The 42nd International Conference on the Theory and Applications
of Cryptographic Techniques
Eurocrypt 2023: 
Carmit Hazay and Martijn Stam (Eds.)
April 23-27, 2023
Lyon France
cryptodb information for EUROCRYPT 2023Organizational Committee
Program Chairs:
General Chairs:
Carmit Hazay and Martijn StamGeneral Chairs:
Damien Stehlé and Alain Passelègue and Benjamin Wesolowski
- Ran Canetti (for Theoretical Foundations)
- Rosario Gennaro (for Public Key Primitives with Advanced Functionalities)
- Tibor Jager(for Classic Public Key Cryptography)
- Marc Joye (for Secure and Efficient Implementation,
Cryptographic Engineering, and Real-World Cryptography)
- Gregor Leander (for Symmetric Cryptology)
- Arpita Patra (for Multi-Party Computation and Zero-Knowledge)
Program Committee
Masayuki Abe
Adi Akavia
Prabhanjan Ananth
Gilad Asharov
Marshall Ball
Christof Beierle
Mihir Bellare
Tim Beyne
Andrej Bogdanov
Xavier Bonnetain
Joppe W. Bos
Chris Brzuska
Ran Canetti
Ignacio Cascudo
Nishanth Chandran
Chitchanok Chuengsatiansup
Michele Ciampi
Ran Cohen
Jean-Sébastien Coron
Bernardo David
Christoph Dobraunig
Léo Ducas
Maria Eichlseder
Pooya Farshim
Serge Fehr
Dario Fiore
Pierre-Alain Fouque
Steven Galbraith
Chaya Ganesh
Si Gao
Daniel Genkin
Rosario Gennaro
Craig Gentry
Benedikt Gierlichs
Vipul Goyal
Rishab Goyal
Viet Tung Hoang
Andreas Hülsing
Tibor Jager
Antoine Joux
Marc Joye
Karen Klein
Markulf Kohlweiss
Gregor Leander
Jooyoung Lee
Gaëtan Leurent
Shengli Liu
Yunwen Liu
Adi Akavia
Prabhanjan Ananth
Gilad Asharov
Marshall Ball
Christof Beierle
Mihir Bellare
Tim Beyne
Andrej Bogdanov
Xavier Bonnetain
Joppe W. Bos
Chris Brzuska
Ran Canetti
Ignacio Cascudo
Nishanth Chandran
Chitchanok Chuengsatiansup
Michele Ciampi
Ran Cohen
Jean-Sébastien Coron
Bernardo David
Christoph Dobraunig
Léo Ducas
Maria Eichlseder
Pooya Farshim
Serge Fehr
Dario Fiore
Pierre-Alain Fouque
Steven Galbraith
Chaya Ganesh
Si Gao
Daniel Genkin
Rosario Gennaro
Craig Gentry
Benedikt Gierlichs
Vipul Goyal
Rishab Goyal
Viet Tung Hoang
Andreas Hülsing
Tibor Jager
Antoine Joux
Marc Joye
Karen Klein
Markulf Kohlweiss
Gregor Leander
Jooyoung Lee
Gaëtan Leurent
Shengli Liu
Yunwen Liu
Stefan Lucks
Hemanta K. Maji
Alexander May
Nele Mentens
Tal Moran
Michael Naehrig
Ngoc Khanh Nguyen
Emmanuela Orsini
Jiaxin Pan
Omkant Pandey
Anat Paskin-Cherniavsky
Arpita Patra
Chris Peikert
Léo Perrin
Giuseppe Persiano
Thomas Peters
Christophe Petit
Krzysztof Pietrzak
Bertram Poettering
Bart Preneel
Carla Ràfols
Divya Ravi
Christian Rechberger
Paul Rösler
Ron D. Rothblum
Yu Sasaki
Dominique Schröder
Omri Shmueli
Janno Siim
Daniel Slamanig
Yifan Song
Qiang Tang
Serge Vaudenay
Fernando Virdia
Meiqin Wang
Mor Weiss
David Wu
Hemanta K. Maji
Alexander May
Nele Mentens
Tal Moran
Michael Naehrig
Ngoc Khanh Nguyen
Emmanuela Orsini
Jiaxin Pan
Omkant Pandey
Anat Paskin-Cherniavsky
Arpita Patra
Chris Peikert
Léo Perrin
Giuseppe Persiano
Thomas Peters
Christophe Petit
Krzysztof Pietrzak
Bertram Poettering
Bart Preneel
Carla Ràfols
Divya Ravi
Christian Rechberger
Paul Rösler
Ron D. Rothblum
Yu Sasaki
Dominique Schröder
Omri Shmueli
Janno Siim
Daniel Slamanig
Yifan Song
Qiang Tang
Serge Vaudenay
Fernando Virdia
Meiqin Wang
Mor Weiss
David Wu
- Invited Paper
- Fully Homomorphic Encryption
- Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption,
Daniele Micciancio, Andrey Kim, Yongwoo Lee, Donghoon Yoo, Rakyong Choi, Maxim Deryabin, Jieun Eom,
bibinfo - On Polynomial Functions Modulo pe and Faster Bootstrapping for Homomorphic Encryption,
Ju-Sung Kang, Frederik Vercauteren, Ilia Iliashenko, Robin Geelen,
bibinfo - Functional Commitments for All Functions, with Transparent Setup and from SIS,
Chris Peikert, Leo de Castro,
bibinfo
- Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption,
- Lower Bounds
- Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality,
Akın Ünal,
bibinfo - Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds,
Mohammad Mahmoody, Arash Afshar, Geoffroy Couteau, Elahe Sadeghi,
bibinfo - Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited,
Yevgeniy Dodis, Daniel Wichs, Willy Quach,
bibinfo
- Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality,
- Blockcipher Cryptanalysis
- Truncated Boomerang Attacks and Application to AES-based Ciphers,
Gaëtan Leurent, Augustin Bariant,
bibinfo - Better Steady than Speedy: Full break of SPEEDY-7-192,
María Naya-Plasencia, Christina Boura, Nicolas David, Rachelle Heim Boissier,
bibinfo - Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY,
Lei Hu, Qianqian Yang, Siwei Sun, Ling Song, Danping Shi,
bibinfo
- Truncated Boomerang Attacks and Application to AES-based Ciphers,
- Fully Homomorphic Encryption (cont.)
- Batch Bootstrapping I: A New Framework for SIMD Bootstrapping in Polynomial Modulus,
Feng-Hao Liu, Han Wang,
bibinfo - Batch Bootstrapping II: Bootstrapping in Polynomial Modulus Only Requires Õ(1) FHE Multiplications in Amortization,
Feng-Hao Liu, Han Wang,
bibinfo - Non-uniformity and Quantum Advice in the Quantum Random Oracle Model,
Qipeng Liu,
bibinfo - Black-Box Separations for Non-Interactive Commitments in a Quantum World,
Kai-Min Chung, Mohammad Mahmoody, Yao-Ting Lin,
bibinfo
- Batch Bootstrapping I: A New Framework for SIMD Bootstrapping in Polynomial Modulus,
- Blockcipher Cryptanalysis (cont.)
- Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation,
Orr Dunkelman, Nathan Keller, Adi Shamir, Itai Dinur, Eyal Ronen,
bibinfo - Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks,
Maria Eichlseder, Sadegh Sadeghi, Hosein Hadipour,
bibinfo
- Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation,
- Authenticated Key Exchange
- Differential Privacy
- Oblivious Transfer
- Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge,
Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar,
bibinfo - Oblivious Transfer with Constant Computational Overhead,
Yuval Ishai, Niv Gilboa, Elette Boyle, Peter Scholl, Geoffroy Couteau, Lisa Kohl, Nicolas Resch,
bibinfo
- Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge,
- Real World Crypto
- Lattice Cryptanalysis
- Finding many Collisions via Reusable Quantum Walks - Application to Lattice Sieving,
André Chailloux, André Schrottenloher, Yixin Shen, Xavier Bonnetain,
bibinfo - Just how hard are rotations of Zn? Algorithms and cryptography with the simplest lattice,
Noah Stephens-Davidowitz, Huck Bennett, Atul Ganju, Pura Peetathawatchai,
bibinfo
- Finding many Collisions via Reusable Quantum Walks - Application to Lattice Sieving,
- Oblivious Transfer (cont.)
- Garbling Schemes and Oblivious Transfer
- New Ways to Garble Arithmetic Circuits,
Huijia Lin, Tianren Liu, Marshall Ball, Hanjun Li,
bibinfo - Actively Secure Half-Gates with Minimum Overhead under Duplex Networks,
Yu Yu, Xiao Wang, Kang Yang, Hongrui Cui,
bibinfo - Half-Tree: Halving the Cost of Tree Expansion in COT and DPF,
Jiang Zhang, Xiang Xie, Xiao Wang, Kang Yang, Xiaojie Guo, Wenhao Zhang, Zheli Liu,
bibinfo
- New Ways to Garble Arithmetic Circuits,
- Quantum Cryptography
- Public Key Encryption with Secure Key Leasing,
Shweta Agrawal, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Fuyuki Kitagawa,
bibinfo - Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More,
Hart Montgomery, Mark Zhandry, Jiahui Liu,
bibinfo - From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments,
Takashi Yamakawa, Minki Hhan, Tomoyuki Morimae,
bibinfo
- Public Key Encryption with Secure Key Leasing,
- Side-Channel Attacks and Masking
- Improved Power Analysis Attacks on Falcon,
Weijia Wang, Yang Yu, Shiduo Zhang, Xiuhan Lin,
bibinfo - Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers,
Pierrick Méaux, François-Xavier Standaert, Thorben Moos, Loïc Masure,
bibinfo - One-Hot Conversion: Towards Faster Table-based A2B Conversion,
Jan-Pieter D’Anvers,
bibinfo
- Improved Power Analysis Attacks on Falcon,
- Non-Interactive MPC
- Black-Box Reusable NISC with Random Oracles,
Amit Sahai, Yuval Ishai, Dakshita Khurana, Akshayaram Srinivasan,
bibinfo - Maliciously-Secure MrNISC in the Plain Model,
Ilan Komargodski, Aayush Jain, Rex Fernando,
bibinfo - Minimizing Setup in Broadcast-Optimal Two Round MPC,
Luisa Siniscalchi, Sophia Yakoubov, Ivan Damgård, Divya Ravi,
bibinfo
- Black-Box Reusable NISC with Random Oracles,
- Messaging and Message Franking
- Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging,
Christoph Striecks, Daniel Slamanig, Paul Rösler,
bibinfo - End to End Secure Messaging with Traceability Only for Illegal Content,
Sanjam Garg, Abhishek Jain, James Bartusek, Guru Vamsi Policharla,
bibinfo - Asymmetric Group Message Franking: Definitions & Constructions,
Junzuo Lai, Jian Weng, Siu Ming Yiu, Zhengan Huang, Gongxian Zeng, Xin Mu,
bibinfo
- Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging,
- Hash Function Cryptanalysis
- Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing,
Xiaoyun Wang, Xiaoyang Dong, Lingyue Qin, Jialiang Hua, Hailun Yan,
bibinfo - Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP,
Willi Meier, Santanu Sarkar, Takanori Isobe, Fukang Liu, Gaoli Wang, Ravi Anand, Yingxin Li,
bibinfo - Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials,
Meicheng Liu, Zhongyi Zhang, Chengan Hou,
bibinfo
- Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing,
- Symmetric Design 1
- From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications,
Lorenzo Grassi, Markus Schofnegger, Morten Øygarden, Roman Walch,
bibinfo - Coefficient Grouping: Breaking Chaghri and More,
Willi Meier, Takanori Isobe, Fukang Liu, Ravi Anand, Libo Wang,
bibinfo - Pitfalls and Shortcomings for Decompositions and Alignment,
Gregor Leander, Baptiste Lambin, Patrick Neumann,
bibinfo
- From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications,
- Theory of Public-Key Cryptography
- Deniable Authentication when Signing Keys Leak,
Dennis Hofheinz, Suvradip Chakraborty, Ueli Maurer, Guilherme Rito,
bibinfo - Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise,
Joseph Jaeger,
bibinfo - Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model,
Shengli Liu, Dawu Gu, Shuai Han,
bibinfo
- Deniable Authentication when Signing Keys Leak,
- Oblivious Data Access 1
- Optimal Single-Server Private Information Retrieval,
Elaine Shi, Muxin Zhou, Yiannis Tselekounis, Wei-Kai Lin,
bibinfo - Weighted ORAM, with Applications to Searchable Symmetric Encryption,
Brice Minaud, Léonard Assouline,
bibinfo - NanoGRAM: Garbled RAM with Õ(log N) Overhead,
Elaine Shi, Wei-Kai Lin, Aesun Park,
bibinfo
- Optimal Single-Server Private Information Retrieval,
- Isogenies 1
- Invited Talk
- Signature Schemes 1
- A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies,
Dan Boneh, Mark Zhandry, Jiaxin Guan,
bibinfo - Short Signatures from Regular Syndrome Decoding in the Head,
Antoine Joux, Geoffroy Couteau, Eliana Carozza,
bibinfo - The Return of the SDitH,
Nicolas Gama, Carlos AGUILAR MELCHOR, Andreas Hülsing, James Howe, David Joseph, Dongze Yue,
bibinfo
- A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies,
- Attribute Based Encryption and Friends
-
Fully Adaptive Decentralized Multi-Authority ABE,
- On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption,
Huijia Lin, Aayush Jain, Ji Luo,
bibinfo - Registered Attribute-Based Encryption,
Susan Hohenberger, Brent Waters, David J. Wu, George Lu,
bibinfo
Brent Waters, Ilan Komargodski, Pratish Datta,
bibinfo - On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption,
- (Zero-Knowledge) Proofs 1
- Witness-Succinct Universally-Composable SNARKs,
Claudio Orlandi, Daniel Tschudi, Chaya Ganesh, Yashvanth Kondi, Akira Takahashi, Mahak Pancholi,
bibinfo - SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption,
Vinod Vaikuntanathan, Yael Tauman Kalai, Alex Lombardi,
bibinfo - Proof-Carrying Data From Arithmetized Random Oracles,
Alessandro Chiesa, Nicholas Spooner, Tom Gur, Megan Chen, Jack O'Connor,
bibinfo
- Witness-Succinct Universally-Composable SNARKs,
- Signature Schemes 1 (cont.)
- Attribute Based Encryption and Friends (cont.)
- (Zero-Knowledge) Proofs 1 (cont.)
- Unbounded Quadratic Functional Encryption and More from Pairings,
Junichi Tomida,
bibinfo - Multi-key and Multi-input Predicate Encryption from Learning with Errors
Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi,
bibinfo - Supersingular Curves You can Trust,
Sikhar Patranabis, Benjamin Wesolowski, Travis Morrison, Luca De Feo, Lorenz Panny, Andrea Basso, Tako Boris Fouotsa, Giulio Codogni, Deirdre Connolly, Guido Maria Lido,
bibinfo - On Valiant’s Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles,
Jesper Buus Nielsen, Mathias Hall-Andersen,
bibinfo
- Unbounded Quadratic Functional Encryption and More from Pairings,
- Efficient MPC Constructions
- Traitor Tracing Schemes
- Symmetric Design 2
- Efficient MPC Constructions (cont.)
- SuperPack: Dishonest Majority MPC with Constant Online Communication,
Vipul Goyal, Antigoni Polychroniadou, Daniel Escudero, Yifan Song, Chenkai Weng,
bibinfo - Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time,
Ittai Abraham, Arpita Patra, Gilad Asharov, Shravani Patil,
bibinfo
- SuperPack: Dishonest Majority MPC with Constant Online Communication,
- Pseudorandom Functions
- Symmetric Design 2 (cont.)
- Isogenies 2
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information,
Christophe Petit, Tomoki Moriya, Tako Boris Fouotsa,
bibinfo - New algorithms for the Deuring correspondence: Towards practical and secure SQISign signatures,
Patrick Longa, Benjamin Wesolowski, Luca De Feo, Antonin Leroux,
bibinfo - Disorientation faults in CSIDH,
Tanja Lange, Juliane Krämer, Lorenz Panny, Michael Meyer, Gustavo Banegas, Monika Trimoska, Jana Sotáková, Krijn Reijnders,
bibinfo
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information,
- Oblivious Data Access 2
- Symmetric Design 3
- Proof of Mirror Theory for a Wide Range of ξmax,
Mridul Nandi, Jacques Patarin, Amrita Saha, Avijit Dutta, Benoît Cogliati,
bibinfo - Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions,
Jiapeng Zhang, Noam Mazor, Xinyu Mao,
bibinfo - XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation,
Kazuhiko Minematsu, Jooyoung Lee, Zhenzhen Bao, ByeongHak Lee, Akiko Inoue, Seongha Hwang,
bibinfo
- Proof of Mirror Theory for a Wide Range of ξmax,
- (Zero-Knowledge) Proofs 2
- Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions,
Nicholas Spooner, Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk,
bibinfo - HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates,
Dan Boneh, Binyi Chen, Zhenfei Zhang, Benedikt Bünz,
bibinfo - Spartan and Bulletproofs are simulation-extractable (for free!),
Paul Grubbs, Quang Dao,
bibinfo
- Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions,
- Signature Schemes 2
- Public-Key Cryptanalysis
- On the Hardness of the Finite Field Isomorphism Problem,
Antoine Joux, Dipayan Das,
bibinfo - New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice,
Andre Esser, Floyd Zweydinger,
bibinfo - A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions,
Pierre Briaud, Morten Øygarden,
bibinfo
- On the Hardness of the Finite Field Isomorphism Problem,
- MPC and Proofs
- Complete Characterization of Broadcast and Pseudo-Signatures from Correlations,
Vinod M. Prabhakaran, Shun Watanabe, Varun Narayanan, Neha Sangwan,
bibinfo - Privacy-Preserving Blueprints,
Anna Lysyanskaya, Markulf Kohlweiss, An Nguyen,
bibinfo - An Incremental PoSW for General Weight Distributions,
Hamza Abusalah, Valerio Cini,
bibinfo
- Complete Characterization of Broadcast and Pseudo-Signatures from Correlations,
- Lattice Constructions
- Succinct Vector, Polynomial, and Functional Commitments from Lattices,
Hoeteck Wee, David J. Wu,
bibinfo - Efficient Laconic Cryptography from Learning With Errors,
Nico Döttling, Russell W. F. Lai, Giulio Malavolta, Ahmadreza Rahimi, Dimitris Kolonelos, Chuanwei Lin,
bibinfo - On Non-uniform Security for Black-box Non-Interactive CCA Commitments,
Brent Waters, Dakshita Khurana, Rachit Garg, George Lu,
bibinfo - Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum iO,
Amit Sahai, Huijia Lin, Aayush Jain, Paul Lou,
bibinfo
- Succinct Vector, Polynomial, and Functional Commitments from Lattices,