji, Divya Gupta, Mingyuan Wang
bib info, video - Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space, 467-495, Pratyay Mukherjee, Binyi Chen, Yilei Chen, Kristina Hostáková
bib info, video
- Non-malleable Codes for Decision Trees, 413-434, Daniel Wichs, Siyao Guo, Marshall Ball
- SNARKs and Blockchains
- Synchronous, with a Chance of Partition Tolerance, 499-529, Rafael Pass, Elaine Shi, Yue Guo
bib info, video - Subvector Commitments with Application to Succinct Arguments, 530-560, Russell W. F. Lai, Giulio Malavolta
bib info, video - Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains, 561-586, Dan Boneh, Ben Fisch, Benedikt Bünz
bib info, video
- Synchronous, with a Chance of Partition Tolerance, 499-529, Rafael Pass, Elaine Shi, Yue Guo
- Homomorphic Cryptography
- On the Plausibility of Fully Homomorphic Encryption for RAMs, 589-619, Daniel Wichs, Mor Weiss, Ariel Hamlin, Justin Holmgren
bib info, video - Homomorphic Time-Lock Puzzles and Applications, 620-649, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
bib info, video - Symmetric Primitives with Structured Secrets, 650-679, Hart Montgomery, Sikhar Patranabis, Navid Alamati
bib info, video
- On the Plausibility of Fully Homomorphic Encryption for RAMs, 589-619, Daniel Wichs, Mor Weiss, Ariel Hamlin, Justin Holmgren
- Leakage Models and Key reuse
- Unifying Leakage Models on a Rényi Day, 683-712, Ange Martinelli, Alain Passelègue, Thomas Prest, Dahmun Goudarzi
bib info, video - Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations, 713-737, François-Xavier Standaert, Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky
bib info, video - Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications, 738-768, Thomas Shrimpton, Christopher Patton
bib info, video
- Unifying Leakage Models on a Rényi Day, 683-712, Ange Martinelli, Alain Passelègue, Thomas Prest, Dahmun Goudarzi
- MPC Communication Complexity
- The Communication Complexity of Threshold Private Set Intersection, 3-29, Satrajit Ghosh, Mark Simkin
bib info, video - Adaptively Secure MPC with Sublinear Communication Complexity, 30-60, Abhi Shelat, Daniel Wichs, Ran Cohen
bib info, video - Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing, 61-84, Jesper Buus Nielsen, Kasper Green Larsen, Ivan Damgård
bib info, video - Communication-Efficient Unconditional MPC with Guaranteed Output Delivery, 85-114, Vipul Goyal, Yifan Song, Yanyi Liu
bib info, video
- The Communication Complexity of Threshold Private Set Intersection, 3-29, Satrajit Ghosh, Mark Simkin
- Symmetric Cryptanalysis
- Efficient Collision Attack Frameworks for RIPEMD-160, 117-149, Florian Mendel, Zhenfu Cao, Takanori Isobe, Christoph Dobraunig, Fukang Liu, Gaoli Wang
bib info, video - Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning, 150-179, Aron Gohr
bib info, video - Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, 180-209, Yu Sasaki, Lei Hu, Siwei Sun, Danping Shi, Chaoyun Li
bib info, video - Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem, 210-235, Gaëtan Leurent, Ferdinand Sibleyras
bib info, video
- Efficient Collision Attack Frameworks for RIPEMD-160, 117-149, Florian Mendel, Zhenfu Cao, Takanori Isobe, Christoph Dobraunig, Fukang Liu, Gaoli Wang
- (Post) Quantum Security
- Leakage resilience
- (Post) Quantum Security (cont'd)
- Quantum Indistinguishability of Random Sponges, 296-325, Christian Schaffner, Andreas Hülsing, Jan Czajkowski
bib info, video - Revisiting Post-quantum Fiat-Shamir, 326-355, Mark Zhandry, Qipeng Liu
bib info, video - Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model, 356-383, Serge Fehr, Christian Schaffner, Christian Majenz, Jelle Don
bib info, video
- Quantum Indistinguishability of Random Sponges, 296-325, Christian Schaffner, Andreas Hülsing, Jan Czajkowski
- Leakage resilience (cont'd)
- Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate, 448-479, Daniele Venturi, Antonio Faonio
bib info, video - Leakage Resilient Secret Sharing and Applications, 480-509, Prashant Nalini Vasudevan, Akshayaram Srinivasan
bib info, video - Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures, 510-539, Jesper Buus Nielsen, Divesh Aggarwal, Maciej Obremski, Mark Simkin, Ivan Damgård, Erick Purwanto, João Ribeiro
bib info, video
- Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate, 448-479, Daniele Venturi, Antonio Faonio
- Best Paper
- Best Young Researcher Papers
- Memory Hard functions and Privacy Amplification
- Memory-Hard Functions from Cryptographic Primitives, 543-572, Stefano Tessaro, Binyi Chen
bib info, video - Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions, 573-607, Jeremiah Blocki, Samson Zhou, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing
bib info, video - Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge, 608-637, Vipul Goyal, Amit Sahai, Aayush Jain
bib info, video - The Privacy Blanket of the Shuffle Model, 638-667, Kobbi Nissim, Borja Balle, James Bell, Adrià Gascón
bib info, video
- Memory-Hard Functions from Cryptographic Primitives, 543-572, Stefano Tessaro, Binyi Chen
- Attribute Based Encryption
- Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption, 671-700, Brent Waters, Venkata Koppula
bib info, video - Match Me if You Can: Matchmaking Encryption and Its Applications, 701-731, Giuseppe Ateniese, Daniele Venturi, Danilo Francati, David Nuñez
bib info, video - ABE for DFA from k-Lin, 732-764, Brent Waters, Hoeteck Wee, Junqing Gong
bib info, video - Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE, 765-797, Shweta Agrawal, Shota Yamada, Monosij Maitra
bib info, video
- Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption, 671-700, Brent Waters, Venkata Koppula
- Foundations
- Trapdoor Functions
- Trapdoor Hash Functions and Their Applications, 3-32, Rafail Ostrovsky, Yuval Ishai, Sanjam Garg, Nico Döttling, Giulio Malavolta, Tamer Mour
bib info, video - CCA Security and Trapdoor Functions via Key-Dependent-Message Security, 33-64, Keisuke Tanaka, Takahiro Matsuda, Fuyuki Kitagawa
bib info, video
- Trapdoor Hash Functions and Their Applications, 3-32, Rafail Ostrovsky, Yuval Ishai, Sanjam Garg, Nico Döttling, Giulio Malavolta, Tamer Mour
- Invited talk (Helen Nissenbaum; Cornell Tech), video
- Zero Knowledge I
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs, 67-97, Dan Boneh, Yuval Ishai, Niv Gilboa, Elette Boyle, Henry Corrigan-Gibbs
bib info, video - Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge, 98-127, Rafael Pass, Ilan Komargodski, Cody Freitag
bib info, video - On Round Optimal Statistical Zero Knowledge Arguments, 128-156, Nir Bitansky, Omer Paneth
bib info, video
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs, 67-97, Dan Boneh, Yuval Ishai, Niv Gilboa, Elette Boyle, Henry Corrigan-Gibbs
- Signatures and Messaging
- It Wasn't Me!, 159-190, Sunoo Park, Adam Sealfon
bib info, video - Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations, 191-221, Dario Catalano, Fabien Laguillaumie, Guilhem Castagnos, Ida Tucker, Federico Savasta
bib info, video - Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption, 222-250, Thomas Ristenpart, Ian Miers, Paul Grubbs, Nirvan Tyagi, Julia Len
bib info, video
- It Wasn't Me!, 159-190, Sunoo Park, Adam Sealfon
- Obfuscation
- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map, 253-283, Jung Hee Cheon, Changmin Lee, Minki Hhan, Jiseung Kim, Wonhee Cho
bib info, video - Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification, 284-332, Amit Sahai, Huijia Lin, Prabhanjan Ananth, Christian Matt, Aayush Jain
bib info, video
- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map, 253-283, Jung Hee Cheon, Changmin Lee, Minki Hhan, Jiseung Kim, Wonhee Cho
- Watermarking
- Secure Computation
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension, 401-431, Benny Pinkas, Mike Rosulek, Avishay Yanai, Ni Trieu
bib info, video - Universally Composable Secure Computation with Corrupted Tokens, 432-461, Ivan Visconti, Rafail Ostrovsky, Nishanth Chandran, Wutichai Chongchitmate
bib info, video - Reusable Non-Interactive Secure Computation, 462-488, Rafail Ostrovsky, Vinod Vaikuntanathan, Yuval Ishai, Yevgeniy Dodis, Melissa Chase, Daniel Kraschewski, Tianren Liu
bib info, video - Efficient Pseudorandom Correlation Generators: Silent OT Extension and More, 489-518, Yuval Ishai, Niv Gilboa, Elette Boyle, Peter Scholl, Geoffroy Couteau, Lisa Kohl
bib info, video
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension, 401-431, Benny Pinkas, Mike Rosulek, Avishay Yanai, Ni Trieu
- Various Topics
- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously, 521-551, Keisuke Tanaka, Ryo Nishimaki, Takashi Yamakawa, Fuyuki Kitagawa
bib info - Non-interactive Non-malleability from Quantum Supremacy, 552-582, Yael Tauman Kalai, Dakshita Khurana
bib info, video - Cryptographic Sensing, 583-604, Rafail Ostrovsky, Amit Sahai, Eyal Kushilevitz, Yuval Ishai
bib info, video - Public-Key Cryptography in the Fine-Grained Setting, 605-635, Rio LaVigne, Andrea Lincoln, Virginia Vassilevska Williams
bib info, video
- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously, 521-551, Keisuke Tanaka, Ryo Nishimaki, Takashi Yamakawa, Fuyuki Kitagawa
- Zero knowledge II
- Exploring Constructions of Compact NIZKs from Various Assumptions, 639-669, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata
bib info, video - New Constructions of Reusable Designated-Verifier NIZKs, 670-700, Daniel Wichs, Ron D. Rothblum, David J. Wu, Alex Lombardi, Willy Quach
bib info, video - Scalable Zero Knowledge with No Trusted Setup, 701-732, Eli Ben-Sasson, Iddo Bentov, Michael Riabzev, Yinon Horesh
bib info, video - Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation, 733-764, Dawn Song, Charalampos Papamanthou, Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang
bib info, video
- Exploring Constructions of Compact NIZKs from Various Assumptions, 639-669, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata
- Key Exchange and Broadcast Encryption
- Highly Efficient Key Exchange Protocols with Optimal Tightness, 767-797, Kristian Gjøsteen, Tibor Jager, Håkon Jacobsen, Katriel Cohn-Gordon, Cas Cremers
bib info, video - Strong Asymmetric PAKE Based on Trapdoor CKEM, 798-825, Stanislaw Jarecki, Jiayu Xu, Tatiana Bradley
bib info, video - Broadcast and Trace with Nε Ciphertext Size from Standard Assumptions, 826-855, Brent Waters, Daniel Wichs, Rishab Goyal, Willy Quach
bib info, video
- Highly Efficient Key Exchange Protocols with Optimal Tightness, 767-797, Kristian Gjøsteen, Tibor Jager, Håkon Jacobsen, Katriel Cohn-Gordon, Cas Cremers