CRYPTO 2022:
Yevgeniy Dodis Tom Shrimpton (Eds.)
Santa Barbara, CA, USA
August 13-18, 2022
Proceedings.
cryptodb information for CRYPTO 2022
Organizational Committee
Program Chairs:
Yevgeniy Dodis and Tom Shrimpton
General Chair:
Allison Bishop
Yevgeniy Dodis and Tom Shrimpton
General Chair:
Allison Bishop
Program Committee
Shweta Agrawal
Prabhanjan Ananth
Saikrishna Badrinarayanan
Lejla Batina
Carsten Baum
Jeremiah Blocki
Alexandra Boldyreva
Elette Boyle
David Cash
Itai Dinur
Nico Döttling
François Dupressoir
Dario Fiore
Ben Fisch
Marc Fischlin
Rosario Gennaro
Felix Günther
Divya Gupta
Mohammad Hajiabadi
Nadia Heninger
Viet Tung Hoang
Susan Hohenberger
Joseph Jaeger
Tibor Jager
Daniel Jost
Seny Kamara
Aggelos Kiayias
Markulf Kohlweiss
Vladimir Kolesnikov
Gregor Leander
Benoît Libert
Feng-Hao Liu
Vadim Lyubashevsky
Fermi Ma
Bernardo Magri
Mohammad Mahmoody
Hemanta K. Maji
Alex Malozemoff
Antonio Marcedone
Bart Mennink
Daniele Micciancio
Kazuhiko Minematsu
María Naya-Plasencia
Ryo Nishimaki
Rafael Pass
Thomas Peyrin
Antigoni Polychroniadou
Mariana Raykova
Christian Rechberger
Leonid Reyzin
Paul Rösler
Lior Rotem
Alessandra Scafuro
Christian Schaffner
Mark Simkin
Naomi Sirkin
Akshayaram Srinivasan
Noah Stephens-Davidowitz
Marc Stevens
Ni Trieu
Yiannis Tselekounis
Mayank Varia
Xiao Wang
Daniel Wichs
David Wu
Shota Yamada
Kan Yasuda
Kevin Yeo
Eylon Yogev
Vassilis Zikas
Program
- Cryptanalysis I
- Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks,
Chao Li, Qihua Niu, Yunwen Liu, Siwei Sun,
bibinfo, video - Implicit White-Box Implementations: White-Boxing ARX Ciphers,
Bart Preneel, Adrián Ranea, Joachim Vandersmissen,
bibinfo, video - Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Ciphers,
Jian Guo, Zhenzhen Bao, Danping Shi, Yi Tu,
bibinfo, video - Triangulating Rebound Attack on AES-like Hashing,
Jian Guo, Xiaoyang Dong, Shun Li, Phuong Pham,
bibinfo, video
- Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks,
- Randomness
- Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions,
Jesper Buus Nielsen, Maciej Obremski, João Ribeiro,
bibinfo, video - (Nondeterministic) Hardness vs. Non-Malleability,
Dana Dachman-Soled, Marshall Ball, Julian Loss,
bibinfo, video - Short Leakage Resilient and Non-malleable Secret Sharing Schemes,
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar,
bibinfo, video - Cryptography from Pseudorandom Quantum States,
Prabhanjan Ananth, Henry Yuen, Luowen Qian,
bibinfo, video
- Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions,
- Quantum Cryptography I
- Certified Everlasting Zero-Knowledge Proof for QMA,
Ryo Nishimaki, Takashi Yamakawa, Taiga Hiroka, Tomoyuki Morimae,
bibinfo, video - Quantum Commitments and Signatures without One-Way Functions,
Takashi Yamakawa, Tomoyuki Morimae,
bibinfo, video - Semi-Quantum Tokenized Signatures,
Omri Shmueli,
bibinfo
- Certified Everlasting Zero-Knowledge Proof for QMA,
- Secure Multiparty Computation I
- Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching,
Mike Rosulek, Gayathri Garimella, Jaspal Singh,
bibinfo, video - Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols,
Huijia Lin, Tianren Liu,
bibinfo - More Efficient Dishonest Majority Secure Computation over Z2k via Galois Rings,
Chaoping Xing, Chen Yuan, Daniel Escudero,
bibinfo
- Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching,
- Invited talk: Yehuda Lindell
- Proof Systems
- Parallel Repetition of (k1,...,kμ)-Special-Sound Multi-Round Interactive Proofs,
Serge Fehr, Thomas Attema,
bibinfo, video - Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash,
Susumu Kiyoshima,
bibinfo, video - Faster Sounder Succinct Arguments and IOPs,
Ron D. Rothblum, Justin Holmgren,
bibinfo, video - Succinct Interactive Oracle Proofs: Applications and Limitations,
Ron D. Rothblum, Shafik Nassar,
bibinfo, video
- Parallel Repetition of (k1,...,kμ)-Special-Sound Multi-Round Interactive Proofs,
- Advanced Encryption Systems
- Candidate Witness Encryption from Lattice Techniques,
Rotem Tsabary,
bibinfo - Securing Approximate Homomorphic Encryption using Differential Privacy,
Daniele Micciancio, David Schultz, Baiyu Li, Jessica Sorrell,
bibinfo, video - Multi-Input Attribute Based Encryption and Predicate Encryption,
Shweta Agrawal, Shota Yamada, Anshu Yadav,
bibinfo, video - Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt,
Joost Meijers, Pierre-Yves Strub, Andreas Hülsing,
bibinfo, video
- Candidate Witness Encryption from Lattice Techniques,
- Secure Multiparty Computation II
- SoftSpokenOT: Quieter OT Extension From Small-Field Silent VOLE in the Minicrypt Model,
Lawrence Roy,
bibinfo - Maliciously Secure Massively Parallel Computation for All-but-One Corruptions,
Elaine Shi, Ran Gelles, Ilan Komargodski, Rex Fernando,
bibinfo, video - Le Mans: Dynamic and Fluid MPC for Dishonest Majority,
Peter Scholl, Rahul Rachuri,
bibinfo, video
- SoftSpokenOT: Quieter OT Extension From Small-Field Silent VOLE in the Minicrypt Model,
- Secure Messaging
- Oblivious Message Retrieval,
Eran Tromer, Zeyu Liu,
bibinfo, video - A More Complete Analysis of the Signal Double Ratchet Algorithm,
Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman, Alexander Bienstock, Jaiden Fairoze,
bibinfo, video - On the Insider Security of MLS,
Joël Alwen, Daniel Jost, Marta Mularczyk,
bibinfo, video
- Oblivious Message Retrieval,
- Lattice-based Zero Knowledge
- Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General,
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon,
bibinfo, video - Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable,
Martin R. Albrecht, Russell W. F. Lai, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan, Valerio Cini,
bibinfo, video - Practical Sublinear Proofs for R1CS from Lattices,
Gregor Seiler, Ngoc Khanh Nguyen,
bibinfo, video
- Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General,
- Quantum Cryptography II
- On the Impossibility of Key Agreements from Quantum Random Oracles,
Kai-Min Chung, Mohammad Mahmoody, Per Austrin, Hao Chung, Shiuan Fu, Yao-Ting Lin,
bibinfo, video - Succinct Classical Verification of Quantum Computation,
Vinod Vaikuntanathan, Yael Tauman Kalai, Lizhen Yang, Giulio Malavolta, Alex Lombardi, Fermi Ma, James Bartusek, Thomas Vidick,
bibinfo, video - On the Feasibility of Unclonable Encryption and, More,
Mark Zhandry, Prabhanjan Ananth, Qipeng Liu, Fatih Kaleoglu, Xingjian Li,
bibinfo, video
- On the Impossibility of Key Agreements from Quantum Random Oracles,
- Lattice-Based Signatures
- Shorter Hash-and-Sign Lattice-Based Signatures,
Mehdi Tibouchi, Thomas Espitau, Yang Yu, Alexandre Wallet,
bibinfo, video - MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase,
Mehdi Tibouchi, Akira Takahashi, Cecilia Boschini,
bibinfo, video - A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling,
Rafaël Del Pino, Shuichi Katsumata,
bibinfo, video
- Shorter Hash-and-Sign Lattice-Based Signatures,
- Blockchain
- Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work,
Matthias Fitzi, Aggelos Kiayias, Alexander Russell, Giorgos Panagiotakos,
bibinfo, video - Practical Statistically-Sound Proofs of Exponentiation in any Group,
Krzysztof Pietrzak, Pavel Hubáček, Chethan Kamath, Karen Klein, Charlotte Hoffmann,
bibinfo, video - Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks,
Jesper Buus Nielsen, Christian Matt, Søren Eller Thomsen,
bibinfo, video
- Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work,
- Best Paper Awards
- Batch Arguments for NP and More from Standard Bilinear Group Assumptions,
Brent Waters, David Wu,
bibinfo, video - Breaking Rainbow Takes a Weekend on a Laptop,
Ward Beullens,
bibinfo, video - Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem,
Alice Pellet-Mary, Katharina Boudgoust, Erell Gachon,
bibinfo, video
- Batch Arguments for NP and More from Standard Bilinear Group Assumptions,
- Coding Theory
- On Codes and Learning with Errors over Function Fields,
Alain Couvreur, Thomas Debris-Alazard, Maxime Bombar,
bibinfo, video - Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs,
Antoine Joux, Matthieu Rivain, Thibauld Feneuil,
bibinfo, video - Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation,
Amit Sahai, Yuval Ishai, Philip Atzemoglou, Alexis Korb,
bibinfo, video - Correlated Pseudorandomness from Expand-Accumulate Codes,
Yuval Ishai, Niv Gilboa, Elette Boyle, Peter Scholl, Geoffroy Couteau, Lisa Kohl, Nicolas Resch,
bibinfo, video
- On Codes and Learning with Errors over Function Fields,
- Public Key Cryptography
- Public-Key Watermarking Schemes for Pseudorandom Functions,
Willy Susilo, Man Ho Au, Zuoxia Yu, Rupeng Yang,
bibinfo, video - CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs,
Moni Naor, Eyal Ronen, Cas Cremers, Shahar Paz,
bibinfo - Password-Authenticated Key Exchange from Group Actions,
Michel Abdalla, Eike Kiltz, Doreen Riepel, Thorsten Eisenhofer, Sabrina Kunzweiler,
bibinfo, video - Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM,
Serge Fehr, Christian Schaffner, Christian Majenz, Jelle Don,
bibinfo, video
- Public-Key Watermarking Schemes for Pseudorandom Functions,
- Signatures
- Locally Verifiable Signature and Key Aggregation,
Vinod Vaikuntanathan, Rishab Goyal,
bibinfo - Multimodal Private Signatures,
Willy Susilo, Guomin Yang, Khoa Nguyen, Fuchun Guo,
bibinfo, video - PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More,
Anna Lysyanskaya, Lucjan Hanzlik, Julian Loss, Benedikt Wagner, Rutchathon Chairattana-Apirom,
bibinfo, video
- Locally Verifiable Signature and Key Aggregation,
- Idealized Models
- Lower Bounds
- Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions,
Ilan Komargodski, Ashrujit Ghoshal, Cody Freitag,
bibinfo, video - On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing,
Ilan Komargodski, Ashrujit Ghoshal,
bibinfo, video - Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions,
Jeremiah Blocki, Blake Holman,
bibinfo, video - Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols,
Moni Naor, Shahar Cohen,
bibinfo, video
- Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions,
- Cryptanalysis II
- Accelerating the Delfs-Galbraith algorithm with fast subfield root detection,
Craig Costello, Maria Corte-Real Santos, Jia Shi,
bibinfo, video - Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking,
Yusuke Naito, Yu Sasaki, Takeshi Sugawara,
bibinfo, video - Partial Key Exposure Attacks on BIKE, Rainbow and NTRU,
Alexander May, Andre Esser, Weiqiang Wen, Javier Verbel,
bibinfo, video - Improving Support-Minors rank attacks: applications to GeMSS and Rainbow,
John Baena, Daniel Cabarcas, Pierre Briaud, Ray Perlner, Javier Verbel, Daniel Smith--Tone,
bibinfo, video
- Accelerating the Delfs-Galbraith algorithm with fast subfield root detection,
- Distributed Algorithms
- Secure Hash Functions
- Post-quantum Cryptography
- Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round,
Xiaohui Liang, Kai-Min Chung, Takashi Yamakawa, Nai-Hui Chia,
bibinfo, video - The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions.,
Rui Xue, Shujiao Cao,
bibinfo - Statistically Sender-Private OT From LPN and Derandomization,
Nir Bitansky, Sapir Freizeit,
bibinfo, video - Constructive Post-Quantum Reductions,
Yael Tauman Kalai, Zvika Brakerski, Nir Bitansky,
bibinfo, video
- Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round,
- Symmetric Cryptanalysis
- Differential Cryptanalysis in the Fixed-Key Model,
Vincent Rijmen, Tim Beyne,
bibinfo, video - Simplified MITM Modeling for Permutations: New (Quantum) Attacks,
Marc Stevens, André Schrottenloher,
bibinfo, video - Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers,
Gregor Leander, Patrick Felke, Christof Beierle, Tim Beyne,
bibinfo, video - Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications,
Gregor Leander, Lukas Stennes, Federico Canale,
bibinfo, video
- Differential Cryptanalysis in the Fixed-Key Model,
- Secret Sharing and Secure Multiparty Computation
- Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing,
Vipul Goyal, Antigoni Polychroniadou, Yifan Song,
bibinfo, video - Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority,
Benny Applebaum, Arpita Patra, Eliran Kachlon,
bibinfo, video - Authenticated garbling from simple correlations,
Rafail Ostrovsky, Steve Lu, Yuval Ishai, Samuel Dittmer,
bibinfo, video
- Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing,
- Unique Topics (SSE, DPF, ORAM)
- Dynamic Local Searchable Symmetric Encryption,
Brice Minaud, Michael Reichle,
bibinfo, video - Programmable Distributed Point Functions,
Yuval Ishai, Niv Gilboa, Elette Boyle, Victor I. Kolobov,
bibinfo, video - Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts,
Daniel Genkin, Yusong Du, Paul Grubbs,
bibinfo
- Dynamic Local Searchable Symmetric Encryption,
- Symmetric Key Theory
- Tight Preimage Resistance of the Sponge Construction,
Bart Mennink, Charlotte Lefevre,
bibinfo, video - Block-Cipher-Based Tree Hashing,
Aldo Gunsing,
bibinfo, video - Provably Secure Reflection Ciphers,
Yu Long Chen, Tim Beyne,
bibinfo, video - Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels,
Jean Paul Degabriele, Vukašin Karadžić,
bibinfo, video
- Tight Preimage Resistance of the Sponge Construction,
- Zero Knowledge
- Orion: Zero Knowledge Proof with Linear Prover Time,
Dawn Song, Yupeng Zhang, Tiancheng Xie,
bibinfo, video - MozZ2kzarella: Efficient Vector-OLE and Zero-Knowledge Proofs Over Z2k,
Carsten Baum, Peter Scholl, Alexander Munch-Hansen, Lennart Braun,
bibinfo, video - Nova: Recursive Zero-Knowledge Arguments from Folding Schemes,
Srinath T. V. Setty, Abhiram Kothapalli, Ioanna Tzialla,
bibinfo, video - A New Approach to Efficient Non-Malleable Zero-Knowledge,
Omkant Pandey, Xiaohui Liang, Andrey Kim,
bibinfo, video
- Orion: Zero Knowledge Proof with Linear Prover Time,
- Secure Multiparty Computation III
- An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security,
Claudio Orlandi, Peter Scholl, Ivan Damgård, Damiano Abram,
bibinfo, video - Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications,
Yuval Ishai, Benny Applebaum, Arpita Patra, Or Karni,
bibinfo, video - Tight Bounds on the Randomness Complexity of Secure Multiparty Computation,
Vipul Goyal, Yuval Ishai, Yifan Song,
bibinfo, video
- An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security,
- Threshold Signatures