Papers Accepted to

CRYPTO 2011

 

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. Masayuki Abe (NTT Information Sharing Platform Labs), Jens Groth (University College London), Kristiyan Haralambiev (NYU), and Miyako Ohkubo (NICT).

 

Perfectly-Secure Multiplication for any t < n/3.  Gilad Asharov (Department of Computer Science, Bar-Ilan University, Israel),  Yehuda Lindell  (Department of Computer Science, Bar-Ilan University, Israel), and Tal Rabin (IBM T. J. Watson Research Center, NY).

 

Random Oracle Reducibility. Paul Baecher and Marc Fischlin (both of CASED & TU Darmstadt, Germany).

 

Leftover Hash Lemma, Revisited. Boaz Barak (Microsoft Research, New England, USA), Yevgeniy Dodis (New York University),  Hugo Krawczyk (IBM T.J. Watson Research Center), Olivier Pereira (UCL Crypto Group, Université catholique de Louvain), Krzysztof Pietrzak (CWI Amsterdam), Francois-Xavier Standaert (UCL Crypto Group, Université catholique de Louvain), and Yu Yu (Department of Computer Science, East China Normal University).

 

Computer-Aided Security Proofs for the Working Cryptographer. Gilles Barthe (IMDEA Software Institute),  Benjamin Gregoire (INRIA Sophia-Antipolis Mediterranee ), Sylvain Heraud (INRIA Sophia-Antipolis Mediterranee ), and Santiago Zanella-Beguelin (IMDEA Software Institute).

 

1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds. Amos Beimel (Ben-Gurion University), Yehuda Lindell (Bar-Ilan University), Eran Omri (Bar-Ilan University), and Ilan Orlov (Ben Gurion University).

 

Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.  Mihir Bellare and Sriram Keelveedhi (both of UCSD).

 

Verifiable Delegation of Computation over Large Datasets.  Siavosh Benabbas (University of Toronto), Rosario Gennaro (IBM T.J.Watson Research Center), and Yevgeniy Vahlis (Columbia University).

 

Smaller Decoding Exponents: Ball-Collision Decoding. Daniel J. Bernstein (University of Illinois at Chicago), Tanja Lange (Technische Universiteit Eindhoven), and Christiane Peters (Technische Universiteit Eindhoven).

 

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. Alexandra Boldyreva (Georgia Tech), Nathan Chenette (Georgia Tech), and Adam O’Neill (University of Texas at Austin).

 

Automatic Search of Attacks on Round-Reduced AES and Applications.  Charles Bouillaguet, Patrick Derbez, and Pierre-Alain Fouque (all of Ecole Normale Supérieure, Paris, France)

 

Better Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.  Zvika Brakerski (Weizmann Institute) and Gil Segev (Microsoft Research Silicon Valley).

 

Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. Zvika Brakerski (Weizmann Institute and MIT) and Vinod Vaikuntanathan (Microsoft Research and University of Toronto).

 

Merkle Puzzles in a Quantum World. Gilles Brassard (Université de Montréal), Peter Høyer (University of Calgary), Kassem Kalach (Université de Montréal), Marc Kaplan (Université de Montréal), Sophie Laplante (LRI – Université Paris-Sud), and Louis Salvail  (Université de Montréal).

 

Physically Uncloneable Functions in the Universal Composition.  Christina Brzuska, Marc Fischlin, Heike Schroeder, and Stefan Katzenbeisser (all of TU Darmstadt CASED).

 

Position-Based Quantum Cryptography: Impossibility and Constructions. Harry Buhrman (CWI and University of Amsterdam), Nishanth Chandran (UCLA), Serge Fehr (CWI), Ran Gelles (UCLA), Vipul Goyal (Microsoft Research, India), Rafail Ostrovsky (UCLA), and Christian Schaffner (University of Amsterdam and CWI).

 

The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.  Ignacio Cascudo (CWI Amsterdam), Ronald Cramer (CWI Amsterdam and Leiden University), and Chaoping Xing (NTU Singapore).

 

Memory Delegation.  Kai-Min Chung (Cornell), Yael Kalai (Microsoft Research), Feng-Hao Liu (Brown), and Ran Raz (Weizmann)

 

Fully-Homomorphic Encryption over the Integers with Shorter Public-Keys.  Jean-Sébastien Coron (University of Luxembourg), Avradip Mandal (University of Luxembourg), David Naccache (ENS), and Mehdi Tibouchi (ENS and University of Luxembourg). 

 

Inverting the HFE systems is Quasipolynomial for all Fields.  Jintai Ding (South China University of Technology and University of Cincinnati) and Timothy Hodges (University of Cincinnati).

 

McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling.  Hang Dinh (Indiana University South Bend),  Cristopher Moore (University of New Mexico), and Alexander Russell (University of Connecticut).

 

Key-Evolution Schemes Resilient to Space-Bounded Leakage.  Stefan Dziembowski (University of Warsaw and University of Rome “La Sapienza”), Tomasz Kazana (BioInfoBank Institute and University of Warsaw), and Daniel Wichs (New York University).

 

Leakage-Resilient Zero Knowledge.  Sanjam Garg, Abhishek Jain, and Amit Sahai (all of UCLA).

 

Round Optimal Blind Signatures.  Sanjam Garg (UCLA), Vanishree Rao (UCLA), Amit Sahai (UCLA), Dominique Schröder (University of Maryland, USA), and Dominique Unruh (University of Tartu, Estonia).

 

The PHOTON Family of Lightweight Hash Functions.  Jian Guo (Institute for Infocomm Research, Singapore), Thomas Peyrin (Nanyang Technological University, Singapore), and Axel Poschmann (Nanyang Technological University, Singapore).

 

Secure Computation on the Web: Computing without Simultaneous Interaction.  Shai Halevi (IBM Research), Yehuda Lindell (Bar-Ilan University), Benny Pinkas (Bar-Ilan University).

 

Classical Cryptographic Protocols in a Quantum World. Sean Hallgren, Adam Smith, and Fang Song (all of Pennsylvania State University).

 

Analyzing Blockwise Lattice Algorithms using Dynamical Systems.  Guillaume Hanrot (ENS Lyon), Xavier Pujol (ENS Lyon), and Damien Stehle (CNRS).

 

Constant-Rate Oblivious Transfer from Noisy Channels.  Yuval Ishai (Technion), Eyal Kushilevitz (Technion),  Rafail Ostrovsky (UCLA), Manoj Prabhakaran (UIUC), Amit Sahai (UCLA), and Juerg Wullschleger (McGill University).

 

Cryptography with Tamperable and Leaky Memory.  Yael Tauman Kalai (Microsoft Research), Bhavana Kanukurthi (Boston University), and Amit Sahai (University of California, Los Angeles).

 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.  Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, and Erik Zenner (all of DTU Mathematics, Denmark).

 

The Collision Security of Tandem-DM in the Ideal Cipher Model. Jooyoung Lee (Faculty of Mathematics and Statistics, Sejong University, Seoul, Korea), Martijn Stam (Department of Computer Science, University of Bristol, United Kingdom), and John Steinberger (Institute of Theoretical Computer Science, Tsinghua University, Beijing, China).

 

The IPS Compiler: Optimizations, Variants and Concrete Efficiency.  Yehuda Lindell (Bar-Ilan University), Eli Oxman (Bar-Ilan University), and Benny Pinkas (Bar-Ilan University).

 

Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.  Daniele Micciancio and Petros Mol (both of University of California, San Diego). 

 

Time-Lock Puzzles in the Random Oracle Model. Mohammad Mahmoody (Cornell University), Tal Moran and Salil Vadhan  (both of Harvard University).

 

Bi-deniable Public-Key Encryption.  Adam O’Neill (University of Texas, Austin), Chris Peikert (Georgia Institute of Technology), and Brent Waters (University of Texas, Austin).

 

How to Improve Rebound Attacks.  Maria Naya-Plasencia (FHNW, Windisch, Switzerland).

 

Optimal Verification of Operations on Dynamic Sets.  Charalampos Papamanthou (Brown University), Roberto Tamassia (Brown University), and Nikos Triandopoulos (RSA Labs and Boston University, USA).

 

Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.  Koichi Sakumoto, Taizo Shirai, and Harunaga Hiwatari (all of Sony Corporation).

 

Generic Side-Channel Distinguishers: Improvements and Limitations. Nicolas Veyrat-Charvillon and Francois-Xavier Standaert (both of the UCL Crypto Group, Université catholique de Louvain).

 

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.  Carolyn Whitnall (University of Bristol) and Elisabeth Oswald (University of Bristol).

 

A New Variant of PMAC: Beyond the Birthday Bound. Kan Yasuda (NTT, Japan).