ASIACRYPT 2020:
Shiho Moriai and Huaxiong Wang (Eds.):
ASIACRYPT 2020,
Virtual Event Anywhere on Earth
December 7-11, 2020
Proceedings.
Crypto database info for AsiaCrypt 2020
Organizational Committee
Program Chairs: Shiho Moriai and Huaxiong Wang
General Chair : Kwangjo Kim
General Chair : Kwangjo Kim
Shweta Agrawal
Gorjan Alagic
Shi Bai
Zhenzhen Bao
Paulo Barreto
Lejla Batina
Amos Beimel
Sonia Belaïd
Olivier Blazy
Jie Chen
Yilei Chen
Chen-Mou Cheng
Jun Furukawa
David Galindo
Jian Guo
Swee-Huay Heng
Xinyi Huang
Andreas Hülsing
Takanori Isobe
David Jao
Jérémy Jean
Zhengfeng Ji
Hyung Tae Lee
Jooyoung Lee
Benoit Libert
Dongdai Lin
Helger Lipmaa
Feng-Hao Liu
Giorgia Azzurra Marson
Daniel Masny
Takahiro Matsuda
Brice Minaud
Kartik Nayak
Khoa Nguyen
Svetla Nikova
Carles Padró
Jiaxin Pan
Arpita Patra
Thomas Peters
Duong Hieu Phan
Raphael C.-W. Phan
Josef Pieprzyk
Carla Ràfols
Ling Ren
Rei Safavi-Naini
Yu Sasaki
Jae Hong Seo
Ron Steinfeld
Willy Susilo
Qiang Tang
Mehdi Tibouchi
Xiaoyun Wang
Yongge Wang
Chaoping Xing
Yu Yu
Mark Zhandry
- Invited talk
- Best Paper Awards
- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness,
Takashi Yamakawa, Akinori Hosoyamada,
bibinfo, video - New results on Gimli: full-permutation distinguishers and improved collisions,
Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras, Antonio Flórez Gutiérrez,
bibinfo, video - SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies,
Christophe Petit, David Kohel, Benjamin Wesolowski, Luca De Feo, Antonin Leroux,
bibinfo, video
- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness,
- Encryption Schemes
- Public-Key Generation with Verifiable Randomness,
Damien Vergnaud, Olivier Blazy, Patrick Towa,
bibinfo, video - Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security,
Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu,
bibinfo, video - CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors,
Christoph Striecks, Daniel Slamanig, Sebastian Ramacher, Valerio Cini,
bibinfo, video - Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting,
Willy Susilo, Junzuo Lai, Man Ho Au, Qiuliang Xu, Zhengan Huang, Rupeng Yang,
bibinfo, video - Security Reductions for White-Box Key-Storage in Mobile Payments,
Marc Fischlin, Wil Michiels, Christian Janson, Chris Brzuska, Estuardo Alpirez Bock,
bibinfo, video - Circular Security Is Complete for KDM Security,
Takahiro Matsuda, Fuyuki Kitagawa,
bibinfo, video
- Public-Key Generation with Verifiable Randomness,
- Post-quantum Cryptography
- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications,
Thomas Prest, Shuichi Katsumata, Federico Pintore, Kris Kwiatkowski,
bibinfo, video - Post-Quantum Verification of Fujisaki-Okamoto,
Dominique Unruh,
bibinfo, video - A New Decryption Failure Attack against HQC,
Thomas Johansson, Qian Guo,
bibinfo, video
- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications,
- Message Authentication Codes
- On the Adaptive Security of MACs and PRFs,
Rafael Pass, Elaine Shi, Andrew Morgan,
bibinfo, video - Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs,
Jooyoung Lee, ByeongHak Lee, Wonseok Choi, Yeongmin Lee,
bibinfo, video - How to Build Optimally Secure PRFs Using Block Ciphers,
Mridul Nandi, Ashwin Jha, Benoît Cogliati,
bibinfo, video
- On the Adaptive Security of MACs and PRFs,
- Invited talk 2
- Cryptanalysis
- A Bit-Vector Differential Model for the Modular Addition by a Constant,
Vincent Rijmen, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Adrián Ranea, Seyyed Arash Azimi,
bibinfo, video - Mind the Propagation of States. New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions,
Mingsheng Wang, Yongqiang Li, Lin Jiao, Shizhu Tian, Xichao Hu,
bibinfo, video - An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums,
Meiqin Wang, Qingju Wang, Siwei Sun, Kai Hu,
bibinfo, video - An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC,
Christian Rechberger, Qingju Wang, Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Markus Schofnegger, Morten Øygarden,
bibinfo, video - Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems,
Jean-Pierre Tillich, Philippe Gaborit, Daniel Smith-Tone, Daniel Cabarcas, Magali Bardet, Maxime Bros, Ray Perlner, Javier Verbel,
bibinfo, video - Lower Bounds on the Degree of Block Ciphers,
Gregor Leander, Yosuke Todo, Baptiste Lambin, Phil Hebborn,
bibinfo, video - Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT),
Jian Guo, Eik List, Ling Song, Chun Guo,
bibinfo, video
- A Bit-Vector Differential Model for the Modular Addition by a Constant,
- Symmetric Key Cryptography
- Minimizing the Two-Round Tweakable Even-Mansour Cipher,
Avijit Dutta,
bibinfo, video - Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption,
Bart Mennink,
bibinfo, video - Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation,
Zhenfu Cao, Xiaolei Dong, Yusai Wu, Liqing Yu,
bibinfo, video
- Minimizing the Two-Round Tweakable Even-Mansour Cipher,
- Side-Channel Analysis
- SILVER - Statistical Independence and Leakage Verification,
Amir Moradi, Pascal Sasdrich, David Knichel,
bibinfo, video - Cryptanalysis of Masked Ciphers: A not so Random Idea,
Tim Beyne, Siemen Dhooghe, Zhenda Zhang,
bibinfo, video - Packed Multiplication: How to Amortize the Cost of Side-channel Masking?,
Yu Yu, Chun Guo, Weijia Wang, François-Xavier Standaert, Gaëtan Cassiers,
bibinfo, video - Side Channel Information Set Decoding using Iterative Chunking,
Ruben Niederhagen, Simona Samardjiska, Richard Petri, Norman Lahr,
bibinfo, video
- SILVER - Statistical Independence and Leakage Verification,
- Public Key Cryptography I
- Privacy-Preserving Pattern Matching on Encrypted Data,
Anis Bkakria, Frédéric Cuppens, Nora Cuppens,
bibinfo, video - Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions,
Keisuke Tanaka, Keita Xagawa, Fuyuki Kitagawa, Yusuke Yoshida,
bibinfo, video - Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption,
Moti Yung, Xinyi Huang, Rongmao Chen,
bibinfo, video - Efficient Homomorphic Comparison Methods with Optimal Complexity,
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim,
bibinfo, video
- Privacy-Preserving Pattern Matching on Encrypted Data,
- Public Key Cryptography II
- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage,
Dario Fiore, Luca Nizzardo, Matteo Campanelli, Nicola Greco, Dimitris Kolonelos,
bibinfo, video - Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions,
David J. Wu, Sam Kim,
bibinfo, video - Unbounded HIBE with Tight Security,
Jiaxin Pan, Roman Langrehr,
bibinfo, video - Multi-Client Oblivious RAM with Poly-Logarithmic Communication,
Sherman S. M. Chow, Russell W. F. Lai, Giulio Malavolta, Katharina Fech,
bibinfo, video
- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage,
- Lattice-Based Cryptography
- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings,
Muhammed F. Esgin, Gregor Seiler, Ngoc Khanh Nguyen,
bibinfo, video - Towards Classical Hardness of Module-LWE: The Linear Rank Case,
Adeline Roux-Langlois, Weiqiang Wen, Katharina Boudgoust, Corentin Jeudy,
bibinfo, video - Lattice-Based E-Cash, Revisited,
Benoît Libert, Khoa Nguyen, Olivier Sanders, Amit Deo,
bibinfo, video - Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices,
Adeline Roux-Langlois, Olivier Bernard,
bibinfo, video - Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers,
Daniele Micciancio, Jessica Sorrell,
bibinfo, video
- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings,
- Quantum Algorithms
- Estimating quantum speedups for lattice sieves,
Martin R. Albrecht, John M. Schanck, Eamonn W. Postlethwaite, Vlad Gheorghiu,
bibinfo, video - A Combinatorial Approach to Quantum Random Functions,
Nico Döttling, Giulio Malavolta, Sihang Pu,
bibinfo, video - Improved Classical and Quantum Algorithms for Subset-Sum,
André Schrottenloher, Yixin Shen, Xavier Bonnetain, Rémi Bricout,
bibinfo, video - Security Limitations of Classical-Client Delegated Quantum Computing,
Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden, Dominik Leichtle, Atul Mantri,
bibinfo, video
- Estimating quantum speedups for lattice sieves,
- Multi-party Computation
- Quantum Circuit Implementations of AES with Fewer Qubits,
Wenling Wu, Jian Zou, Siwei Sun, Zihao Wei, Ximeng Liu,
bibinfo, video - Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories,
Xiaoyun Wang, Lei Hu, Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao,
bibinfo, video - MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication,
Vladimir Kolesnikov, David Heath, Stanislav Peceny,
bibinfo, video - Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning,
Hao Chen, Miran Kim, Yongsoo Song, Dragos Rotaru, Ilya Razenshteyn, Sameer Wagh,
bibinfo, video - Secure MPC: Laziness Leads to GOD,
Amit Sahai, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar,
bibinfo, video - Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings,
Muhammed F. Esgin, Gregor Seiler, Ngoc Khanh Nguyen,
bibinfo - Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security,
Ran Canetti, Xiao Wang, Pratik Sarkar,
bibinfo, video
- Quantum Circuit Implementations of AES with Fewer Qubits,
- Isogeny-based Cryptography
- Cryptographic Group Actions and Applications,
Hart Montgomery, Sikhar Patranabis, Navid Alamati, Luca De Feo,
bibinfo, video - B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion,
Craig Costello,
bibinfo, video - Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices,
Shuichi Katsumata, Ward Beullens, Federico Pintore,
bibinfo, video - Radical Isogenies,
Frederik Vercauteren, Wouter Castryck, Thomas Decru,
bibinfo, video - Oblivious Pseudorandom Functions from Isogenies,
Dan Boneh, Dmitry Kogan, Katharine Woo,
bibinfo, video - SiGamal: A supersingular isogeny-based PKE and its application to a PRF,
Tsuyoshi Takagi, Tomoki Moriya, Hiroshi Onuki,
bibinfo, video
- Cryptographic Group Actions and Applications,
- Authenticated Key Exchange
- Fuzzy Asymmetric Password-Authenticated Key Exchange,
Julia Hesse, Andreas Erwig, Maximilian Orlt, Siavash Riahi,
bibinfo, video - Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security,
Shengli Liu, Dawu Gu, Jian Weng, Xiangyu Liu,
bibinfo, video - ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing,
Ignacio Cascudo, Bernardo David,
bibinfo, video - Secret-Shared Shuffle,
Melissa Chase, Esha Ghosh, Oxana Poburinnaya,
bibinfo, video
- Fuzzy Asymmetric Password-Authenticated Key Exchange,
- Multi-party Computation II
- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation,
Arpita Patra, Divya Ravi, Swati Singla,
bibinfo, video - MPC with Synchronous Security and Asynchronous Responsiveness,
Tal Moran, Daniel Tschudi, Ueli Maurer, Julian Loss, Chen-Da Liu-Zhang,
bibinfo, video - Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pk Z,
Ronald Cramer, Chaoping Xing, Chen Yuan, Ivan Damgård, Daniel Escudero, Mark Abspoel, Matthieu Rambaud,
bibinfo, video - Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation,
Eduardo Soria-Vazquez, Eysa Lee, Anders Dalskov,
bibinfo, video - Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs,
Yuval Ishai, Niv Gilboa, Elette Boyle, Ariel Nof,
bibinfo, video
- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation,
- Blockchains and Contact Tracing
- Updatable Encryption
- The Direction of Updatable Encryption does not Matter Much,
Yao Jiang,
bibinfo, video - Improving Speed and Security in Updatable Encryption Schemes,
Dan Boneh, Sam Kim, Saba Eskandarian, Maurice Shih,
bibinfo, video - CCA Updatable Encryption Against Malicious Re-Encryption Attacks,
Qiang Tang, Long Chen, Ya-Nan Li,
bibinfo, video - Determining the Core Primitive for Optimally Secure Ratcheting,
Serge Vaudenay, Paul Rösler, Fatih Balli,
bibinfo, video
- The Direction of Updatable Encryption does not Matter Much,
- Zero Knowledge
- Cryptography from One-Way Communication: On Completeness of Finite Channels,
Eyal Kushilevitz, Yuval Ishai, Alon Rosen, Manoj Prabhakaran, Shweta Agrawal, Varun Narayanan, Vinod Prabhakaran,
bibinfo, video - Succinct Functional Commitment for a Large Class of Arithmetic Circuits,
Helger Lipmaa, Kateryna Pavlyk,
bibinfo, video - Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation,
Aggelos Kiayias, Foteini Baldimtsi, Bingsheng Zhang, Thomas Zacharias,
bibinfo, video - Non-Interactive Composition of Sigma-Protocols via Share-then-Hash,
Masayuki Abe, Miyako Ohkubo, Alon Rosen, Andrej Bogdanov, Miguel Ambrona,
bibinfo, video - Succinct Diophantine-Satisfiability Arguments,
Damien Vergnaud, Patrick Towa,
bibinfo, video - Individual Simulations,
Yi Deng,
bibinfo, video
- Cryptography from One-Way Communication: On Completeness of Finite Channels,
- Attribute-based Encryption (ABE)
- Adaptively Secure Inner Product Encryption from LWE,
Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata,
bibinfo, video - Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions,
Nuttapong Attrapadung, Junichi Tomida,
bibinfo, video - Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin,
Huijia Lin, Ji Luo,
bibinfo, video - Inner-Product Functional Encryption with Fine-Grained Access Control,
Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu,
bibinfo, video - MoniPoly---An Expressive q-SDH-Based Anonymous Attribute-Based Credential System,
Thomas Gross, Syh-Yuan Tan,
bibinfo, video
- Adaptively Secure Inner Product Encryption from LWE,