PKC 2020:
Aggelos Kiayias (Ed.):
Public Key Cryptography 2020,
Virtual
June 1-4, 2020
Proceedings.
Organizational Committee
Program Chair:
Aggelos Kiayias
Program Committee
Gorjan Alagic
Gilad Asharov
Nuttapong Attrapadung
Joppe W. Bos
Chris Brzuska
Liqun Chen
Kai-Min Chung
Dana Dachman-Soled
Sebastian Faust
Dario Fiore
Marc Fischlin
Georg Fuchsbauer
Steven D. Galbraith
Junqing Gong
Κyoohyung Han
Stephan Krenn
Benoît Libert
Helger Lipmaa
Ryo Nishimaki
Miyako Ohkubo
Emmanuela Orsini
Omkant Pandey
Charalampos Papamanthou
Christophe Petit
Thomas Prest
Carla Ràfols
Arnab Roy
Simona Samardjiska
Υongsoo Song
Rainer Steinwandt
Berk Sunar
Atsushi Takayasu
Serge Vaudenay
Daniele Venturi
Frederik Vercauteren
Chaoping Xing
Thomas Zacharias
Hong-Sheng Zhou
- Functional Encryption and Identity Based Encryption
- Fast, Compact, and Expressive Attribute-Based Encryption, 3-33,
Yuto Kawahara, Ryo Nishimaki, Junichi Tomida,
bibinfo, video - Adaptive Simulation Security for Inner Product Functional Encryption, 34-64,
Benoît Libert, Shweta Agrawal, Radu Titiu, Monosij Maitra,
bibinfo, video - Verifiable Inner Product Encryption Scheme, 65-94,
Peter Y. A. Ryan, Alfredo Rial, Vincenzo Iovino, Najmeh Soroush, Peter B. Roenne,
bibinfo, video - A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials, 95-120,
Romain Gay,
bibinfo, video - Master-Key KDM-Secure IBE from Pairings, 123-152,
Sanjam Garg, Mohammad Hajiabadi, Romain Gay,
bibinfo, video - Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, 153-183,
Jiaxin Pan, Roman Langrehr,
bibinfo, video
- Fast, Compact, and Expressive Attribute-Based Encryption, 3-33,
- Encryption Schemes and Secure Channels
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms, 249-278,
Rishiraj Bhattacharyya,
bibinfo, video - Toward RSA-OAEP Without Random Oracles, 279-308,
Mohammad Zaheri, Adam O’Neill, Nairen Cao,
bibinfo, video - Public-Key Puncturable Encryption: Modular and Compact Constructions, 309-338,
Ron Steinfeld, Joseph K. Liu, Dawu Gu, Amin Sakzad, Shi-Feng Sun,
bibinfo, video - Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework, 341-373,
Jörg Schwenk, Benjamin Dowling, Paul Rösler,
bibinfo, video - Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2, 567-596,
Jörg Schwenk, Sven Schäge, Sebastian Lauer,
bibinfo, video - Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange, 374-395,
Alon Rosen, Siyao Guo, Katerina Sotiraki, Pritish Kamath,
bibinfo, video - PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model, 396-427,
Guang Gong, Huaxiong Wang, Shaoquan Jiang, Khoa Nguyen, Jingnan He,
bibinfo, video
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms, 249-278,
- Invited Talk
- Proofs and Arguments
- Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography (paper not available), 495-526,
Carsten Baum, Ariel Nof,
bibinfo, video - Updateable Inner Product Argument with Logarithmic Verifier and Applications, 527-557,
Vanesa Daza, Carla Ràfols, Alexandros Zacharakis,
bibinfo, video - On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness, 558-589,
Masayuki Abe, Miyako Ohkubo, Miguel Ambrona,
bibinfo, video - On QA-NIZK in the BPK Model, 590-620,
Helger Lipmaa, Behzad Abdolmaleki, Janno Siim, Michał Zając,
bibinfo, video - Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control, 97-123,
Yael Tauman Kalai, Zvika Brakerski,
bibinfo, video - Boosting Verifiable Computation on Encrypted Data, 124-154,
David Pointcheval, Dario Fiore, Anca Nitulescu,
bibinfo, video
- Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography (paper not available), 495-526,
- Post Quantum Cryptography
- Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512, 157-186,
Shuichi Katsumata, Ali El Kaafarani, Federico Pintore,
bibinfo, video - Threshold Schemes from Isogeny Assumptions, 187-212,
Luca De Feo, Michael Meyer,
bibinfo, video - Generic Authenticated Key Exchange in the Quantum Random Oracle Model, 389-422,
Eike Kiltz, Dominique Unruh, Sven Schäge, Kathrin Hövelmanns,
bibinfo, video - Threshold Ring Signatures: New Definitions and Post-quantum Security, 423-452,
Alessandra Scafuro, Abida Haque,
bibinfo, video
- Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512, 157-186,
- Multiparty Protocols, Secure Computation and Related Primitives
- Sublinear-Round Byzantine Agreement Under Corrupt Majority, 246-265,
Rafael Pass, Elaine Shi, T.-H. Hubert Chan,
bibinfo, video - Topology-Hiding Computation for Networks with Unknown Delays, 215-245,
Tal Moran, Daniel Tschudi, Ueli Maurer, Rio LaVigne, Chen-Da Liu-Zhang, Marta Mularczyk,
bibinfo, video - Bandwidth-Efficient Threshold EC-DSA, 266-296,
Dario Catalano, Fabien Laguillaumie, Guilhem Castagnos, Ida Tucker, Federico Savasta,
bibinfo, video - Going Beyond Dual Execution: MPC for Functions with Efficient Verification, 328-356,
Abhi Shelat, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam,
bibinfo, video - MonZ2ka: Fast Maliciously Secure Two Party Computation on Z2k, 357-386,
Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli,
bibinfo, video
- Sublinear-Round Byzantine Agreement Under Corrupt Majority, 246-265,
- Cryptographic Primitives
- Witness Maps and Applications, 220-246,
Manoj Prabhakaran, Daniel Wichs, Suvradip Chakraborty,
bibinfo, video - Efficient Redactable Signature and Application to Anonymous Credentials, 628-656,
Olivier Sanders,
bibinfo, video - Constraining and Watermarking PRFs from Milder Assumptions, 431-461,
Chris Peikert, Sina Shiehian,
bibinfo, video - Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes, 462-492,
Daniel Slamanig, David Derler, Kai Samelin,
bibinfo, video - The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO, 187-219,
Dennis Hofheinz, Geoffroy Couteau, Thomas Agrikola,
bibinfo, video - Linearly-Homomorphic Signatures and Scalable Mix-Nets, 597-627,
David Pointcheval, Duong Hieu Phan, Chloé Hébant,
bibinfo, video
- Witness Maps and Applications, 220-246,
- Lattice Based Cryptography
- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier, 3-36,
Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden,
bibinfo, video - Almost Tight Security in Lattice with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More, 652-681,
Feng-Hao Liu, Zhedong Wang, Qiqi Lai,
bibinfo, video - Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes, 37-65,
Jiang Zhang, Zhenfeng Zhang, Shuqin Fan, Yu Yu, Kang Yang,
bibinfo, video - MPSign: A Signature from Small-Secret Middle-Product Learning with Errors, 66-93,
Ron Steinfeld, Damien Stehlé, Shi Bai, Zhenfei Zhang, Ryo Hiromasa, Amin Sakzad, Miruna Rosca, Dipayan Das,
bibinfo, video - Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography, 623-651,
Daniele Micciancio, Chris Peikert, Michael Walter, Nicholas Genise,
bibinfo, video
- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier, 3-36,
- Cryptanalysis and Concrete Security
- Improved Classical Cryptanalysis of SIKE in Practice, 505-534,
Michael Naehrig, Patrick Longa, Craig Costello, Joost Renes, Fernando Virdia,
bibinfo, video - A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level, 535-564,
Aurore Guillevic,
bibinfo, video - Faster Cofactorization with ECM Using Mixed Representations, 483-504,
Laurent Imbert, Cyril Bouvier,
bibinfo, video
- Improved Classical Cryptanalysis of SIKE in Practice, 505-534,