EUROCRYPT 2020:
Anne Canteaut and Yuval Ishai (Eds.):
Eurocrypt 2020
A Virtual Conference
May 11-15, 2020
Proceedings
Organizational Committee
Program Chairs: Anne Canteaut and Yuval Ishai
General Chair: Lejla Batina and Stjepan Picek
Program Committee
Luca De Feo
Thomas Fuhr
Romain Gay
Benedikt Gierlichs
Vipul Goyal
Rishab Goyal
Tim Güneysu
Jian Guo
Mohammad Hajiabadi
Carmit Hazay
Susan Hohenberger
Pavel Hubácek
Abhishek Jain
Marc Joye
Bhavana Kanukurthi
Nathan Keller
Susumu Kiyoshima
Eyal Kushilevitz
Gregor Leander
Tancrède Lepoint
Tal Malkin
Alexander May
Bart Mennink
Kazuhiko Minematsu
María Naya-Plasencia
Ryo Nishimaki
Cécile Pierrot
Ron Rothblum
Sondre Rønjom
Alessandra Scafuro
Peter Schwabe
Adam Smith
François-Xavier Standaert
Yosuke Todo
Prashant Nalini Vasudevan
Muthuramakrishnan Venkitasubramaniam
Frederik Vercauteren
Damien Vergnaud
Eylon Yogev
Yu Yu
Gilles Zémor
Program Chairs: Anne Canteaut and Yuval Ishai
General Chair: Lejla Batina and Stjepan Picek
Program Committee
Luca De Feo
Thomas Fuhr
Romain Gay
Benedikt Gierlichs
Vipul Goyal
Rishab Goyal
Tim Güneysu
Jian Guo
Mohammad Hajiabadi
Carmit Hazay
Susan Hohenberger
Pavel Hubácek
Abhishek Jain
Marc Joye
Bhavana Kanukurthi
Nathan Keller
Susumu Kiyoshima
Eyal Kushilevitz
Gregor Leander
Tancrède Lepoint
Tal Malkin
Alexander May
Bart Mennink
Kazuhiko Minematsu
María Naya-Plasencia
Ryo Nishimaki
Cécile Pierrot
Ron Rothblum
Sondre Rønjom
Alessandra Scafuro
Peter Schwabe
Adam Smith
François-Xavier Standaert
Yosuke Todo
Prashant Nalini Vasudevan
Muthuramakrishnan Venkitasubramaniam
Frederik Vercauteren
Damien Vergnaud
Eylon Yogev
Yu Yu
Gilles Zémor
- Opening Remarks + Number-Theoretic Cryptography
- He Gives C-Sieves on the CSIDH,
Chris Peikert,
bibinfo - Quantum Security Analysis of CSIDH,
André Schrottenloher, Xavier Bonnetain,
bibinfo - Double-Base Chains for Scalar Multiplications on Elliptic Curves,
Bao Li, Wei Yu, Saud Al Musa,
bibinfo - Rational isogenies from irrational endomorphisms,
Frederik Vercauteren, Wouter Castryck, Lorenz Panny,
bibinfo - Low Weight Discrete Logarithms and Subset Sum in 20.65n with Polynomial Memory,
Alexander May, Andre Esser,
bibinfo
- He Gives C-Sieves on the CSIDH,
- Best Paper Award
- Obfuscation, Functional Encryption, and Attribute-Based Encryption
- Candidate iO From Homomorphic Encryption Schemes,
Sanjam Garg, Zvika Brakerski, Nico Döttling, Giulio Malavolta,
bibinfo - Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE,
Shweta Agrawal, Alice Pellet-Mary,
bibinfo - Combiners for Functional Encryption, Unconditionally,
Amit Sahai, Aayush Jain, Nathan Manohar,
bibinfo - Impossibility Results for Lattice-Based Functional Encryption Schemes,
Akin Ünal,
bibinfo - Adaptively Secure ABE for DFA from k-Lin and More,
Hoeteck Wee, Junqing Gong,
bibinfo - Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL,
Huijia Lin, Ji Luo,
bibinfo
- Candidate iO From Homomorphic Encryption Schemes,
- Best Young Researcher Award
- Symmetric Cryptanalysis
- Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21,
Mridul Nandi,
bibinfo - Improving Key-Recovery in Linear Attacks: Application to 28-round PRESENT,
María Naya-Plasencia, Jaime Gutierrez,
bibinfo - New Slide Attacks on Almost Self-Similar Ciphers,
Orr Dunkelman, Nathan Keller, Adi Shamir, Noam Lasry,
bibinfo - The Retracing Boomerang Attack,
Orr Dunkelman, Nathan Keller, Adi Shamir, Eyal Ronen,
bibinfo - Modeling for Three-Subset Division Property without Unknown Subset -- Improved Cube Attacks against Trivium and Grain-128AEAD,
Willi Meier, Gregor Leander, Qingju Wang, Yosuke Todo, Yonglin Hao,
bibinfo - Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications,
Itai Dinur,
bibinfo
- Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21,
- Quantum Cryptography
- Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security,
Ron Steinfeld, Damien Stehlé, Amin Sakzad, Veronika Kuchta, Shi-Feng Sun,
bibinfo - Secure Multi-party Quantum Computation with a Dishonest Majority,
Christian Schaffner, Stacey Jeffery, Yfke Dulek, Christian Majenz, Alex B. Grilo,
bibinfo - Efficient simulation of random states and random unitaries,
Alexander Russell, Gorjan Alagic, Christian Majenz,
bibinfo - Quantum-access-secure message authentication via blind-unforgeability,
Alexander Russell, Fang Song, Gorjan Alagic, Christian Majenz,
bibinfo
- Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security,
- Quantum Cryptanalysis
- Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound,
Yu Sasaki, Akinori Hosoyamada,
bibinfo - Implementing Grover oracles for quantum key search on AES and LowMC,
Michael Naehrig, Martin Roetteler, Fernando Virdia, Samuel Jaques,
bibinfo - Optimal Merging in Quantum k-xor and k-sum Algorithms,
María Naya-Plasencia, André Schrottenloher,
bibinfo - On the Quantum Complexity of the Continuous Hidden Subgroup Problem,
Serge Fehr, Léo Ducas, Koen de Boer,
bibinfo
- Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound,
- Secure Computation
- The Price of Active Security in Cryptographic Protocols,
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss,
bibinfo - Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era,
Rafail Ostrovsky, Aggelos Kiayias, Juan A. Garay, Vassilis Zikas, Giorgos Panagiotakos,
bibinfo - Efficient Constructions for Almost-everywhere Secure Computation,
Srinivasan Raghuraman, Siddhartha Jayanti, Nikhil Vyas,
bibinfo - Succinct Non-Interactive Secure Computation,
Rafael Pass, Antigoni Polychroniadou, Andrew Morgan,
bibinfo - PSI from PaXoS: Fast, Malicious Private Set Intersection,
Benny Pinkas, Mike Rosulek, Avishay Yanai, Ni Trieu,
bibinfo - Broadcast-Optimal Two-Round MPC,
Juan A. Garay, Vassilis Zikas, Ran Cohen,
bibinfo - Two-Round Oblivious Transfer from CDH or LPN,
Daniel Wichs, Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Daniel Masny,
bibinfo
- The Price of Active Security in Cryptographic Protocols,
- Symmetric Designs
- On the Streaming Indistinguishability of a Random Permutation and a Random Function,
Itai Dinur,
bibinfo - TNT: How to Tweak a Block Cipher,
Jian Guo, Zhenzhen Bao, Ling Song, Chun Guo,
bibinfo - On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy,
Christian Rechberger, Lorenzo Grassi, Dragos Rotaru, Reinhard Lüftenegger, Markus Schofnegger,
bibinfo - Tight Security Bounds for Double-block Hash-then-Sum MACs,
Jooyoung Lee, ByeongHak Lee, Seongkwang Kim,
bibinfo - Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation,
Yusuke Naito, Yu Sasaki, Takeshi Sugawara,
bibinfo
- On the Streaming Indistinguishability of a Random Permutation and a Random Function,
- Zero Knowledge
- Compact NIZKs from Standard Assumptions on Bilinear Maps,
Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata,
bibinfo - New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More,
Benoît Libert, Hoeteck Wee, Alain Passelègue, David J. Wu,
bibinfo - Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions,
Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu,
bibinfo - Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?,
Rafael Pass, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam,
bibinfo - Statistical ZAP Arguments,
Amit Sahai, Dakshita Khurana, Saikrishna Badrinarayanan, Aayush Jain, Rex Fernando,
bibinfo - Statistical Zaps and New Oblivious Transfer Protocols,
Vipul Goyal, Abhishek Jain, Giulio Malavolta, Zhengzhong Jin,
bibinfo - Statistical ZAPR Arguments from Bilinear Maps,
Vinod Vaikuntanathan, Daniel Wichs, Alex Lombardi,
bibinfo
- Compact NIZKs from Standard Assumptions on Bilinear Maps,
- Succinct and Concretely Efficient Proof Systems
- Sigma protocols for MQ, PKP and SIS, and fishy signature schemes,
Ward Beullens,
bibinfo - Signatures from Sequential-OR Proofs,
Marc Fischlin, Christian Janson, Patrick Harasser,
bibinfo - Stacked Garbling for Disjunctive Zero-Knowledge Proofs,
Vladimir Kolesnikov, David Heath,
bibinfo - SPARKs: Succinct Parallelizable Arguments of Knowledge,
Rafael Pass, Ilan Komargodski, Naomi Ephraim, Cody Freitag,
bibinfo - Transparent SNARKs from DARK Compilers,
Ben Fisch, Alan Szepieniec, Benedikt Bünz,
bibinfo - Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS,
Alessandro Chiesa, Mary Maller, Pratyush Mishra, Nicholas P. Ward, Yuncong Hu, Noah Vesely,
bibinfo - Fractal: Post-Quantum and Transparent Recursive Proofs from Holography,
Alessandro Chiesa, Nicholas Spooner, Dev Ojha,
bibinfo
- Sigma protocols for MQ, PKP and SIS, and fishy signature schemes,
- Invited Talk 1
- Side-Channel and Fault Attacks
- Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations,
Matthieu Rivain, Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Raphaël Wintersdorff,
bibinfo - Side-channel Masking with Pseudo-Random Generator,
Rina Zeitoun, Aurélien Greuet, Jean-Sébastien Coron,
bibinfo - Friet: an Authenticated Encryption Scheme with Built-in Fault Detection,
Joan Daemen, Lejla Batina, Daniel R. Simon, Francesco Regazzoni, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Niels Samwel,
bibinfo - Fault Template Attacks on Block Ciphers Exploiting Fault Propagation,
Debdeep Mukhopadhyay, Sikhar Patranabis, Debapriya Basu Roy, Sayandeep Saha, Arnab Bag,
bibinfo - Security of Hedged Fiat-Shamir Signatures under Fault Attacks,
Claudio Orlandi, Diego F. Aranha, Greg Zaverucha, Akira Takahashi,
bibinfo
- Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations,
- Verifiable Delay Functions and Randomness Extraction
- Generic-Group Delay Functions Require Hidden-Order Groups,
Gil Segev, Lior Rotem, Ido Shahaf,
bibinfo - Continuous Verifiable Delay Functions,
Rafael Pass, Ilan Komargodski, Naomi Ephraim, Cody Freitag,
bibinfo - How to Extract Useful Randomness from Unreliable Sources,
Ivan Visconti, Divesh Aggarwal, Maciej Obremski, Luisa Siniscalchi, João Ribeiro,
bibinfo - Low Error Efficient Computational Extractors in the CRS Model,
Yael Tauman Kalai, Dakshita Khurana, Ankit Garg,
bibinfo - Extracting Randomness from Extractor-Dependent Sources,
Vinod Vaikuntanathan, Yevgeniy Dodis, Daniel Wichs,
bibinfo
- Generic-Group Delay Functions Require Hidden-Order Groups,
- Secret Sharing and Information Privacy
- Evolving Ramp Secret Sharing with a Small Gap,
Amos Beimel, Hussien Othman,
bibinfo - Lower Bounds for Leakage-Resilient Secret Sharing,
Jesper Buus Nielsen, Mark Simkin,
bibinfo - OptORAMa: Optimal Oblivious RAM,
Elaine Shi, Gilad Asharov, Ilan Komargodski, Kartik Nayak, Wei-Kai Lin, Enoch Peserico,
bibinfo - Private Aggregation from Fewer Anonymous Messages,
Badih Ghazi, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker,
bibinfo - Formalizing Data Deletion in the Context of the Right to be Forgotten,
Shafi Goldwasser, Sanjam Garg, Prashant Nalini Vasudevan,
bibinfo
- Evolving Ramp Secret Sharing with a Small Gap,
- Invited Talk 2
- Lattice-Based and Code-Based Cryptography
- Hardness of LWE on General Entropic Distributions,
Zvika Brakerski, Nico Döttling,
bibinfo - Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats,
Steven D. Galbraith, Léo Ducas, Thomas Prest, Yang Yu,
bibinfo - (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes,
Fernando Virdia, Mélissa Rossi, Jan-Pieter D’Anvers,
bibinfo - Key Recovery from Gram--Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices,
Pierre-Alain Fouque, Mehdi Tibouchi, Paul Kirchner, Yang Yu, Alexandre Wallet,
bibinfo - An Algebraic Attack on Rank Metric Code-Based Cryptosystems,
Jean-Pierre Tillich, Philippe Gaborit, Olivier Ruatta, Magali Bardet, Pierre Briaud, Maxime Bros, Vincent Neiger,
bibinfo - Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus,
Sam Kim,
bibinfo - Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes,
Ronald Cramer, Chaoping Xing,
bibinfo
- Hardness of LWE on General Entropic Distributions,
- Public-Key Encryption and Generic Models
- Everybody’s a Target: Scalability in Public-Key Encryption,
Eike Kiltz, Benedikt Auerbach, Federico Giacon,
bibinfo - Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability,
Mihir Bellare, Felix Günther, Hannah Davis,
bibinfo - Security under Message-Derived Keys: Signcryption in iMessage,
Mihir Bellare, Igors Stepanovs,
bibinfo - On the Memory-Tightness of Hashed ElGamal,
Stefano Tessaro, Ashrujit Ghoshal,
bibinfo - Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model,
Yannick Seurin, Georg Fuchsbauer, Antoine Plouviez,
bibinfo - On Instantiating the Algebraic Group Model from Falsifiable Assumptions,
Dennis Hofheinz, Julia Kastner, Thomas Agrikola,
bibinfo
- Everybody’s a Target: Scalability in Public-Key Encryption,