CRYPTO 2021:
Tal Malkin and Chris Peikert (Eds.)
Santa Barbara, CA, USA
August 15-19, 2021
Proceedings.
cryptodb information for CRYPTO 2021
Organizational Committee
Program Chairs:
Tal Malkin and Chris Peikert
General Chair:
Vladimir Kolesnikov
Tal Malkin and Chris Peikert
General Chair:
Vladimir Kolesnikov
Program Committee
Divesh Aggarwal
Ghada Almashaqbeh
Elena Andreeva
Nuttapong Attrapadung
Fabrice Benhamouda
Nir Bitansky
Jeremiah Blocki
Andrej Bogdanov
Xavier Bonnetain
Jonathan Bootle
Ran Canetti
David Cash
Sandro Coretti
Itai Dinur
Chaya Ganesh
Romain Gay
Rosario Gennaro
Junqing Gong
Paul Grubbs
Siyao Guo
Viet Tung Hoang
Dennis Hofheinz
Joseph Jaeger
Stanislaw Jarecki
Marcel Keller
Elena Kirshanova
Lisa Kohl
Tianren Liu
Tal Malkin
Peihan Miao
Brice Minaud
Tarik Moataz
Ryo Nishimaki
Claudio Orlandi
Omer Paneth
Sikhar Patranabis
Chris Peikert
Thomas Peters
Thomas Peyrin
Antigoni Polychroniadou
Manoj Prabhakaran
Mariana Raykova
Mike Rosulek
John M. Schanck
Peter Schwabe
abhi shelat
Sina Shiehian
Fang Song
Ron Steinfeld
Jean-Pierre Tillich
Ni Trieu
Dominique Unruh
Muthuramakrishnan Venkitasubramaniam
Daniele Venturi
Frederik Vercauteren
Mor Weiss
David Wu
Yu Yu
Program
- Signatures
- Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions,
Payman Mohassel, Valeria Nikolaenko, Yashvanth Kondi, Francois Garillot,
bibinfo, video - Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses,
Jeffrey Burdges, Handan Kilinc Alper,
bibinfo, video - MuSig2: Simple Two-Round Schnorr Multi-Signatures,
Yannick Seurin, Jonas Nick, Tim Ruffing,
bibinfo, video - Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols,
Gil Segev, Lior Rotem,
bibinfo, video
- Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions,
- Signatures (continued)
- DualRing: Generic Construction of Ring Signatures with Efficient Instantiations,
Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Muhammed F. Esgin, Zhimin Ding,
bibinfo, video - Compact Ring Signatures from Learning With Errors,
Omkant Pandey, Xiaohui Liang, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Rahul Chatterjee, Giulio Malavolta, Sina Shiehian,
bibinfo, video
- DualRing: Generic Construction of Ring Signatures with Efficient Instantiations,
- Quantum Cryptography 1
- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds,
Kai-Min Chung, Takashi Yamakawa, Nai-Hui Chia,
bibinfo, video - On the Concurrent Composition of Quantum Zero-Knowledge,
Kai-Min Chung, Prabhanjan Ananth, Rolando L. La Placa,
bibinfo, video - Multi-theorem Designated-Verifier NIZK for QMA,
Omri Shmueli,
bibinfo, video - On the Round Complexity of Secure Quantum Computation,
Dakshita Khurana, Fermi Ma, James Bartusek, Andrea Coladangelo,
bibinfo, video
- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds,
- Quantum Cryptography 1 (continued)
- Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort,
Kai-Min Chung, Bar Alon, Hao Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen,
bibinfo, video - One-Way Functions Imply Secure Computation in a Quantum World,
Dakshita Khurana, Fermi Ma, James Bartusek, Andrea Coladangelo,
bibinfo, video - Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits,
Christian Schaffner, Zvika Brakerski, Yfke Dulek, Gorjan Alagic,
bibinfo, video
- Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort,
- Multi-Party Computation 1
- Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election,
Elaine Shi, Kai-Min Chung, T-H. Hubert Chan, Ting Wen,
bibinfo, video - Computational Hardness of Optimal Fair Computation: Beyond Minicrypt,
Hemanta K. Maji, Mingyuan Wang,
bibinfo, video - You Only Speak Once: Secure MPC with Stateless Ephemeral Roles,
Shai Halevi, Craig Gentry, Jesper Buus Nielsen, Hugo Krawczyk, Tal Rabin, Bernardo Magri, Sophia Yakoubov,
bibinfo, video - Fluid MPC: Secure Multiparty Computation with Dynamic Participants,
Matthew Green, Abhishek Jain, Arka Rai Choudhuri, Aarushi Goel, Gabriel Kaptchuk,
bibinfo, video - Secure Computation from One-Way Noisy Communication, or: Anti-Correlation via Anti-Concentration,
Eyal Kushilevitz, Yuval Ishai, Alon Rosen, Manoj Prabhakaran, Shweta Agrawal, Vinod M. Prabhakaran, Varun Narayanan,
bibinfo, video
- Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election,
- Invited Talk I
- Which e-voting problems do we need to solve?,
Vanessa Teague,
bibinfo
- Which e-voting problems do we need to solve?,
- Award Papers
- On the Possibility of Basing Cryptography on EXP ≠ BPP,
Rafael Pass, Yanyi Liu,
bibinfo, video - Linear Cryptanalysis of FF3-1 and FEA,
Tim Beyne,
bibinfo, video - Efficient Key Recovery for all HFE Signature Variants,
Jintai Ding, Albrecht Petzoldt, Chengdong Tao,
bibinfo, video - Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits,
Mike Rosulek, Lawrence Roy,
bibinfo, video
- On the Possibility of Basing Cryptography on EXP ≠ BPP,
- Lattice Cryptography
- Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices,
Martin R. Albrecht, Russell W. F. Lai,
bibinfo, video - A Compressed Sigma-Protocol Theory for Lattices,
Ronald Cramer, Lisa Kohl, Thomas Attema,
bibinfo, video - A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs,
Shuichi Katsumata,
bibinfo, video - SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions,
Vadim Lyubashevsky, Gregor Seiler, Ngoc Khanh Nguyen,
bibinfo, video - Deniable Fully Homomorphic Encryption from Learning With Errors,
Shafi Goldwasser, Shweta Agrawal, Saleet Mossel,
bibinfo, video
- Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices,
- Lattice Cryptanalysis
- Counterexamples to New Circular Security Assumptions Underlying iO,
Huijia Lin, Aayush Jain, Samuel B. Hopkins,
bibinfo, video - How to Meet Ternary LWE Keys,
Alexander May,
bibinfo, video - Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance,
Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell,
bibinfo, video - Towards faster polynomial-time lattice reduction,
Pierre-Alain Fouque, Paul Kirchner, Thomas Espitau,
bibinfo, video - Lower bounds on lattice sieving and information set decoding,
Elena Kirshanova, Thijs Laarhoven,
bibinfo, video
- Counterexamples to New Circular Security Assumptions Underlying iO,
- Multi-Party Computation 2
- Broadcast-Optimal Two Round MPC with an Honest Majority,
Bernardo Magri, Luisa Siniscalchi, Sophia Yakoubov, Ivan Damgård, Divya Ravi,
bibinfo, video - Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer,
Arpita Patra, Akshayaram Srinivasan,
bibinfo, video - On the Round Complexity of Secure Quantum Computation,
Dakshita Khurana, Fermi Ma, James Bartusek, Andrea Coladangelo,
bibinfo
- Broadcast-Optimal Two Round MPC with an Honest Majority,
- Multi-Party Computation 2 (continued)
- ATLAS: Efficient and Scalable MPC in the Honest Majority Setting,
Rafail Ostrovsky, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Hanjun Li,
bibinfo, video - Unconditional Communication-Efficient MPC via Hall's Marriage Theorem,
Vipul Goyal, Antigoni Polychroniadou, Yifan Song,
bibinfo, video - Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions,
Koji Nuida, Shota Yamada, Reo Eriguchi, Kazuma Ohara,
bibinfo, video - Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings,
Eduardo Soria-Vazquez, Daniel Escudero,
bibinfo, video
- ATLAS: Efficient and Scalable MPC in the Honest Majority Setting,
- Quantum Cryptography 2
- New Approaches for Quantum Copy-Protection,
Mark Zhandry, Qipeng Liu, Scott Aaronson, Jiahui Liu, Ruizhe Zhang,
bibinfo, video - Hidden Cosets and Applications to Unclonable Cryptography,
Mark Zhandry, Qipeng Liu, Andrea Coladangelo, Jiahui Liu,
bibinfo, video - On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model,
Tetsu Iwata, Akinori Hosoyamada,
bibinfo, video - Quantum Collision Attacks on Reduced SHA-256 and SHA-512,
Yu Sasaki, Akinori Hosoyamada,
bibinfo, video
- New Approaches for Quantum Copy-Protection,
- Invited Talk II
- A World of SNARKS,
Jens Groth,
bibinfo, video
- A World of SNARKS,
- Succinct Arguments
- Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments,
Dan Boneh, Ariel Gabizon, Ben Fisch, Justin Drake,
bibinfo, video - Proof-Carrying Data without Succinct Arguments,
Alessandro Chiesa, Wei-Kai Lin, Benedikt Bünz, Nicholas Spooner, Pratyush Mishra,
bibinfo, video - Subquadratic SNARGs in the Random Oracle Model,
Alessandro Chiesa, Eylon Yogev,
bibinfo, video - Tight State-Restoration Soundness in the Algebraic Group Model,
Stefano Tessaro, Ashrujit Ghoshal,
bibinfo, video - Sumcheck Arguments and their Applications,
Alessandro Chiesa, Jonathan Bootle, Katerina Sotiraki,
bibinfo, video - An Algebraic Framework for Universal and Updatable SNARKs,
Carla Ràfols, Arantxa Zapico,
bibinfo, video
- Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments,
- Models
- A Rational Protocol Treatment of 51% Attacks,
Vassilis Zikas, Christian Badertscher, Yun Lu,
bibinfo, video - MoSS: Modular Security Specifications Framework,
Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak,
bibinfo, video - Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model,
Yishay Mansour, Kobbi Nissim, Marc Kaplan, Uri Stemmer,
bibinfo, video
- A Rational Protocol Treatment of 51% Attacks,
- Applied Cryptography and Side Channels
- Provable Security Analysis of FIDO2,
Alexandra Boldyreva, Bogdan Warinschi, Manuel Barbosa, Shan Chen,
bibinfo, video - SSE and SSD: Page-Efficient Searchable Symmetric Encryption,
Pierre-Alain Fouque, Raphael Bost, Brice Minaud, Michael Reichle, Jean-Philippe Bossuat,
bibinfo, video - Towards Tight Random Probing Security,
Sebastian Faust, François-Xavier Standaert, Gaëtan Cassiers, Maximilian Orlt,
bibinfo, video - Secure Wire Shuffling in the Probing Model,
Jean-Sébastien Coron, Lorenzo Spignoli,
bibinfo, video
- Provable Security Analysis of FIDO2,
- Cryptanalysis
- Differential-Linear Cryptanalysis from an Algebraic Perspective,
Dongdai Lin, Xianhui Lu, Meicheng Liu,
bibinfo, video - Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks,
Xiaoyun Wang, Lei Hu, Xiaoyang Dong, Siwei Sun, Zheng Li, Jialiang Hua,
bibinfo, video - Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting,
Lei Wang, Dawu Gu, Jian Weng, Yaobin Shen,
bibinfo, video - Thinking Outside the Superbox,
Joan Daemen, Gilles Van Assche, Nicolas Bordes, Daniël Kuijsters,
bibinfo, video
- Differential-Linear Cryptanalysis from an Algebraic Perspective,
- Cryptanalysis (continued)
- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques,
Willi Meier, Takanori Isobe, Fukang Liu,
bibinfo, video - The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3,
Patrick Longa, Jakub Szefer, Wen Wang,
bibinfo, video - Improved torsion-point attacks on SIDH variants,
Katherine E. Stange, Christophe Petit, Chloe Martindale, Lorenz Panny, Péter Kutas, Victoria de Quehen, Chris Leonardi,
bibinfo, video
- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques,
- Codes and Extractors
- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN,
Jiang Zhang, Yu Yu,
bibinfo, video - Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes,
Srinivasan Raghuraman, Geoffroy Couteau, Peter Rindal,
bibinfo, video - Non-Malleable Codes for Bounded Parallel-Time Tampering,
Rafael Pass, Dana Dachman-Soled, Ilan Komargodski,
bibinfo, video - Improved Computational Extractors and their Applications,
Dakshita Khurana, Akshayaram Srinivasan,
bibinfo, video - Adaptive Extractors and their Application to Leakage Resilient Secret Sharing,
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar,
bibinfo, video
- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN,
- Secret Sharing
- Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n,
Benny Applebaum, Oded Nir,
bibinfo, video - Asymptotically-Good Arithmetic Secret Sharing over Z/plZ with Strong Multiplication and Its Applications to Efficient MPC,
Ronald Cramer, Chaoping Xing, Matthieu Rambaud,
bibinfo, video - Large Message Homomorphic Secret Sharing from DCR and Applications,
Jaspal Singh, Lawrence Roy,
bibinfo, video
- Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n,
- Secret Sharing (continued)
- Traceable Secret Sharing and Applications,
Vipul Goyal, Akshayaram Srinivasan, Yifan Song,
bibinfo, video - Quadratic Secret Sharing and Conditional Disclosure of Secrets,
Amos Beimel, Naty Peter, Hussien Othman,
bibinfo, video - Constructing Locally Leakage-resilient Linear Secret-sharing Schemes,
Hemanta K. Maji, Anat Paskin-Cherniavsky, Mingyuan Wang, Tom Suad,
bibinfo, video
- Traceable Secret Sharing and Applications,
- Zero-Knowledge
- Witness Authenticating NIZKs and Applications,
Qiang Tang, Hanwen Feng,
bibinfo, video - Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs,
Omkant Pandey, Xiaohui Liang,
bibinfo, video - Compressing Proofs of k-Out-Of-n Partial Knowledge,
Ronald Cramer, Serge Fehr, Thomas Attema,
bibinfo, video - Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions,
Alex J. Malozemoff, Carsten Baum, Peter Scholl, Marc B. Rosen,
bibinfo, video - Time- and Space-Efficient Arguments from Groups of Unknown Order,
Alon Rosen, Ron D. Rothblum, Justin Holmgren, Pratik Soni, Alexander R. Block,
bibinfo, video
- Witness Authenticating NIZKs and Applications,
- Multi-Party Computation 3
- Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact,
Jiang Zhang, Yu Yu, Shuoyao Zhao, Hanlin Liu, Wenling Liu, Zhenkai Hu,
bibinfo, video - Oblivious Key-Value Stores and Amplification for Private Set Intersection,
Benny Pinkas, Mike Rosulek, Avishay Yanai, Ni Trieu, Gayathri Garimella,
bibinfo, video - MHz2k: MPC from HE over Z2k with New Packing, Simpler Reshare, and Better ZKP,
Jung Hee Cheon, Dongwoo Kim, Keewoo Lee,
bibinfo, video - Sublinear GMW-Style Compiler for MPC with Preprocessing,
Yuval Ishai, Niv Gilboa, Elette Boyle, Ariel Nof,
bibinfo, video - Limits on the Adaptive Security of Yao’s Garbling,
Krzysztof Pietrzak, Daniel Wichs, Chethan Kamath, Karen Klein,
bibinfo, video
- Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact,
- Encryption++
- Broadcast Encryption with Size N1/3 and More from k-Lin,
Hoeteck Wee,
bibinfo - Fine-grained Secure Attribute-based Encryption,
Yu Chen, Jiaxin Pan, Yuyu Wang,
bibinfo, video - Multi-Input Quadratic Functional Encryption from Pairings,
Shweta Agrawal, Rishab Goyal, Junichi Tomida,
bibinfo, video - Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE,
Shweta Agrawal, Shota Yamada, Monosij Maitra, Narasimha Sai Vempati,
bibinfo, video - Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved,
Moti Yung, Guomin Yang, Ying Wang, Xinyi Huang, Bin Wang, Rongmao Chen,
bibinfo, video
- Broadcast Encryption with Size N1/3 and More from k-Lin,
- Foundations
- Foundations (continued)
- Non-Interactive Batch Arguments for NP from Standard Assumptions,
Abhishek Jain, Arka Rai Choudhuri, Zhengzhong Jin,
bibinfo, video - Targeted Lossy Functions and Applications,
Brent Waters, Daniel Wichs, Willy Quach,
bibinfo, video - The t-wise Independence of Substitution-Permutation Networks,
Vinod Vaikuntanathan, Stefano Tessaro, Tianren Liu,
bibinfo, video
- Non-Interactive Batch Arguments for NP from Standard Assumptions,
- Low-Complexity Cryptography
- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2],
Yuval Ishai, Niv Gilboa, Elette Boyle, Peter Scholl, Geoffroy Couteau, Lisa Kohl,
bibinfo, video - MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications,
Shai Halevi, Yuval Ishai, Itai Dinur, Steven Goldfeder, Greg Zaverucha, Mahimna Kelkar, Vivek Sharma,
bibinfo, video - No Time to Hash:On Super-Efficient Entropy Accumulation,
Yevgeniy Dodis, Noah Stephens-Davidowitz, Siyao Guo, Zhiye Xie,
bibinfo, video
- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2],
- Protocols
- A Logarithmic Lower Bound for Oblivious RAM (for all parameters),
Ilan Komargodski, Wei-Kai Lin,
bibinfo, video - Oblivious RAM with Worst-Case Logarithmic Overhead,
Elaine Shi, Gilad Asharov, Ilan Komargodski, Wei-Kai Lin,
bibinfo, video - Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time,
Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs,
bibinfo, video - Authenticated Key Exchange and Signatures with Tight Security in the Standard Model,
Eike Kiltz, Shengli Liu, Tibor Jager, Sven Schäge, Jiaxin Pan, Shuai Han, Doreen Riepel,
bibinfo, video - KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange,
Stanislaw Jarecki, Hugo Krawczyk, Yanqi Gu,
bibinfo, video
- A Logarithmic Lower Bound for Oblivious RAM (for all parameters),