EUROCRYPT
EUROCRYPT 2022:
Orr Dunkelman and Stefan Dziembowski (Eds.)
Trondheim, Norway
May 30 - June 3, 2022
cryptodb information for EUROCRYPT 2022Organizational Committee
Program Chairs:
General Chair:
Orr Dunkelman and Stefan DziembowskiGeneral Chair:
Colin Boyd
Program Committee
Masayuki Abe
Shashank Agrawal
Joël Alwen
Marshall Ball
Gustavo Banegas
Paulo S. L. M. Barreto
Sonia Belaïd
Jean-François Biasse
Begül Bilgin
Alex Biryukov
Olivier Blazy
Billy Bob Brumley
Chitchanok Chuengsatiansup
Michele Ciampi
Ran Cohen
Henry Corrigan-Gibbs
Cas Cremers
Dana Dachman-Soled
Jean Paul Degabriele
Itai Dinur
Rafael Dowsley
Antonio Faonio
Pooya Farshim
Sebastian Faust
Benjamin Fuller
Pierrick Gaudry
Esha Ghosh
Paul Grubbs
Felix Günther
Divya Gupta
Iftach Haitner
Shai Halevi
Carmit Hazay
Pavel Hubáček
Tibor Jager
Dmitry Khovratovich
Gregor Leander
Gaëtan Leurent
Helger Lipmaa
Shengli Liu
Alex Lombardi
Hemanta K. Maji
Giulio Malavolta
Peihan Miao
Pratyay Mukherjee
David Naccache
Svetla Nikova
Miyako Ohkubo
Arpita Patra
Alice Pellet-Mary
Thomas Peyrin
Josef Pieprzyk
Bertram Poettering
Carla Ràfols
Peter Rindal
Amin Sakzad
Alessandra Scafuro
Nigel P. Smart
Martijn Stam
Meltem Sönmez Turan
Daniele Venturi
Ivan Visconti
Gaoli Wang
Stefan Wolf
Sophia Yakoubov
Avishay Yanai
Bo-Yin Yang
Arkady Yerukhimovich
Yu Yu
Mark Zhandry
Shashank Agrawal
Joël Alwen
Marshall Ball
Gustavo Banegas
Paulo S. L. M. Barreto
Sonia Belaïd
Jean-François Biasse
Begül Bilgin
Alex Biryukov
Olivier Blazy
Billy Bob Brumley
Chitchanok Chuengsatiansup
Michele Ciampi
Ran Cohen
Henry Corrigan-Gibbs
Cas Cremers
Dana Dachman-Soled
Jean Paul Degabriele
Itai Dinur
Rafael Dowsley
Antonio Faonio
Pooya Farshim
Sebastian Faust
Benjamin Fuller
Pierrick Gaudry
Esha Ghosh
Paul Grubbs
Felix Günther
Divya Gupta
Iftach Haitner
Shai Halevi
Carmit Hazay
Pavel Hubáček
Tibor Jager
Dmitry Khovratovich
Gregor Leander
Gaëtan Leurent
Helger Lipmaa
Shengli Liu
Alex Lombardi
Hemanta K. Maji
Giulio Malavolta
Peihan Miao
Pratyay Mukherjee
David Naccache
Svetla Nikova
Miyako Ohkubo
Arpita Patra
Alice Pellet-Mary
Thomas Peyrin
Josef Pieprzyk
Bertram Poettering
Carla Ràfols
Peter Rindal
Amin Sakzad
Alessandra Scafuro
Nigel P. Smart
Martijn Stam
Meltem Sönmez Turan
Daniele Venturi
Ivan Visconti
Gaoli Wang
Stefan Wolf
Sophia Yakoubov
Avishay Yanai
Bo-Yin Yang
Arkady Yerukhimovich
Yu Yu
Mark Zhandry
Papers
- Best paper award talk
- Secure multiparty computation 1
- Garbled Circuits With Sublinear Evaluator,
Vladimir Kolesnikov, Rafail Ostrovsky, Steve Lu, Mehul A. Shah, David Heath, Abida Haque,
bibinfo, video - Highly Efficient OT-Based Multiplication Protocols,
Iftach Haitner, Samuel Ranellucci, Nikolaos Makriyannis, Eliad Tsfadia,
bibinfo, video - Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties,
Shai Halevi, Craig Gentry, Vadim Lyubashevsky,
bibinfo, video
- Garbled Circuits With Sublinear Evaluator,
- Real-world systems 1
- CoCoA: Concurrent Continuous Group Key Agreement,
Joël Alwen, Krzysztof Pietrzak, Michael Walter, Benedikt Auerbach, Karen Klein, Guillermo Pascual-Perez, Miguel Cueto Noval,
bibinfo, video - Efficient Schemes for Committing Authenticated Encryption,
Mihir Bellare, Viet Tung Hoang,
bibinfo, video - On the Concrete Security of TLS 1.3 PSK Mode,
Tibor Jager, Felix Günther, Denis Diemert, Hannah Elizabeth Davis,
bibinfo, video
- CoCoA: Concurrent Continuous Group Key Agreement,
- Obfuscation 1
- Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs,
Yu Yu, Yilei Chen, Li Yao,
bibinfo, video - Incompressible Cryptography,
Daniel Wichs, Mark Zhandry, Jiaxin Guan,
bibinfo, video - COA-Secure Obfuscation and Applications,
Ran Canetti, Manoj Prabhakaran, Dakshita Khurana, Suvradip Chakraborty, N. Nalla Anandakumar, Oxana Poburinnaya,
bibinfo, video
- Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs,
- Primitives 1
- Single-Server Private Information Retrieval with Sublinear Amortized Time,
Henry Corrigan-Gibbs, Dmitry Kogan, Alexandra Henzinger,
bibinfo, video - Optimal Tightness for Chain-Based Unique Signatures,
Willy Susilo, Fuchun Guo,
bibinfo - On the Multi-User Security of Short Schnorr Signatures with Preprocessing,
Jeremiah Blocki, Seunghoon Lee,
bibinfo, video
- Single-Server Private Information Retrieval with Sublinear Amortized Time,
- Secure multiparty computation 2
- Round-Optimal and Communication-Efficient Multiparty Computation,
Rafail Ostrovsky, Vassilis Zikas, Michele Ciampi, Hendrik Waldner,
bibinfo, video - Lightweight, Maliciously Secure Verifiable Function Secret Sharing,
Antigoni Polychroniadou, Leo de Castro,
bibinfo, video - Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols,
Abhi Shelat, Ran Cohen, Yashvanth Kondi, Jack Doerner,
bibinfo, video
- Round-Optimal and Communication-Efficient Multiparty Computation,
- Primitives 2
- Multi-Designated Receiver Signed Public Key Encryption,
Christopher Portmann, Ueli Maurer, Guilherme Rito,
bibinfo, video - Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions,
Nils Fleischhacker, Mark Simkin, Kasper Green Larsen,
bibinfo, video - A Fast and Simple Partially Oblivious PRF, with Applications,
Thomas Ristenpart, Stefano Tessaro, Nicholas T. Sullivan, Nirvan Tyagi, Sofía Celi, Christopher A. Wood,
bibinfo, video
- Multi-Designated Receiver Signed Public Key Encryption,
- Secure multiparty computation 3
- Secure Multiparty Computation with Free Branching,
Abhishek Jain, Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde,
bibinfo, video - Secure Multiparty Computation with Sublinear Preprocessing,
Yuval Ishai, Niv Gilboa, Elette Boyle, Ariel Nof,
bibinfo, video - On the security of ECDSA with additive key derivation and presignatures,
Jens Groth, Victor Shoup,
bibinfo, video - On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness,
Geoffroy Couteau, Chris Brzuska,
bibinfo, video - Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming,
Stefano Tessaro, Joseph Jaeger, Ashrujit Ghoshal, Riddhi Ghosal,
bibinfo, video - Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption,
Brent Waters, Rishab Goyal, Rachit Garg, George Lu,
bibinfo, video
- Secure Multiparty Computation with Free Branching,
- Obfuscation 2
- Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0,
Amit Sahai, Huijia Lin, Aayush Jain,
bibinfo, video - Unclonable Polymers and Their Cryptographic Applications,
Eran Tromer, Tal Malkin, Ran Canetti, Ghada Almashaqbeh, Yaniv Erlich, Jonathan Gershoni, Itsik Pe'er, Anna Roitburd-Berman,
bibinfo, video - Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round,
Peter Scholl, Sophia Yakoubov, Damiano Abram,
bibinfo, video
- Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0,
- Zero-knowledge proofs 1
- Families of SNARK-friendly 2-chains of elliptic curves,
Aurore Guillevic, Youssef El Housni,
bibinfo, video - Gemini: elastic SNARKs for diverse environments,
Alessandro Chiesa, Jonathan Bootle, Michele Orrù, Yuncong Hu,
bibinfo, video - SNARGs for P from Sub-exponential DDH and QR,
Dakshita Khurana, Akshayaram Srinivasan, James Hulett, Ruta Jawale,
bibinfo, video
- Families of SNARK-friendly 2-chains of elliptic curves,
- IACR Distinguished Lecture
- Secure multiparty computation 4
- Universally Composable Subversion-Resilient Cryptography,
Jesper Buus Nielsen, Daniele Venturi, Bernardo Magri, Suvradip Chakraborty,
bibinfo, video - Asymptotically Quasi-Optimal Cryptography,
Vinod Vaikuntanathan, Yuval Ishai, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Leo de Castro,
bibinfo, video - A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss,
Kaijie Wu, Elaine Shi, Gilad Asharov,
bibinfo, video
- Universally Composable Subversion-Resilient Cryptography,
- Symmetric-key cryptanalysis 1
- Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks,
Xiaoyun Wang, Xiaoyang Dong, Siwei Sun, Lingyue Qin,
bibinfo, video - A Correlation Attack on Full SNOW-V and SNOW-Vi,
Lin Ding, Chenhui Jin, Tingting Cui, Zhen Shi, Jiyan Zhang, Yu Jin,
bibinfo, video - Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2,
Itai Dinur, Dor Amzaleg,
bibinfo, video
- Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks,
- Protocols 1
- Symmetric-key cryptanalysis 2
- Protocols 2
- Homomorphic encryption 1
- Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE,
Charanjit S. Jutla, Nathan Manohar,
bibinfo, video - High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization,
Joseph Lano, Young-Sik Kim, Joon-Woo Lee, Yongwoo Lee, Yongjune Kim, HyungChul Kang,
bibinfo, video
- Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE,
- Homomorphic encryption 2
- Limits of Polynomial Packings for Zpk and Fpk,
Jung Hee Cheon, Keewoo Lee,
bibinfo, video - Rubato: Noisy Ciphers for Approximate Homomorphic Encryption,
Jooyoung Lee, ByeongHak Lee, Seongkwang Kim, Jincheol Ha, Mincheol Son,
bibinfo, video - Field Instruction Multiple Data,
Huaxiong Wang, Sze Ling Yeo, Khin Mi Mi Aung, Benjamin Hong Meng Tan, Enhui Lim, Jun Jie Sim,
bibinfo, video
- Limits of Polynomial Packings for Zpk and Fpk,
- Zero-knowledge proofs 2
- Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier,
Alessandro Chiesa, Jonathan Bootle, Siqi Liu,
bibinfo, video - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security,
Jiaxin Pan, Yuyu Wang,
bibinfo, video - On Succinct Non-Interactive Arguments in Relativized Worlds,
Alessandro Chiesa, Nicholas Spooner, Megan Chen,
bibinfo, video
- Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier,
- Invited talk
- Secure multiparty computation 5
- Round-Optimal Byzantine Agreement,
Vipul Goyal, George Ghinea, Chen-Da Liu-Zhang,
bibinfo, video - Round-Optimal Multi-Party Computation with Identifiable Abort,
Michele Ciampi, Luisa Siniscalchi, Divya Ravi, Hendrik Waldner,
bibinfo, video - Round-Optimal Black-Box Protocol Compilers,
Amit Sahai, Yuval Ishai, Dakshita Khurana, Akshayaram Srinivasan,
bibinfo, video
- Round-Optimal Byzantine Agreement,
- Physical attacks and masking 1
- Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon,
Pierre-Alain Fouque, Mehdi Tibouchi, Thomas Espitau, Yang Yu, Alexandre Wallet, Mélissa Rossi, Akira Takahashi, François Gérard,
bibinfo, video - A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Responsibly Engineered Simulators,
Elisabeth Oswald, Si Gao,
bibinfo, video - Towards Micro-Architectural Leakage Simulators: Reverse Engineering Micro-Architectural Leakage Features is Practical,
Elisabeth Oswald, Daniel Page, Si Gao,
bibinfo, video
- Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon,
- Post-quantum cryptography 1
- Beyond quadratic speedups in quantum attacks on symmetric schemes,
André Schrottenloher, Ferdinand Sibleyras, Xavier Bonnetain,
bibinfo, video - Post-Quantum Security of the Even-Mansour Cipher,
Jonathan Katz, Gorjan Alagic, Christian Majenz, Chen Bai,
bibinfo, video - Non-malleable Commitments Against Quantum Attacks,
Huijia Lin, Nir Bitansky, Omri Shmueli,
bibinfo, video
- Beyond quadratic speedups in quantum attacks on symmetric schemes,
- Physical attacks and masking 2
- Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents,
Alexander May, Santanu Sarkar, Julian Nowakowski,
bibinfo, video - Information-Combining Differential Fault Attacks on DEFAULT,
Maria Eichlseder, Christoph Dobraunig, Marcel Nageler,
bibinfo, video - Private Circuits with Quasilinear Randomness,
Vipul Goyal, Yuval Ishai, Yifan Song,
bibinfo, video
- Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents,
- Post-quantum cryptography 2
- On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography,
Léo Ducas, Wessel P. J. van Woerden,
bibinfo, video - Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering,
Mark Zhandry, Yilei Chen, Qipeng Liu,
bibinfo, video - Orientations and the supersingular endomorphism ring problem,
Benjamin Wesolowski,
bibinfo, video
- On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography,
- Zero-knowledge proofs 3
- Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model),
Claudio Orlandi, Daniel Tschudi, Chaya Ganesh, Akira Takahashi, Mahak Pancholi,
bibinfo, video - Stacking Sigmas: A Framework to Compose Sigma-Protocols for Disjunctions,
Matthew Green, Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk,
bibinfo, video - One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model,
Benoît Libert, Moti Yung, Thomas Peters, Khoa Nguyen,
bibinfo, video
- Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model),
- Post-quantum cryptography 3
- Watermarking PRFs against Quantum Adversaries,
Ryo Nishimaki, Fuyuki Kitagawa,
bibinfo, video - Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms,
Willy Susilo, Antoine Joux, Thomas Plantard, Youming Qiao, Thai Duong, Gang Tang,
bibinfo, video - Anonymous, Robust Post-Quantum Public Key Encryption,
Kenneth G. Paterson, Paul Grubbs, Varun Maram,
bibinfo, video
- Watermarking PRFs against Quantum Adversaries,
- Protocols 3
- Asymmetric PAKE with low computation and communication,
Stanislaw Jarecki, Hugo Krawczyk, Paulo C. F. dos Santos, Yanqi Gu,
bibinfo, video - Adaptively Secure Computation for RAM Programs,
Rafail Ostrovsky, Muthuramakrishnan Venkitasubramaniam, Oxana Poburinnaya, Laasya Bangalore,
bibinfo, video - Group Signature and More from Isogenies and Lattices: Generic, Simple, and Efficient,
Shuichi Katsumata, Ward Beullens, Federico Pintore, Yi-Fu Lai, Samuel Dobson,
bibinfo, video
- Asymmetric PAKE with low computation and communication,
- Information-theoretic security 1
- Protocols 4
- Information-theoretic security 2
- Authentication in the Bounded Storage Model,
Yevgeniy Dodis, Daniel Wichs, Willy Quach,
bibinfo, video - Secure Non-interactive Simulation: Feasibility & Rate,
Hemanta K. Maji, Hai H. Nguyen, Hamidreza Amini Khorasgani,
bibinfo, video - Secure Non-Interactive Reduction and Spectral Analysis of Correlations,
Manoj Prabhakaran, Vinod M. Prabhakaran, Varun Narayanan, Pratyush Agarwal, Shreya Pathak, Mohammad Ali Rehan,
bibinfo, video
- Authentication in the Bounded Storage Model,
- Post-quantum cryptography 4
- Anonymity of NIST PQC Round 3 KEMs,
Keita Xagawa,
bibinfo, video - On IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3,
Serge Vaudenay, Loïs Huguenin-Dumittan,
bibinfo, video - McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD,
Alexander May, Andre Esser, Floyd Zweydinger,
bibinfo, video
- Anonymity of NIST PQC Round 3 KEMs,