An Enciphering Scheme
Based on a Card Shuffle
Viet Tung Hoang
(
Ben Morris (
Phillip Rogaway
(
Tweakable Blockciphers
with Beyond Birthday-Bound Security
Will Landecker
(
Thomas
Shrimpton (
Seth Terashima
(
Breaking and Repairing GCM
Security Proofs
Tetsu Iwata (
Keisuke Ohashi
(
Kazuhiko
Minematsu (NEC Corporation,
On The Distribution of Linear Biases:
Three Instructive Examples
Mohamed Ahmed Abdelraheem (
Martin Ågren (
Peter Beelen (
Gregor Leander
(
Substitution-Permutation Networks,
Pseudorandom Functions, and Natural Proofs
Eric Miles
(Northeastern University)
Emanuele Viola
(Northeastern University)
Must you know the code of f to securely
compute f?
Mike Rosulek (
Adaptively Secure Multi-Party
Computation with Dishonest Majority
Sanjam Garg
(UCLA)
Amit Sahai
(UCLA)
Collusion-Preserving Computation
Joel Alwen (ETH
Jonathan Katz (
Ueli Maurer
(ETH
Vassilis Zikas
(
Secret Sharing Schemes for Very Dense
Graphs
Amos Beimel (
Yuval Mintz (
Oriol Farras
(Universitat Rovira i
Functional Encryption with Bounded
Collusions via Multi-Party Computation
Sergey Gorbunov
(
Vinod
Vaikuntanathan (
Hoeteck Wee (
New Proof Methods for Attribute-Based Encryption:
Achieving Full Security through Selective Techniques
Allison Lewko (
Brent Waters (
Dynamic Credentials and Ciphertext
Delegation for Attribute-Based Encryption
Amit Sahai
(UCLA)
Hakan Seyalioglu
(UCLA)
Brent Waters (
Functional Encryption for Regular
Languages
Brent Waters (
Secure Database Commitments and
Universal Arguments of Quasi Knowledge
Melissa Chase (Microsoft Research
Ivan Visconti (
Succinct Arguments from Multi-Prover
Interactive Proofs and their Efficiency Benefits
Nir Bitansky (
Alessandro
Chiesa (MIT)
On the Security of TLS-DHE in the Standard
Model
Tibor Jager (
Florian Kohlar
(
Sven Schäge (
Jörg Schwenk (
Semantic Security for the Wiretap
Channel
Mihir Bellare
(UCSD)
Stefano Tessaro
(MIT)
Alexander Vardy
(UCSD)
Multi-Instance Security and its
Application to Password-Based Cryptography
Mihir Bellare
(UCSD)
Thomas
Ristenpart (University of Wisconsin-Madison)
Stefano Tessaro
(MIT)
Hash Functions Based on Three
Permutations: A Generic Security Analysis
Bart Mennink (KU
Bart Preneel (KU
To Hash or Not to Hash Again?
(In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis
(NYU)
Thomas
Ristenpart (University of Wisconsin-Madison)
John
Steinberger (
Stefano Tessaro
(MIT)
New Preimage Attacks Against Reduced
SHA-1
Simon Knellwolf
(ETH
Dmitry
Khovratovich (Microsoft Research
Stam's Conjecture and Threshold
Phenomena in Collision Resistance
John
Steinberger (
Xiaoming Sun
(Chinese
Zhe Yang (Hulu,
Universal Composability From Essentially
Any Trusted Setup
Mike Rosulek (
Impossibility Results for Static Input
Secure Computation
Sanjam Garg
(UCLA)
Abishek
Kumarasubramanian (UCLA)
Rafail
Ostrovsky (UCLA)
Ivan Visconti (
New Impossibility Results for Concurrent
Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal (UCLA)
Vipul Goyal (MSR,
Abhishek Jain (UCLA)
Manoj Prabhakaran (UIUC)
Amit Sahai (UCLA)
Abstract:
We consider the client-server setting for the concurrent composition of
secure protocols: in this setting, a single server interacts with multiple
clients concurrently, executing with each client a specified protocol where
only the client should receive any nontrivial output. Such a setting is
easily motivated from an application standpoint. There are important special
cases for which positive results are known such as concurrent zero knowledge
protocols and it has been an open question whether other natural
functionalities such as Oblivious Transfer (OT) are possible in this setting.
In this work:
- We resolve this open question by showing that unfortunately, even in this
very limited concurrency setting, broad new impossibility results hold,
ruling out not only OT, but in fact all nontrivial finite asymmetric
functionalities. Our new negative results hold even if the inputs of all
honest parties are fixed in advance, and the adversary receives no auxiliary
information.
- Along the way, we establish a new
unconditional completeness result for asymmetric functionalities, where we
characterize functionalities that are non-interactively complete secure
against active adversaries. When we say that a functionality F is
non-interactively complete, we mean that every other asymmetric functionality
can be realized by parallel invocations of several copies of F, with no other
communication in any direction. Our result subsumes a completeness result of
Kilian [STOC'00] that uses protocols which require additional interaction in
both directions.
Black-Box Constructions of Composable
Protocols without Set-Up
Huijia Rachel Lin
(MIT and Boston University)
Crowd-Blending Privacy
Johannes Gehrke
(
Michael Hay (
Edward Lui (
Differential Privacy with Imperfect
Randomness
Yevgeniy Dodis
(NYU)
Adriana
Lopez-Alt (NYU)
Ilya Mironov
(Microsoft Research)
Salil Vadhan (
Tamper and Leakage Resilience in the
Split-State Model
Feng-Hao Liu (
Anna
Lysyanskaya (
Securing Circuits Against Constant-Rate
Tampering
Dana
Dachman-Soled (Microsoft Research
Yael Tauman
Kalai (Microsoft Research New
How to Compute under AC^0 Leakage
without Secure Hardware
Guy Rothblum
(Microsoft Research
Group Signatures with Almost-for-free
Revocation
Benoit Libert
(UCL,
Thomas Peters
(UCL,
Moti Yung (Google
Inc. and
Tightly Secure Signatures and Public-Key
Encryption
Dennis Hofheinz
(Karlsruhe Institute of
Tibor Jager
(Karlsruhe Institute of
Efficient Padding Oracle Attacks on
Cryptographic Hardware
Romain Bardou
(INRIA, France)
Riccardo
Focardi (Università Ca'
Yusuke Kawamoto
(
Lorenzo
Simionato (Università Ca' Foscari,
Graham Steel
(INRIA, France)
Joe-Kai Tsay
(NTNU,
Public Keys
Arjen K.
Lenstra (EPFL,
James P. Hughes
(Self,
Maxime Augier (EPFL,
Joppe W. Bos (EPFL,
Thorsten
Kleinjung (EPFL,
Christophe
Wachter (EPFL,
Multiparty Computation from Somewhat
Homomorphic Encryption
Ivan Damgard (
Valerio Pastro
(
Nigel Smart (
Sarah Zakarias
(
Near-Linear Unconditionally-Secure
Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson
(
Serge Fehr
(CWI, The
Rafail
Ostrovsky (UCLA)
A New Approach to Practical
Active-Secure Two-Party Computation
Jesper Buus Nielsen
(
Peter Sebastian
Nordholt (
Claudio Orlandi
(
Sai Sheshank
Burra (Indian
The Curious Case of Non-Interactive
Commitments
Mohammad
Mahmoody (
Efficient Dissection of Composite
Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial
Search Problems
Itai Dinur
(Weizmann Institute,
Orr Dunkelman (Weizmann
Institute and
Nathan Keller
(Weizmann Institute and
Adi Shamir
(Weizmann Institute,
Resistance Against Iterated Attacks
Revisited
Atefeh Mashatan
(EPFL,
Serge Vaudenay
(EPFL,
Secure Identity-based Encryption in the
Quantum Random Oracle Model
Mark Zhandry (
Quantum to Classical Randomness
Extractors
Mario Berta
(ETH
Omar Fawzi (
Stephanie
Wehner (National
Actively Secure Two-Party Evaluation of
any Quantum Operation
Frédéric Dupuis
(ETH Zürich)
Louis Salvail (
Jesper Buus
Nielsen (
On the Impossibility of Constructing
Efficient Key Encapsulation and Programmable Hash Functions in Prime Order
Groups
Goichiro
Hanaoka (RISEC, AIST,
Takahiro
Matsuda (RISEC, AIST,
Jacob C.N.
Schuldt (RISEC, AIST,
Hardness of Computing Individual Bits
for One-way Functions on Elliptic Curves
Alexandre Duc
(EPFL,
Dimitar Jetchev
(EPFL,
Homomorphic Evaluation of the AES
Circuit
Craig Gentry
(IBM Research)
Shai Halevi (IBM
Research)
Nigel P. Smart
(
Fully Homomorphic Encryption without
Modulus Switching from Classical GapSVP
Zvika Brakerski
(