CRYPTO 2020:
Daniele Micciancio and Thomas Ristenpart (Eds.):
Crypto 2020
Virtual
August 17-21, 2020
Proceedings.
Crypto database info for CRYPTO 2020
Organizational Committee
Program Chairs:
Daniele Micciancio and Thomas Ristenpart
General Chair:
Daniele Micciancio and Thomas Ristenpart
General Chair:
Leonid Reyzin
Program Committee Adi Akavia
Martin R. Albrecht
Roberto Avanzi
Lejla Batina
Jeremiah Blocki
David Cash
Melissa Chase
Hao Chen
Ilaria Chillotti
Henry Corrigan-Gibbs
Craig Costello
Joan Daemen
Thomas Eisenbarth
Pooya Farshim
Sanjam Garg
Daniel Genkin
Steven Goldfeder
Shay Gueron
Felix Günther
Tetsu Iwata
Tibor Jager
Antoine Joux
Jonathan Katz
Eike Kiltz
Elena Kirshanova
Venkata Koppula
Anna Lysyanskaya
Vadim Lyubashevsky
Mohammad Mahmoody
Florian Mendel
María Naya-Plasencia
Adam O'Neill
Olya Ohrimenko
Claudio Orlandi
Elisabeth Oswald
Chris Peikert
Bertram Poettering
Antigoni Polychroniadou
Ananth Raghunathan
Mariana Raykova
Christian Rechberger
Alon Rosen
Mike Rosulek
Alessandra Scafuro
Dominique Schröder
Thomas Shrimpton
Fang Song
Marc Stevens
Dominique Unruh
Michael Walter
David Wu
- Security Models
- Handling Adaptive Compromise for Practical Encryption Schemes,
Joseph Jaeger, Nirvan Tyagi,
bibinfo, video - Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees,
Ueli Maurer, Daniel Jost,
bibinfo, video - Indifferentiability for Public Key Cryptosystems,
Mark Zhandry, Cong Zhang,
bibinfo, video - Quantifying the Security Cost of Migrating Protocols to Practice,
Thomas Shrimpton, Christopher Patton,
bibinfo, video - The Memory-Tightness of Authenticated Encryption,
Stefano Tessaro, Joseph Jaeger, Ashrujit Ghoshal,
bibinfo, video - Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions,
Hoeteck Wee, David Cash, Akshima, Andrew Drucker,
bibinfo, video
- Handling Adaptive Compromise for Practical Encryption Schemes,
- IACR Distinguished Lecture by Silvo Micali
- Public-key, Functional, & Witness Encryption
- Functional Encryption for Attribute-Weighted Sums from k-Lin,
Michel Abdalla, Hoeteck Wee, Junqing Gong,
bibinfo, video - Amplifying the Security of Functional Encryption, Unconditionally,
Amit Sahai, Aayush Jain, Nathan Manohar, Alexis Korb,
bibinfo, video - Dynamic Decentralized Functional Encryption,
David Pointcheval, Duong Hieu Phan, Romain Gay, Jérémy Chotard, Edouard Dufour-Sans,
bibinfo, video - On Succinct Arguments and Witness Encryption from Groups,
Rafail Ostrovsky, Yuval Ishai, David J. Wu, Ohad Barta,
bibinfo, video - Fully Deniable Interactive Encryption,
Ran Canetti, Sunoo Park, Oxana Poburinnaya,
bibinfo, video - Verifiable Registration-Based Encryption,
Rishab Goyal, Satyanarayana Vusirikala,
bibinfo, video
- Functional Encryption for Attribute-Weighted Sums from k-Lin,
- Post Quantum Crypto 1
- Practical Product Proofs for Lattice Commitments,
Vadim Lyubashevsky, Gregor Seiler, Thomas Attema,
bibinfo, video - Lattice-Based Blind Signatures, Revisited,
Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen, Eduard Hauck,
bibinfo, video - LWE with Side Information: Attacks and Concrete Security Estimation,
Dana Dachman-Soled, Léo Ducas, Mélissa Rossi, Huijing Gong,
bibinfo, video - A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM,
Thomas Johansson, Qian Guo, Alexander Nilsson,
bibinfo, video
- Practical Product Proofs for Lattice Commitments,
- Cryptanalysis 1
- Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme,
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang,
bibinfo, video - Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems,
Anne Canteaut, Gaëtan Leurent, Gregor Leander, Yu Sasaki, María Naya-Plasencia, Itai Dinur, Yosuke Todo, Maria Eichlseder, Léo Perrin, Friedrich Wiemer, Tim Beyne,
bibinfo, video - Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light,
María Naya-Plasencia, Patrick Derbez, Virginie Lallemand, Léo Perrin, André Schrottenloher, Paul Huynh,
bibinfo, video - Cryptanalysis of LEDAcrypt,
Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini,
bibinfo, video - Alzette: a 64-bit ARX-box (feat. CRAX and TRAX),
Alex Biryukov, Johann Großschädl, Vesselin Velichkov, Qingju Wang, Léo Perrin, Aleksei Udovenko, Christof Beierle, Luan Cardoso dos Santos,
bibinfo, video - Automatic Verification of Differential Characteristics: Application to Reduced Gimli,
Willi Meier, Takanori Isobe, Fukang Liu,
bibinfo, video
- Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme,
- Best Paper Awards Session
- Chosen Ciphertext Security from Injective Trapdoor Functions,
Susan Hohenberger, Brent Waters, Venkata Koppula,
bibinfo - Breaking the decisional Diffie-Hellman problem for class group actions using genus theory,
Frederik Vercauteren, Wouter Castryck, Miroslava Sotáková,
bibinfo - Improved Differential-Linear Attacks with Applications to ARX Ciphers,
Gregor Leander, Yosuke Todo, Christof Beierle,
bibinfo
- Chosen Ciphertext Security from Injective Trapdoor Functions,
- Multiparty Computation 1
- Guaranteed Output Delivery Comes Free in Honest Majority MPC,
Vipul Goyal, Yifan Song, Chenzhi Zhu,
bibinfo, video - MPC with Friends and Foes,
Anat Paskin-Cherniavsky, Bar Alon, Omri Eran,
bibinfo, video - Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing,
Hemanta K. Maji, Mingyuan Wang,
bibinfo, video - Round-optimal Black-box Commit-and-prove with Succinct Communication,
Susumu Kiyoshima,
bibinfo, video - Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability,
Emmanuela Orsini, Carsten Baum, Peter Scholl, Eduardo Soria-Vazquez,
bibinfo, video - Black-Box Transformations from Passive to Covert Security with Public Verifiability,
Claudio Orlandi, Mark Simkin, Ivan Damgård,
bibinfo, video
- Guaranteed Output Delivery Comes Free in Honest Majority MPC,
- Real-World Crypto
- Security Analysis of NIST CTR-DRBG,
Viet Tung Hoang, Yaobin Shen,
bibinfo, video - Security Analysis and Improvements for the IETF MLS Standard for Group Messaging,
Joël Alwen, Yevgeniy Dodis, Sandro Coretti, Yiannis Tselekounis,
bibinfo, video - Anonymous Tokens with Private Metadata Bit,
Mariana Raykova, Tancrède Lepoint, Michele Orrù, Ben Kreuter,
bibinfo, video - The Summation-Truncation Hybrid: Reusing Discarded Bits for Free,
Bart Mennink, Aldo Gunsing,
bibinfo, video - Universally Composable Relaxed Password Authenticated Key Exchange,
Michel Abdalla, Stanislaw Jarecki, Jonathan Katz, Manuel Barbosa, Jiayu Xu, Tatiana Bradley,
bibinfo, video - The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers,
Thomas Peyrin, Haoyang Wang,
bibinfo, video
- Security Analysis of NIST CTR-DRBG,
- Invited talk by Seny Kamara
- Zero Knowledge Proofs
- Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics,
Ronald Cramer, Thomas Attema,
bibinfo, video - A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence,
Iftach Haitner, Itay Berman, Eliad Tsfadia,
bibinfo, video - Interactive Proofs for Social Graphs,
Eylon Yogev, Liran Katzir, Clara Shikhelman,
bibinfo, video - The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More,
Serge Fehr, Christian Majenz, Jelle Don,
bibinfo, video - Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs,
Vinod Vaikuntanathan, Alex Lombardi,
bibinfo, video - Delegation with Updatable Unambiguous Proofs and PPAD-Hardness,
Yael Tauman Kalai, Lizhen Yang, Omer Paneth,
bibinfo, video - New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust,
Dana Dachman-Soled, Marshall Ball, Mukul Kulkarni,
bibinfo, video
- Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics,
- Lattices and Related Problems
- Faster Enumeration-based Lattice Reduction: Root Hermite Factor k(1/(2k)) in Time k(k/8 + o(k)),
Pierre-Alain Fouque, Damien Stehlé, Martin R. Albrecht, Shi Bai, Paul Kirchner, Weiqiang Wen,
bibinfo, video - Random Self-reducibility of Ideal-SVP via Arakelov Random Walks,
Léo Ducas, Benjamin Wesolowski, Alice Pellet-Mary, Koen de Boer,
bibinfo, video - Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP,
Noah Stephens-Davidowitz, Tamalika Mukherjee,
bibinfo, video - Slide Reduction, Revisited—Filling the Gaps in SVP Approximation,
Phong Q. Nguyen, Divesh Aggarwal, Noah Stephens-Davidowitz, Jianwei Li,
bibinfo, video - Fast reduction of algebraic lattices over cyclotomic fields,
Pierre-Alain Fouque, Paul Kirchner, Thomas Espitau,
bibinfo, video - Rounding in the Rings,
Feng-Hao Liu, Zhedong Wang,
bibinfo, video
- Faster Enumeration-based Lattice Reduction: Root Hermite Factor k(1/(2k)) in Time k(k/8 + o(k)),
- Leakage and Outsourced Encryption
- Random Probing Security: Verification, Composition, Expansion and New Constructions,
Emmanuel Prouff, Matthieu Rivain, Sonia Belaïd, Jean-Sébastien Coron, Abdul Rahman Taleb,
bibinfo, video - Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle,
Olivier Pereira, Thomas Peters, Vincent Grosso, Chun Guo, François-Xavier Standaert, Gaëtan Cassiers, Davide Bellizia, Olivier Bronchain, Charles Momin,
bibinfo, video - Leakage-Resilient Key Exchange and Two-Seed Extractors,
Daniel Wichs, Xin Li, Willy Quach, Fermi Ma,
bibinfo, video - Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model,
Giuseppe Persiano, Sarvar Patel, Kevin Yeo,
bibinfo, video - Fast and Secure Updatable Encryption,
Kristian Gjøsteen, Colin Boyd, Gareth T. Davies, Yupeng Jiang,
bibinfo, video - Incompressible Encodings,
Tal Moran, Daniel Wichs,
bibinfo, video
- Random Probing Security: Verification, Composition, Expansion and New Constructions,
- NIZKs, Consensus, Delay Functions
- Spartan: Efficient and general-purpose zkSNARKs without trusted setup,
Srinath T. V. Setty,
bibinfo, video - NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability,
Zvika Brakerski, Venkata Koppula, Tamer Mour,
bibinfo, video - Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages,
Michael Hartmann, Geoffroy Couteau,
bibinfo, video - Order-Fairness for Byzantine Consensus,
Ari Juels, Fan Zhang, Steven Goldfeder, Mahimna Kelkar,
bibinfo, video - Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions,
Gil Segev, Lior Rotem,
bibinfo, video
- Spartan: Efficient and general-purpose zkSNARKs without trusted setup,
- Post Quantum Crypto 2
- Scalable Pseudorandom Quantum States,
Zvika Brakerski, Omri Shmueli,
bibinfo, video - Efficient Pseudorandom Correlation Generators from Ring-LPN,
Yuval Ishai, Niv Gilboa, Elette Boyle, Peter Scholl, Geoffroy Couteau, Lisa Kohl,
bibinfo, video - A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge,
Vadim Lyubashevsky, Jonathan Bootle, Gregor Seiler, Ngoc Khanh Nguyen,
bibinfo, video - Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing,
Thomas Vidick, Andrea Coladangelo, Tina Zhang,
bibinfo, video - Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing,
Thomas Vidick, Andrea Coladangelo, Tina Zhang,
bibinfo
- Scalable Pseudorandom Quantum States,
- Cryptanalysis 2
- Cryptanalytic Extraction of Neural Network Models,
Ilya Mironov, Nicholas Carlini, Matthew Jagielski,
bibinfo, video - Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment,
Paul Zimmermann, Pierrick Gaudry, Emmanuel Thomé, Fabrice Boudot, Nadia Heninger, Aurore Guillevic,
bibinfo, video - Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields,
Pierrick Gaudry, Cécile Pierrot, Gabrielle De Micheli,
bibinfo, video - A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem,
Jean-Sébastien Coron, Agnese Gini,
bibinfo, video - A Classification of Computational Assumptions in the Algebraic Group Model,
Georg Fuchsbauer, Julian Loss, Balthazar Bauer,
bibinfo, video
- Cryptanalytic Extraction of Neural Network Models,
- Constructions
- New Techniques for Traitor Tracing: Size N1/3 and More from Pairings,
Mark Zhandry,
bibinfo, video - New Constructions of Hinting PRGs, OWFs with Encryption, and more,
Brent Waters, Rishab Goyal, Satyanarayana Vusirikala,
bibinfo, video - Adaptively Secure Constrained Pseudorandom Functions in the Standard Model,
Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata, Alex Davidson,
bibinfo, video - Collusion Resistant Watermarkable PRFs from Standard Assumptions,
Man Ho Au, Qiuliang Xu, Zuoxia Yu, Rupeng Yang,
bibinfo, video - Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model,
Daniele Venturi, Maciej Obremski, Antonio Faonio, Mark Simkin, Gianluca Brian,
bibinfo, video - Non-Malleability against Polynomial Tampering,
Tal Malkin, Anupam Chattopadhyay, Marshall Ball, Jyun-Jie Liao, Loïs Huguenin-Dumittan,
bibinfo, video
- New Techniques for Traitor Tracing: Size N1/3 and More from Pairings,
- Multiparty Computation 2
- Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback,
Julian Loss, Chen-Da Liu-Zhang, Erica Blum,
bibinfo, video - Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path,
Vladimir Kolesnikov, David Heath,
bibinfo, video - Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting),
Jonathan Katz, Yu Yu, Xiao Wang, Chun Guo, Chenkai Weng,
bibinfo, video - Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits,
Marcel Keller, Peter Scholl, Satrajit Ghosh, Daniel Escudero, Rahul Rachuri,
bibinfo, video
- Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback,
- Multiparty Computation 3
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF,
Melissa Chase, Peihan Miao,
bibinfo, video - Two-Sided Malicious Security for Private Intersection-Sum with Cardinality,
Moti Yung, Sarvar Patel, Mariana Raykova, Karn Seth, Peihan Miao,
bibinfo, video - Nearly Optimal Robust Secret Sharing against Rushing Adversaries,
Prashant Nalini Vasudevan, Akshayaram Srinivasan, Pasin Manurangsi,
bibinfo, video - Multiparty Generation of an RSA Modulus,
Abhi Shelat, Ran Cohen, Yashvanth Kondi, Megan Chen, Jack Doerner, Eysa Lee, Schuyler Rosefield,
bibinfo, video - Reverse Firewalls for Actively Secure MPCs,
Jesper Buus Nielsen, Stefan Dziembowski, Suvradip Chakraborty,
bibinfo, video
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF,