All sessions will be held at the 2nd Conference Hall on the 3rd floor in the H.S.S. Building (人文社會科學館) of Academia Sinica.
8:00–9:00 | Registration |
9:00–9:10 | Opening Remarks |
Session 1: CCA Security (Chair: Yuval Ishai) |
9:10–9:30 |
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security |
| Takahiro Matsuda, Goichiro Hanaoka |
9:30–9:50 |
Chosen-Ciphertext Security from Subset Sum |
| Sebastian Faust, Daniel Masny, Daniele Venturi |
9:50–10:10 |
On the Hardness of Proving CCA-Security of Signed ElGamal |
| David Bernhard, Marc Fischlin, Bogdan Warinschi |
10:10–10:30 |
CCA-Secure Keyed-Fully Homomorphic Encryption |
| Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng |
10:30–10:50 |
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions |
| Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka |
10:50–11:20 | Coffee break |
Session 2: Identity-Based Encryption (Chair: Giuseppe Persiano) |
11:20–11:40 |
Identity-Based Cryptosystems and Quadratic Residuosity |
| Marc Joye |
11:40–12:00 |
Identity-based Hierarchical Key-insulated Encryption without Random Oracles |
| Yohei Watanabe, Junji Shikata |
12:00–13:00 | Invited Talk I: The Many Faces of Garbled Circuits |
| Vinod Vaikuntanathan |
13:00–14:30 | Lunch – Recreation Hall at H.S.S. Building |
Session 3: Signatures I (Benoît Libert) |
14:30–14:50 |
Attribute-Based Signatures for Circuits from Bilinear Map |
| Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka |
14:50–15:10 |
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys |
| Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin |
15:10–15:30 |
Fault-Tolerant Aggregate Signatures |
| Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp |
15:30–15:50 |
Delegatable Functional Signatures |
| Michael Backes, Sebastian Meiser, Dominique Schröder |
15:50–16:20 | Coffee break |
Session 4: Signatures II (Chair: Tung Chou) |
16:20–16:40 |
Mitigating Multi-Target Attacks in Hash-based Signatures |
| Andreas Hülsing, Joost Rijneveld, Fang Song |
16:40–17:00 |
Nearly Optimal Verifiable Data Streaming |
| Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger |
17:00–17:20 |
ARMed SPHINCS – Computing a 41KB signature in 16KB of RAM |
| Andreas Hülsing, Joost Rijneveld, Peter Schwabe |
Session 5: Functional Encryption (Chair: Dominique Schroeder) |
9:10–9:30 |
Extended Nested Dual System Groups, Revisited |
| Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang |
9:30–9:50 |
Functional Encryption for Inner Product with Full Function Privacy |
| Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
9:50–10:10 |
Deniable Functional Encryption |
| Angelo de Caro, Vincenzo Iovino, Adam O'Neill |
10:10–10:40 | Coffee break |
Session 6: Cryptanalysis |
10:40–11:00 |
Algebraic approaches for the Elliptic Curve Discrete Logarithm Problem over prime fields |
| Christophe Petit, Michiel Kosters, Ange Messeng |
11:00–11:20 |
Degenerate Curve Attacks |
| Samuel Neves, Mehdi Tibouchi |
11:20–11:40 |
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness |
| Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud |
11:40–12:00 |
How to Generalize RSA Cryptanalyses |
| Atsushi Takayasu, Noboru Kunihiro |
12:00–13:00 | Invited Talk II: Future Directions in Lattice Cryptography |
| Vadim Lyubashevsky |
13:00–14:30 | Lunch – Recreation Hall at H.S.S. Building |
14:30–18:30 | Excursion to the National Palace Museum |
19:30 | Banquet at the Silks Palace at the National Palace Museum |
Session 7: Leakage-Resilient and Circularly Secure Encryption (Chair: Mehdi Tibouchi) |
9:10–9:30 |
Leakage-Resilient Public-Key Encryption from Obfuscation |
| Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou |
9:30–9:50 |
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes |
| Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan |
9:50–10:10 |
KDM-Security via Homomorphic Smooth Projective Hashing |
| Hoeteck Wee |
10:10–10:40 | Coffee break |
Session 8: Primitives (Chair: Peter Schwabe) |
10:40–11:00 | Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1 |
| Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy |
11:00–11:20 | Non-Malleable Functions and Their Applications |
| Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S.M. Chow |
11:20–11:40 |
On Public Key Encryption from Noisy Codewords |
| Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga Ron-Zewi |
11:40–12:00 |
Non-Trivially Efficient Indistinguishability Obfuscation |
| Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang |
12:00–13:00 | Invited Talk III: The first 10 years of Curve25519 |
| Daniel J. Bernstein |
13:00–14:30 | Lunch – Recreation Hall at H.S.S. Building |
Session 9: Protocols I (Chair: Christophe Petit) |
14:30–14:50 |
Asynchronous Secure Multiparty Computation in Constant Time |
| Ran Cohen |
14:50–15:10 | Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE) |
| Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao |
15:10–15:30 |
Universally Composable Direct Anonymous Attestation |
| Jan Camenisch, Manu Drijvers, Anja Lehmann |
15:30–15:50 |
Universally Composable Authentication and Key-Exchange with Global PKI |
| Ran Canetti, Daniel Shahaf, Margarita Vald |
15:50–16:20 | Coffee break |
Session 10: Protocols II (Chair: Tanja Lange) |
16:20–16:40 |
Very-efficient simulatable flipping of many coins into a well |
| Luís T. A. N. Brandão |
16:40–17:00 |
Robust Secret Sharing Schemes Against Local Adversaries |
| Allison Bishop, Valerio Pastro |
17:00 | Conference Adjourns |