ASIACRYPT 2021:
Singapore
December 5-12, 2021
cryptodb information for ASIACRYPT 2021
Organizational Committee
Program Chairs:
Mehdi Tibouchi and Huaxiong Wang
General Chair:
Jian Guo
Mehdi Tibouchi and Huaxiong Wang
General Chair:
Jian Guo
Program Committee
Shweta Agrawal
Martin R. Albrecht
Zhenzhen Bao
Manuel Barbosa
Lejla Batina
Sonia Belaïd
Fabrice Benhamouda
Begül Bilgin
Xavier Bonnetain
Joppe W. Bos
Wouter Castryck
Rongmao Chen
Jung Hee Cheon
Chitchanok Chuengsatiansup
Kai-Min Chung
Dana Dachman-Soled
Bernardo David
Benjamin Fuller
Steven D. Galbraith
Robert Granger
Alex B. Grilo
Aurore Guillevic
Swee-Huay Heng
Akinori Hosoyamada
Xinyi Huang
Andreas Hülsing
Tetsu Iwata
David Jao
Jérémy Jean
Shuichi Katsumata
Elena Kirshanova
Hyung Tae Lee
Dongdai Lin
Rongxing Lu
Xianhui Lu
Mary Maller
Giorgia Azzurra Marson
Keith M. Martin
Daniel Masny
Takahiro Matsuda
Krystian Matusiewicz
Florian Mendel
Nele Mentens
Atsuko Miyaji
Michael Naehrig
Khoa Nguyen
Miyako Ohkubo
Emmanuela Orsini
Jiaxin Pan
Panos Papadimitratos
Alice Pellet-Mary
Duong Hieu Phan
Francisco Rodríguez-Henríquez
Olivier Sanders
Jae Hong Seo
Haya Shulman
Daniel Slamanig
Ron Steinfeld
Willy Susilo
Katsuyuki Takashima
Qiang Tang
Maria Isabel González Vasco
Serge Vaudenay
Damien Vergnaud
Yongge Wang
Xiaoyun Wang
Meiqin Wang
Wenling Wu
Chaoping Xing
Sophia Yakoubov
Takashi Yamakawa
Bo-Yin Yang
Yu Yu
Hong-Sheng Zhou
- Award Papers
- On the hardness of the NTRU problem,
Damien Stehlé, Alice Pellet-Mary,
bibinfo, video - A Geometric Approach to Linear Cryptanalysis,
Tim Beyne,
bibinfo, video - Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation,
Pierrick Gaudry, Cécile Pierrot, Gabrielle De Micheli,
bibinfo, video - Post-Quantum Cryptography
- Gladius: LWR based efficient hybrid public key encryption with distributed decryption,
Nigel P. Smart, Kelong Cong, Daniele Cozzo, Varun Maram,
bibinfo, video - Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy,
Willy Susilo, Fangguo Zhang, Xiaofeng Chen, Jiaxin Pan,
bibinfo, video - A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV,
Tsuyoshi Takagi, Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura,
bibinfo, video - Shorter Lattice-Based Group Signatures via "Almost Free" Encryption and Other Optimizations,
Vadim Lyubashevsky, Gregor Seiler, Ngoc Khanh Nguyen, Maxime Plançon,
bibinfo, video - Séta: Supersingular Encryption from Torsion Attacks,
Christophe Petit, Benjamin Wesolowski, Javier Silva, Luca De Feo, Antonin Leroux, Cyprien Delpech de Saint Guilhem, Péter Kutas, Tako Boris Fouotsa,
bibinfo, video - SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH,
Christophe Petit, Tako Boris Fouotsa,
bibinfo, video
- Gladius: LWR based efficient hybrid public key encryption with distributed decryption,
- Multiparty Computation
- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials,
Koji Nuida, Reo Eriguchi,
bibinfo, video - Improved single-round secure multiplication using regenerating codes,
Ronald Cramer, Chaoping Xing, Ivan Damgård, Daniel Escudero, Mark Abspoel,
bibinfo, video - Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation,
Vladimir Kolesnikov, David Heath, Stanislav Peceny,
bibinfo, video - Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation,
Stefano Tessaro, Yu Long Chen,
bibinfo, video - Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH,
Hart Montgomery, Sikhar Patranabis, Navid Alamati, Pratik Sarkar,
bibinfo, video - Reverse Firewalls for Adaptively Secure MPC without Setup,
Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar, Mahak Pancholi,
bibinfo, video
- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials,
- IACR Distinguished Lecture by Andrew Yao
- Physical Attacks, Leakage and Countermeasures
- Secure and Efficient Software Masking on Superscalar Pipelined Processors,
Stefan Mangard, Robert Primas, Barbara Gigerl,
bibinfo, video - Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates,
Naofumi Homma, Keita Xagawa, Junko Takahashi, Rei Ueno, Akira Ito,
bibinfo, video - Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks,
Debdeep Mukhopadhyay, Shivam Bhasin, Sayandeep Saha, Dirmanto Jap, Arnab Bag,
bibinfo, video - Efficient Leakage-Resilient MACs without Idealized Assumptions,
Thomas Peters, Chun Guo, Francesco Berti, François-Xavier Standaert,
bibinfo, video - DEFAULT: Cipher Level Resistance Against Differential Fault Attack,
Thomas Peyrin, Sumanta Sarkar, Anubhab Baksi, Shivam Bhasin, Siang Meng Sim, Jakub Breier, Mustafa Khairallah,
bibinfo, video - Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity,
Damien Vergnaud, Matthieu Rivain, Sonia Belaïd, Abdul Rahman Taleb,
bibinfo, video
- Secure and Efficient Software Masking on Superscalar Pipelined Processors,
- Theory
- Bit Security as Computational Cost for Winning Games with High Probability,
Shun Watanabe, Kenji Yasunaga,
bibinfo, video - Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework),
Christopher Portmann, Ueli Maurer, Guilherme Rito,
bibinfo, video - How to Build a Trapdoor Function from an Encryption Scheme,
Rafail Ostrovsky, Sanjam Garg, Mohammad Hajiabadi, Giulio Malavolta,
bibinfo, video - Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions,
Brent Waters, David J. Wu, Rishab Goyal, Sam Kim,
bibinfo, video - Batching Base Oblivious Transfers,
Mike Rosulek, Ian McQuoid, Lawrence Roy,
bibinfo, video - Algebraic Adversaries in the Universal Composability Framework,
Michel Abdalla, Jonathan Katz, Manuel Barbosa, Julian Loss, Jiayu Xu,
bibinfo, video
- Bit Security as Computational Cost for Winning Games with High Probability,
- Public-Key Cryptanalysis & Authenticated Key Exchange
- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA,
Alexander May, Santanu Sarkar, Julian Nowakowski,
bibinfo, video - A formula for disaster: a unified approach to elliptic curve special-point-based attacks,
Billy Bob Brumley, Jan Jancar, Vladimir Sedlacek, Jesús-Javier Chi-Domínguez,
bibinfo, video - Cryptanalysis of an oblivious PRF from supersingular isogenies,
Christophe Petit, Antonio Sanso, Simon-Philipp Merz, Andrea Basso, Péter Kutas,
bibinfo, video - Symmetric Key Exchange with Full Forward Security and Robust Synchronization,
Colin Boyd, Tibor Jager, Gareth T. Davies, Kai Gellert, Bor de Kock, Lise Millerjord,
bibinfo, video - Security Analysis of CPace,
Michel Abdalla, Julia Hesse, Björn Haase,
bibinfo, video - Modular Design of Role-Symmetric Authenticated Key Exchange Protocols,
Rui Zhang, Yuting Xiao, Hui Ma,
bibinfo, video
- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA,
- Advanced Encryption and Signatures
- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups,
Brent Waters, Rishab Goyal, Jiahui Liu,
bibinfo, video - Public Key Encryption with Flexible Pattern Matching,
Guilhem Castagnos, Olivier Sanders, Elie Bouscatié,
bibinfo, video - Bounded Collusion ABE for TMs from IBE,
Brent Waters, Habeeb Syed, Rishab Goyal,
bibinfo, video - Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting,
Tibor Jager, Lin Lyu, Kai Gellert, Denis Diemert,
bibinfo, video - (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin,
Pratish Datta, Tapas Pal,
bibinfo, video - Boosting the Security of Blind Signature Schemes,
Jonathan Katz, Julian Loss, Michael Rosenberg,
bibinfo, video
- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups,
- Invited Talk by Kazue Sako
- Symmetric-Key Constructions
- Luby-Rackoff Backwards with More Users and More Security,
Mridul Nandi, Srimanta Bhattacharya,
bibinfo, video - Double-Block-Length Hash Function for Minimum Memory Size,
Yusuke Naito, Yu Sasaki, Takeshi Sugawara,
bibinfo, video - Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation,
Jooyoung Lee, ByeongHak Lee, Wonseok Choi, Yeongmin Lee,
bibinfo, video - Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys,
Stefano Tessaro, Xihu Zhang,
bibinfo, video - FAST: Secure and High Performance Format-Preserving Encryption and Tokenization,
Serge Vaudenay, Hartmut Isselhorst, F. Betül Durak, Michael Horst,
bibinfo, video - Fine-tuning the ISO/IEC Standard LightMAC,
Mridul Nandi, Ashwin Jha, Soumya Chattopadhyay,
bibinfo, video - Categorization of Faulty Nonce Misuse Resistant Message Authentication,
Bart Preneel, Bart Mennink, Yu Long Chen,
bibinfo, video
- Luby-Rackoff Backwards with More Users and More Security,
- Quantum Security
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model,
Zhenfeng Zhang, Zhi Ma, Haodong Jiang,
bibinfo, video - Redeeming Reset Indifferentiability and Applications to Post-Quantum Security,
Mark Zhandry,
bibinfo, video - Franchised Quantum Money,
Mark Zhandry, Bhaskar Roberts,
bibinfo, video - Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP,
Jeff Jianxin Yan,
bibinfo, video - Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication,
Ryo Nishimaki, Takashi Yamakawa, Taiga Hiroka, Tomoyuki Morimae,
bibinfo, video - Tight adaptive reprogramming in the QROM,
Andreas Hülsing, Christian Majenz, Kathrin Hövelmanns, Alex B. Grilo,
bibinfo, video - QCB: Efficient Quantum-secure Authenticated Encryption,
Gaëtan Leurent, Yannick Seurin, María Naya-Plasencia, André Chailloux, Ritam Bhaumik, André Schrottenloher, Xavier Bonnetain,
bibinfo, video
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model,
- Test-of-Time Award
- For constructing asymptotically optimal NIZK proofs and group signatures without using random oracles, and paving the way to practical constructions
Simulation-sound NIZK proofs for a practical language and constant size group signatures by Jens Groth at Asiacrypt 2006.
- For constructing asymptotically optimal NIZK proofs and group signatures without using random oracles, and paving the way to practical constructions
- Symmetric Cryptanalysis (I)
- A Practical Key-Recovery Attack on 805-Round Trivium,
Tian Tian, Chen-Dong Ye,
bibinfo, video - Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations,
Willi Meier, Santanu Sarkar, Takanori Isobe, Fukang Liu,
bibinfo, video - Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials,
Xiaoyun Wang, Lei Hu, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Congming Wei,
bibinfo, video - Clustering Effect in Simon and Simeck,
Gaëtan Leurent, André Schrottenloher, Clara Pernot,
bibinfo, video - New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair,
Serge Vaudenay, Subhadeep Banik, Khashayar Barooti, Hailun Yan,
bibinfo, video
- Enhanced PKE and Time-Lock Puzzles
- On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups,
Marc Stevens, Aron van Baarsen,
bibinfo, video - Astrolabous: A Universally Composable Time Lock Encryption Scheme,
Thomas Zacharias, Nikolaos Lamprou, Myrto Arapinis,
bibinfo, video - Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE,
Moti Yung, Ying Wang, Xinyi Huang, Bin Wang, Jianting Ning, Rongmao Chen,
bibinfo, video - Simulation-Based Bi-Selective Opening Security for Public Key Encryption,
Junzuo Lai, Jian Weng, Zhengan Huang, Rupeng Yang,
bibinfo, video - Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness,
Shengli Liu, Dawu Gu, Shuai Han,
bibinfo, video - Hierarchical Integrated Signature and Encryption,
Qiang Tang, Yu Chen, Yuyu Wang,
bibinfo, video
- Homomorphic Encryption and Encrypted Search
- Balanced Non-Adjacent Forms,
Marc Joye,
bibinfo, video - Efficient Boolean Search over Encrypted Data with Reduced Leakage,
Giuseppe Persiano, Sarvar Patel, Kevin Yeo, Joon Young Seo,
bibinfo, video - Revisiting Homomorphic Encryption Schemes for Finite Fields,
Andrey Kim, Yuriy Polyakov, Vincent Zucca,
bibinfo, video - Transciphering Framework for Approximate Homomorphic Encryption,
Dukjae Moon, Jooyoung Lee, HyoJin Yoon, Jihoon Cho, ByeongHak Lee, Seongkwang Kim, Jincheol Ha, Joohee Lee,
bibinfo, video - Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE,
Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap,
bibinfo, video
- NIZK and SNARKs
- Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions,
Dario Fiore, Antonio Faonio, Matteo Campanelli, Anaïs Querol, Hadrián Rodríguez,
bibinfo, video - Gentry-Wichs Is Tight: A Falsifiable Non-Adaptively Sound SNARG,
Helger Lipmaa, Kateryna Pavlyk,
bibinfo, video - Proofs for Inner Pairing Products and Applications,
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely,
bibinfo, video
- Symmetric Cryptanalysis (I)
- Invited Talk 2 by Yu Yu
- Symmetric Cryptanalysis (II)
- Convexity of division property transitions: theory, algorithms and compact models,
Aleksei Udovenko,
bibinfo, video - Strong and Tight Security Guarantees against Integral Distinguishers,
Gregor Leander, Yosuke Todo, Baptiste Lambin, Phil Hebborn,
bibinfo, video - Massive Superpoly Recovery with Nested Monomial Predictions,
Meiqin Wang, Qingju Wang, Yosuke Todo, Siwei Sun, Kai Hu,
bibinfo, video - Quantum Linearization Attacks,
Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Xavier Bonnetain,
bibinfo, video - Generic Framework for Key-Guessing Improvements,
Gregor Leander, María Naya-Plasencia, Antonio Flórez Gutiérrez, Federico Canale, Marek Broll,
bibinfo, video
- Zero-Knowledge Proofs, Threshold and Multi-Signatures
- PrORAM: Fast O(log n) Authenticated Shares ZK ORAM,
Vladimir Kolesnikov, David Heath,
bibinfo, video - Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures,
Ronald Cramer, Thomas Attema, Matthieu Rambaud,
bibinfo, video - Promise $\\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups,
Yi Deng, Xiang Xie, Xuyang Song, Shunli Ma, Xinxuan Zhang, Hailong Wang,
bibinfo, video - The One-More Discrete Logarithm Assumption in the Generic Group Model,
Georg Fuchsbauer, Balthazar Bauer, Antoine Plouviez,
bibinfo, video - Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge,
Helger Lipmaa, Prastudy Fauzi, Janno Siim, Michał Zając, Arne Tobias Ødegaard,
bibinfo, video - Chain Reductions for Multi-Signatures and the HBMS Scheme,
Mihir Bellare, Wei Dai,
bibinfo, video
- Lattice Cryptanalysis
- NTRU Fatigue: How Stretched is Overstretched?,
Léo Ducas, Wessel P. J. van Woerden,
bibinfo, video - Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS,
Thomas Johansson, Qian Guo,
bibinfo, video - Lattice sieving via quantum random walks,
André Chailloux, Johanna Loyer,
bibinfo, video - A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs,
Jintai Ding, Lei Hu, Chen-Mou Cheng, Yanbin Pan, Yu Qin, Xiaohan Zhang,
bibinfo, video
- Real-World Protocols
- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions,
Jonathan Katz, Julian Loss, Erica Blum,
bibinfo, video - Onion Routing with Replies,
Andy Rupp, Dennis Hofheinz, Christiane Kuhn, Thorsten Strufe,
bibinfo, video - Private Join and Compute from PIR with Default,
Sarvar Patel, Mariana Raykova, Karn Seth, Tancrède Lepoint, Ni Trieu,
bibinfo, video - Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures,
Matteo Maffei, Sebastian Faust, Oguzhan Ersoy, Kristina Hostáková, Andreas Erwig, Siavash Riahi, Lukas Aumayr, Pedro Moreno-Sanchez,
bibinfo, video - ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy,
Jörn Müller-Quade, Alexander Koch, Gunnar Hartung, Thorsten Strufe, Wasilij Beskorovajnov, Felix Dörre,
bibinfo, video - Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite,
Marc Fischlin, Olga Sanina,
bibinfo, video
- A Practical Key-Recovery Attack on 805-Round Trivium,