Public Key Cryptography
PKC 2023: 
Alexandra Boldyreva and Vladimir Kolesnikov (Eds.)
May 7-10, 2023
Atlanta, GA, USA
cryptodb
information for PKC 2023Organizational Committee
Program Chairs:
General Chairs:
Alexandra Boldyreva and Vladimir KolesnikovGeneral Chairs:
Daniel Genkin and Joseph Jaeger
Program Committee
Ghada Almashaqbeh
Nuttapong Attrapadung
Carlo Blundo
Katharina Boudgoust
Dario Catalano
Suvradip Chakraborty
Shan Chen
Jean Paul Degabriele
Chaya Ganesh
Sean Hallgren
David Heath
Kristina Hostáková
Sorina Ionica
Stanislaw Jarecki
Shuichi Katsumata
Kaoru Kurosawa
Tancrède Lepoint
Christian Majenz
Daniel Masny
Ryo Nishimaki
Adam O'Neill
Charalampos Papamanthou
Alain Passelègue
Sikhar Patranabis
Alice Pellet-Mary
Nuttapong Attrapadung
Carlo Blundo
Katharina Boudgoust
Dario Catalano
Suvradip Chakraborty
Shan Chen
Jean Paul Degabriele
Chaya Ganesh
Sean Hallgren
David Heath
Kristina Hostáková
Sorina Ionica
Stanislaw Jarecki
Shuichi Katsumata
Kaoru Kurosawa
Tancrède Lepoint
Christian Majenz
Daniel Masny
Ryo Nishimaki
Adam O'Neill
Charalampos Papamanthou
Alain Passelègue
Sikhar Patranabis
Alice Pellet-Mary
Edoardo Persichetti
Rachel Player
David Pointcheval
Antigoni Polychroniadou
Willy Quach
Elizabeth A. Quaglia
Adeline Roux-Langlois
John M. Schanck
Peter Scholl
Dominique Schröder
Peter Schwabe
Jae Hong Seo
abhi shelat
Akira Takahashi
Keisuke Tanaka
Jean-Pierre Tillich
Frederik Vercauteren
Damien Vergnaud
Ivan Visconti
Benjamin Wesolowski
David Wu
Kevin Yeo
Mark Zhandry
Vassilis Zikas
- Post-Quantum Cryptography
- Post-Quantum Anonymity of Kyber,
Keita Xagawa, Varun Maram,
bibinfo (best paper) - QCCA-Secure Generic Transformations in the Quantum Random Oracle Model,
Rui Xue, Tianshu Shan, Jiangxia Ge,
bibinfo - A Thorough Treatment of Highly-Efficient NTRU Instantiations,
Eike Kiltz, Dominique Unruh, Vadim Lyubashevsky, Kathrin Hövelmanns, Gregor Seiler, Julien Duman,
bibinfo - A Lightweight Identification Protocol Based on Lattices,
Juliane Krämer, Thomas Pöppelmann, Patrick Struck, Samed Düzlü,
bibinfo - POLKA: Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption,
Benoît Libert, Thomas Peters, François-Xavier Standaert, Charles Momin, Clément Hoffmann,
bibinfo
- Post-Quantum Anonymity of Kyber,
- Attacks
- The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications,
Nadia Heninger, Keegan Ryan,
bibinfo (best paper) - Hull Attacks on the Lattice Isomorphism Problem,
Léo Ducas, Shane Gibbons,
bibinfo - A Key-Recovery Attack against Mitaka in the t-Probing Model,
Thomas Prest,
bibinfo
- The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications,
- Invited Talk: Unexpected Applications of Fully Homomorphic Encryption by Chris Peikert
- Signatures
- Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA,
Mihir Bellare, Zoë Diamadi, Hannah Davis,
bibinfo - Security Analysis of RSA-BSSA,
Anna Lysyanskaya,
bibinfo - Extendable Threshold Ring Signatures with Enhanced Anonymity,
Dario Fiore, Gennaro Avitabile, Vincenzo Botta,
bibinfo - Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures,
David Pointcheval, Chloé Hébant, Robert Schädlich,
bibinfo
- Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA,
- Isogenies
- SCALLOP: scaling the CSI-FiSh,
Benjamin Wesolowski, Luca De Feo, Lorenz Panny, Simon-Philipp Merz, Antonin Leroux, Péter Kutas, Tako Boris Fouotsa,
bibinfo - Round-Optimal Oblivious Transfer and MPC from Computational CSIDH,
Daniel Masny, Pratyay Mukherjee, Srinivasan Raghuraman, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratik Sarkar,
bibinfo - Generic Models for Group Actions,
Eike Kiltz, Doreen Riepel, Dominik Hartmann, Sabrina Kunzweiler, Julien Duman, Jonas Lehmann,
bibinfo
- SCALLOP: scaling the CSI-FiSh,
- Crypto for Crypto
- CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time,
Jesper Buus Nielsen, Rafael Dowsley, Bernardo David, Carsten Baum, Sabine Oechsner, Ravi Kishore,
bibinfo - Efficient and Universally Composable Single Secret Leader Election from Pairings,
Dario Catalano, Dario Fiore, Emanuele Giunta,
bibinfo - Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments,
Tibor Jager, Peter Chvojka,
bibinfo - Certifying Giant Nonprimes,
Krzysztof Pietrzak, Pavel Hubáček, Chethan Kamath, Charlotte Hoffmann,
bibinfo - Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus,
Shravan Srinivasan, Charalampos Papamanthou, Kartik Nayak, Giulio Malavolta, Julian Loss, Sri AravindaKrishnan Thyagarajan,
bibinfo
- CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time,
- Pairings
- Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded,
Pratish Datta, Tapas Pal,
bibinfo - Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles,
Elaine Shi, Nikhil Vanjani,
bibinfo - GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs,
Marloes Venema, Greg Alpár,
bibinfo
- Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded,
- Key Exchange and Messaging
- EKE Meets Tight Security in the Universally Composable Framework,
Shengli Liu, Dawu Gu, Shuai Han, Xiangyu Liu,
bibinfo - A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn’t Be Considered UC-Secure),
Jiayu Xu, Lawrence Roy,
bibinfo - Sender-binding Key Encapsulation,
Jörn Müller-Quade, Wasilij Beskorovajnov, Astrid Ottenhues, Rebecca Schwerdt, Laurin Benz, Sarai Eilebrecht,
bibinfo - Pattern Matching in Encrypted Stream from Inner Product Encryption,
Guilhem Castagnos, Olivier Sanders, Elie Bouscatié,
bibinfo
- EKE Meets Tight Security in the Universally Composable Framework,
- Homomorphic Cryptography and Other Topics
- On Homomorphic Secret Sharing from Polynomial-Modulus LWE,
Lisa Kohl, Thomas Attema, Pedro Capitão,
bibinfo - Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption,
Kang Hoon Lee, Ji Won Yoon,
bibinfo - Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting),
Giuseppe Ateniese, Qiang Tang, Dimitrios Papadopoulos, Long Chen, Danilo Francati,
bibinfo - A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling,
Tim Güneysu, Markus Krausz, Jan Richter-Brockmann, Georg Land,
bibinfo
- On Homomorphic Secret Sharing from Polynomial-Modulus LWE,
- MPC
- Private Polynomial Commitments and Applications to MPC,
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Yupeng Zhang, Rishabh Bhadauria, Wenxuan Wu,
bibinfo - Credibility in Private Set Membership,
Omkant Pandey, Sanjam Garg, Abhishek Jain, Mohammad Hajiabadi, Sina Shiehian, Zhengzhong Jin,
bibinfo - Improved Private Set Intersection for Sets with Small Entries,
Geoffroy Couteau, Dung Bui,
bibinfo - Pseudorandom Correlation Functions from Variable-Density LPN, Revisited,
Geoffroy Couteau, Clément Ducros,
bibinfo - Threshold Private Set Intersection with Better Communication Complexity,
Satrajit Ghosh, Mark Simkin,
bibinfo
- Private Polynomial Commitments and Applications to MPC,
- Encryption I
- Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption,
Dennis Hofheinz, Antonio Faonio, Luigi Russo,
bibinfo - Multi-Authority ABE for Non-Monotonic Access Structures,
Romain Gay, Miguel Ambrona,
bibinfo - Multi-Instance Secure Public-Key Encryption,
Martijn Stam, Carlo Brunetta, Hans Heum,
bibinfo
- Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption,
- Encryption II
- Unidirectional Updatable Encryption and Proxy Re-encryption from DDH,
Gaven J. Watson, Sikhar Patranabis, Peihan Miao,
bibinfo - Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption,
Jiaxin Pan, Yao Jiang Galteland,
bibinfo - Functional Encryption against Probabilistic Queries: Definition, Construction and Applications,
Dawu Gu, Zhedong Wang, Shi-Feng Sun, Geng Wang,
bibinfo
- Unidirectional Updatable Encryption and Proxy Re-encryption from DDH,
- ZK I
- A Generic Transform from Multi-Round Interactive Proof to NIZK,
Pierre-Alain Fouque, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen, Adela Georgescu,
bibinfo - Fine-grained Verifier NIZK and Its Applications,
Shengli Liu, Dawu Gu, Shuai Han, Xiangyu Liu,
bibinfo - Zero-Knowledge Arguments for Subverted RSA Groups,
Mary Maller, Dimitris Kolonelos, Mikhail Volkhov,
bibinfo - Dew: A Transparent Constant-sized Polynomial Commitment Scheme,
Satyanarayana V. Lokam, Chaya Ganesh, Arasu Arun, Tushar Mopuri, Sriram Sridhar,
bibinfo
- A Generic Transform from Multi-Round Interactive Proof to NIZK,
- IO and ZK II
- Non-Interactive Publicly-Verifiable Delegation of Committed Programs,
Amit Sahai, Brent Waters, Riddhi Ghosal,
bibinfo - Laconic Function Evaluation for Turing Machines,
Nico Döttling, Giulio Malavolta, Phillip Gajland,
bibinfo - A Map of Witness Maps: New Definitions and Connections,
Manoj Prabhakaran, Daniel Wichs, Suvradip Chakraborty,
bibinfo - Structure-Preserving Compilers from New Notions of Obfuscations,
Claudio Orlandi, Matteo Campanelli, Danilo Francati,
bibinfo
- Non-Interactive Publicly-Verifiable Delegation of Committed Programs,