EUROCRYPT 2019:
Vincent Rijmen and Yuval Ishai (Eds.):
Eurocrypt 2019
Darmstadt, Germany
May 19-23, 2019
Proceedings
Organizational Committee
Program Chairs: Vincent Rijmen and Yuval Ishai
General Chair: Marc Fischlin
Program Committee
Michel Abdalla
Adi Akavia
Martin Albrecht
Elena Andreeva
Paulo Barreto
Amos Beimel
Alex Biryukov
Nir Bitansky
Andrej Bogdanov
Christina Boura
Xavier Boyen
David Cash
Melissa Chase
Kai-Min Chung
Dana Dachman-Soled
Ivan Damgård
Itai Dinur
Stefan Dziembowski
Serge Fehr
Juan A. Garay
Sanjam Garg
Christina Garman
Siyao Guo
Iftach Haitner
Shai Halevi
Brett Hemenway
Justin Holmgren
Stanislaw Jarecki
Dakshita Khurana
Ilan Komargodski
Gregor Leander
Huijia (Rachel) Lin
Atul Luykx
Mohammad Mahmoody
Bart Mennink
Tal Moran
Svetla Nikova
Claudio Orlandi
Rafail Ostrovsky
Rafael Pass
Krzysztof Pietrzak
Bart Preneel
Christian Rechberger
Leonid Reyzin
Guy Rothblum
Amit Sahai
Christian Schaffner
Gil Segev
abhi shelat
Martijn Stam
Marc Stevens
Stefano Tessaro
Mehdi Tibouchi
Frederik Vercauteren
Brent Waters
Mor Weiss
David Wu
Vassilis Zikas
Program Chairs: Vincent Rijmen and Yuval Ishai
General Chair: Marc Fischlin
Program Committee
Michel Abdalla
Adi Akavia
Martin Albrecht
Elena Andreeva
Paulo Barreto
Amos Beimel
Alex Biryukov
Nir Bitansky
Andrej Bogdanov
Christina Boura
Xavier Boyen
David Cash
Melissa Chase
Kai-Min Chung
Dana Dachman-Soled
Ivan Damgård
Itai Dinur
Stefan Dziembowski
Serge Fehr
Juan A. Garay
Sanjam Garg
Christina Garman
Siyao Guo
Iftach Haitner
Shai Halevi
Brett Hemenway
Justin Holmgren
Stanislaw Jarecki
Dakshita Khurana
Ilan Komargodski
Gregor Leander
Huijia (Rachel) Lin
Atul Luykx
Mohammad Mahmoody
Bart Mennink
Tal Moran
Svetla Nikova
Claudio Orlandi
Rafail Ostrovsky
Rafael Pass
Krzysztof Pietrzak
Bart Preneel
Christian Rechberger
Leonid Reyzin
Guy Rothblum
Amit Sahai
Christian Schaffner
Gil Segev
abhi shelat
Martijn Stam
Marc Stevens
Stefano Tessaro
Mehdi Tibouchi
Frederik Vercauteren
Brent Waters
Mor Weiss
David Wu
Vassilis Zikas
- IACR Distinguished Lecture
- Invited Talk
- Invited Talk
- Best Young Researcher Paper
- Efficient Verifiable Delay Functions, 379-407, Benjamin Wesolowski
bib info
Session chair: Vincent Rijmen
- Efficient Verifiable Delay Functions, 379-407, Benjamin Wesolowski
-
Best Paper
- Quantum Lightning Never Strikes the Same State Twice, 408-438, Mark Zhandry
bib info
Session chair: Vincent Rijmen
- Quantum Lightning Never Strikes the Same State Twice, 408-438, Mark Zhandry
- ABE and CCA Security
- Compact Adaptively Secure ABE for NC1 from k-Lin, 3-33, Hoeteck Wee, Lucas Kowalczyk
bib info - Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption, 34-67, Nuttapong Attrapadung
bib info - (R)CCA Secure Updatable Encryption with Integrity Protection, 68-99, Andy Rupp, Anja Lehmann, Michael Klooß
bib info - Succinct Arguments and Secure Messaging
- Aurora: Transparent Succinct Arguments for R1CS, 103-128, Alessandro Chiesa, Eli Ben-Sasson, Madars Virza, Nicholas Spooner, Michael Riabzev, Nicholas P. Ward
bib info - The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol, 129-158, Joël Alwen, Yevgeniy Dodis, Sandro Coretti
bib info - Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging, 159-188, Ueli Maurer, Daniel Jost, Marta Mularczyk
bib info - Obfuscation
- Indistinguishability Obfuscation Without Multilinear Maps: New Methods for
Bootstrapping and Instantiation, 191-225, Shweta Agrawal
bib info - How to Leverage Hardness of Constant-Degree Expanding Polynomials over RR to build iOiO, 251-281, Amit Sahai, Huijia Lin, Christian Matt, Aayush Jain
bib info - Sum-of-Squares Meets Program Obfuscation, Revisited, 226-250, Amit Sahai, Boaz Barak, Aayush Jain, Samuel B. Hopkins, Pravesh Kothari
bib info
- Indistinguishability Obfuscation Without Multilinear Maps: New Methods for
Bootstrapping and Instantiation, 191-225, Shweta Agrawal
- Block Ciphers
- XOR-Counts and Lightweight Multiplication with Fixed Elements in Binary Finite Fields (paper unavailable), 285-312, Lukas Kölsch
bib info - DLCT: A New Tool for Differential-Linear Cryptanalysis, 313-342, Orr Dunkelman, Nathan Keller, Achiya Bar-On, Ariel Weizman
bib info - Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC, 343-372, Christian Rechberger, Itai Dinur, Daniel Kales, Sebastian Ramacher, Angela Promitzer
bib info
- XOR-Counts and Lightweight Multiplication with Fixed Elements in Binary Finite Fields (paper unavailable), 285-312, Lukas Kölsch
- Differential Privacy
- Bounds for Symmetric Cryptography
- Non-Malleability
- Non-Malleable Codes Against Bounded Polynomial Time Tampering, 501-530, Tal Malkin, Huijia Lin, Dana Dachman-Soled, Marshall Ball, Mukul Kulkarni
bib info - Continuous Non-Malleable Codes in the 8-Split-State Model, 531-561, Jesper Buus Nielsen, Divesh Aggarwal, Nico Döttling, Maciej Obremski, Erick Purwanto
bib info - Correlated-Source Extractors and Cryptography with Correlated-Random Tapes, 562-592, Vipul Goyal, Yifan Song
bib info - Revisiting Non-Malleable Secret Sharing, 593-622, Saikrishna Badrinarayanan, Akshayaram Srinivasan
bib info
- Non-Malleable Codes Against Bounded Polynomial Time Tampering, 501-530, Tal Malkin, Huijia Lin, Dana Dachman-Soled, Marshall Ball, Mukul Kulkarni
- Blockchain and Consensus
- Multi-party Virtual State Channels, 625-656, Stefan Dziembowski, Sebastian Faust, Julia Hesse, Kristina Hostáková, Lisa Eckey
bib info - Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble, 657-689, Yannick Seurin, Georg Fuchsbauer, Michele Orrù
bib info - Proof-of-Stake Protocols for Privacy-Aware Blockchains, 690-719, Claudio Orlandi, Daniel Tschudi, Chaya Ganesh
bib info - Consensus Through Herding, 720-749, Rafael Pass, Elaine Shi, T.-H. Hubert Chan
bib info
- Multi-party Virtual State Channels, 625-656, Stefan Dziembowski, Sebastian Faust, Julia Hesse, Kristina Hostáková, Lisa Eckey
- Homomorphic Primitives
- Homomorphic Secret Sharing from Lattices Without FHE, 3-33, Elette Boyle, Peter Scholl, Lisa Kohl
bib info - Improved Bootstrapping for Approximate Homomorphic Encryption (paper not available), 34-54, Hao Chen, Ilaria Chillotti, Yongsoo Song
bib info - Minicrypt Primitives with Algebraic Structure and Applications, 55-82, Hart Montgomery, Sikhar Patranabis, Navid Alamati, Arnab Roy
bib info
- Homomorphic Secret Sharing from Lattices Without FHE, 3-33, Elette Boyle, Peter Scholl, Lisa Kohl
- Standards
- Attacks only Get Better: How to Break FF3 on Large Domains, 85-116, Viet Tung Hoang, Ni Trieu, David Miller
bib info - Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT, 117-150, Tibor Jager, Nimrod Aviram, Kai Gellert
bib info - An Analysis of NIST SP 800-90A, 151-180, Joanne Woodage, Dan Shumow
bib info
- Attacks only Get Better: How to Break FF3 on Large Domains, 85-116, Viet Tung Hoang, Ni Trieu, David Miller
- Searchable Encryption and ORAM
- Computationally Volume-Hiding Structured Encryption, 183-213, Seny Kamara, Tarik Moataz
- Locality-Preserving Oblivious RAM, 214-243, Rafael Pass, Elaine Shi, Gilad Asharov, T.-H. Hubert Chan, Ling Ren, Kartik Nayak
bib info - Private Anonymous Data Access, 244-273, Rafail Ostrovsky, Daniel Wichs, Mor Weiss, Ariel Hamlin
bib info
- Proofs of Work and Space
- Reversible Proofs of Sequential Work, 277-291, Krzysztof Pietrzak, Michael Walter, Hamza Abusalah, Chethan Kamath, Karen Klein
bib info - Incremental Proofs of Sequential Work, 292-323, Nico Döttling, Russell W. F. Lai, Giulio Malavolta
bib info - Tight Proofs of Space and Replication, 324-348, Ben Fisch
bib info
- Reversible Proofs of Sequential Work, 277-291, Krzysztof Pietrzak, Michael Walter, Hamza Abusalah, Chethan Kamath, Karen Klein
- Secure Computation
- Quantum I
- Secure Computation and NIZK
- A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model, 473-503, Geoffroy Couteau
bib info - Merge
- Merge
- Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions, 622-651, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata
bib info - Designated-Verifier Pseudorandom Generators, and Their Applications, 562-592, Dennis Hofheinz, Geoffroy Couteau
bib info - Reusable Designated-Verifier NIZKs for all NP from CDH, 593-621, Daniel Wichs, Ron D. Rothblum, Willy Quach
bib info
- Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions, 622-651, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata
- A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model, 473-503, Geoffroy Couteau
- Lattice-Based Cryptography
- Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More, 655-684, Daniele Micciancio, Nicholas Genise, Yuriy Polyakov
bib info - Approx-SVP in Ideal Lattices with Pre-processing, 685-716, Guillaume Hanrot, Damien Stehlé, Alice Pellet-Mary
bib info - The General Sieve Kernel and New Records in Lattice Reduction, 717-746, Marc Stevens, Martin R. Albrecht, Gottfried Herold, Léo Ducas, Elena Kirshanova, Eamonn W. Postlethwaite
bib info - Misuse Attacks on Post-quantum Cryptosystems, 747-776, Serge Vaudenay, F. Betül Durak, Ciprian Băetu, Loés Huguenin-Dumittan, Abdullah Talayhan
bib info
- Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More, 655-684, Daniele Micciancio, Nicholas Genise, Yuriy Polyakov
- Foundations I
- Efficient Secure Computation
- Covert Security with Public Verifiability: Faster, Leaner, and Simpler, 97-121, Vladimir Kolesnikov, Jonathan Katz, Xiao Wang, Cheng Hong, Wen-jie Lu
bib info - Efficient Circuit-Based PSI with Linear Communication, 122-153, Benny Pinkas, Thomas Schneider, Avishay Yanai, Oleksandr Tkachenko
bib info - An Algebraic Approach to Maliciously Secure Private Set Intersection, 154-185, Tobias Nilges, Satrajit Ghosh
bib info
- Covert Security with Public Verifiability: Faster, Leaner, and Simpler, 97-121, Vladimir Kolesnikov, Jonathan Katz, Xiao Wang, Cheng Hong, Wen-jie Lu
- Quantum II
- On Finding Quantum Multi-collisions, 189-218, Mark Zhandry, Qipeng Liu
bib info - On Quantum Advantage in Information Theoretic Single-Server PIR, 219-246, Zvika Brakerski, Kai-Min Chung, Dorit Aharonov, Ayal Green, Ching-Yi Lai, Or Sattath
bib info - Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources, 247-277, Stacey Jeffery, Thomas Vidick, Andrea Coladangelo, Alex B. Grilo
bib info
- On Finding Quantum Multi-collisions, 189-218, Mark Zhandry, Qipeng Liu
- Signatures I
- Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions, 281-311, Michael Backes, Nico Döttling, Jonas Schneider, Lucjan Hanzlik, Kamil Kluczniak
bib info - Group Signatures Without NIZK: From Lattices in the Standard Model, 312-344, Shota Yamada, Shuichi Katsumata
bib info - A Modular Treatment of Blind Signatures from Identification Schemes, 345-375, Eike Kiltz, Julian Loss, Eduard Hauck
bib info
- Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions, 281-311, Michael Backes, Nico Döttling, Jonas Schneider, Lucjan Hanzlik, Kamil Kluczniak
- Information-Theoretic Cryptography
- Secret-Sharing Schemes for General and Uniform Access Structures, 441-471, Amos Beimel, Benny Applebaum, Naty Peter, Oriol Farràs, Oded Nir
bib info - Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary, 472-499, Serge Fehr, Chen Yuan
bib info - Simple Schemes in the Bounded Storage Model, 500-524, Mark Zhandry, Jiaxin Guan
bib info
- Secret-Sharing Schemes for General and Uniform Access Structures, 441-471, Amos Beimel, Benny Applebaum, Naty Peter, Oriol Farràs, Oded Nir
- Cryptanalysis
- Foundations II
- Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing, 619-635, Vinod Vaikuntanathan, Daniel Wichs, Vadim Lyubashevsky, Zvika Brakerski
bib info - New Techniques for Obfuscating Conjunctions, 636-666, Mark Zhandry, Tancrède Lepoint, Fermi Ma, James Bartusek
bib info - Distributional Collision Resistance Beyond One-Way Functions, 667-695, Iftach Haitner, Nir Bitansky, Ilan Komargodski, Eylon Yogev
bib info
- Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing, 619-635, Vinod Vaikuntanathan, Daniel Wichs, Vadim Lyubashevsky, Zvika Brakerski
- Signatures II
- Multi-target Attacks on the Picnic Signature Scheme and Related Protocols, 699-727, Itai Dinur, Niv Nadler
bib info - Durandal: A Rank Metric Based Signature Scheme, 728-758, Gilles Zémor, Philippe Gaborit, Olivier Blazy, Adrien Hauteville, Nicolas Aragon
bib info - SeaSign: Compact Isogeny Signatures from Class Group Actions, 759-789, Steven D. Galbraith, Luca De Feo
bib info
- Multi-target Attacks on the Picnic Signature Scheme and Related Protocols, 699-727, Itai Dinur, Niv Nadler