CRYPTO 2012

Aug 19 – 23
Santa Barbara
California
USA

 

 

 

Program

CRYPTO 2012

 

 

Program
at-a-glance

Sunday, August 19     Reception Dinner @ Anacapa Lawn

Monday August 20

Tuesday August 21

Wednesday August 22

Thursday August 23

Morning I


Symmetric Cryptosystems

Proof Systems

Privacy

Cryptanalysis


Protocols

Leakage and Side-Channels

Quantum Cryptography


Morning II




Invited Talk 1




Hash Functions




Invited Talk 2

Key-Encapsulation and One-Way Functions

Homomorphic Encryption

Afternoon I


Secure Computation I


Composable Security

Signatures

 

Implementation Analysis

Afternoon II


Attribute-based and Functional Encryption


Tutorial

Secure Computation II

Free Time

Blackbox Separation

IACR Membership Meeting

Evening


Dinner
@ Anacapa Lawn


Dinner &
Rump Session
@ UCen

Barbeque
@ Goleta Beach

Crypto Café
@ Anacapa

 

Sunday, August 19, 2012                                                                                  

17:00 - 20:00: Registration, Anacapa Formal Lounge

17:30 - 21:30: Reception Dinner, Anacapa/Santa Cruz Ocean Lawn

Monday, August 20, 2012                                                                              Top

7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons

9:00 - 9:10: General Chair's Opening Remarks

9:10 - 10:50: Session 1 — Symmetric cryptosystems

ˇ         9:10 - 9:30: An Enciphering Scheme Based on a Card Shuffle
Viet Tung Hoang, Ben Morris, Phillip Rogaway

ˇ         9:30 - 9:50: Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker, Thomas Shrimpton, Seth Terashima

ˇ         9:50 - 10:10: Breaking and Repairing GCM Security Proofs
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu

ˇ         10:10 - 10:30: On the Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem, Martin Ĺgren, Peter Beelen, Gregor Leander

ˇ         10:30 – 10:50: Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs
Eric Miles, Emanuele Viola

Coffee Break

11:20 - 12:20: Invited Talk 1 — The End of Crypto
                     
Jonathan Zittrain, Harvard University

12:30 - 13:45: Lunch, De La Guerra Dining Commons

14:00 - 15:20: Session 2 — Secure Computation I

ˇ         14:00 - 14:20: Must You Know the Code of f to Securely Compute f?
 Mike Rosulek

ˇ         14:20 - 14:40: Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg, Amit Sahai

ˇ         14:40 - 15:00: Collusion-Preserving Computation
Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas

ˇ         15:00 - 15:20: Secret Sharing Schemes for Very Dense Graphs
Amos Beimel, Oriol Farras, Yuval Mintz

Coffee Break

15:50 - 17:10: Session 3 — Attribute-based and Functional Encryption

ˇ         15:50 - 16:10: Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee

ˇ         16:10 - 16:30: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko and Brent Waters

ˇ         16:30 - 16:50: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai, Hakan Seyalioglu, Brent Waters

ˇ         16:50 - 17:10: Functional Encryption for Regular Languages
Brent Waters

19:00 - 21:00: Dinner, Anacapa/Santa Cruz Ocean Lawn

Tuesday, August 21, 2012                                                                            Top

7:30-8:45 Breakfast, De La Guerra Dining Commons & Carrillo Commons

9:00 - 9:40: Session 4 — Proof Systems

ˇ         9:00 - 9:20: Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase, Ivan Visconti

ˇ         9:20 - 9:40: Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky, Alessandro Chiesa

9:40 - 10:40: Session 5 — Protocols

ˇ         9:40 - 10:00: On the Security of TLS-DHE in the Standard Model
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk

ˇ         10:00 – 10:20: Semantic Security for the Wiretap Channel
Mihir Bellare, Stefano Tessaro, Alexander Vardy

ˇ         10:20 - 10:40: Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro

Coffee Break

11:10 - 12:30: Session 6 — Hash Functions

ˇ         11:10 - 11:30: Hash Functions Based on Three Permutations: A Generic Security Analysis
Bart Mennink, Bart Preneel

ˇ         11:30 - 11:50: To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro

ˇ         11:50 - 12:10: New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf, Dmitry Khovratovich

ˇ         12:10 - 12:30: Stam’s Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang

12:30 - 13:45: Lunch, De La Guerra Dining Commons

14:00 - 15:00: Session 7 — Composable Security

ˇ         14:00 - 14:20: Universal Composability from Essentially any Trusted Setup
Mike Rosulek

ˇ         14:20 - 14:40:
-
Impossibility Results for Static Input Secure Computation
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti

-
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai

ˇ         14:40 - 15:00: Black-Box Constructions of Composable Protocols without Set-Up
Huijia Rachel Lin, Rafael Pass

Coffee Break

15:15 - 16:30: Tutorial — Pinning Down "Privacy" in Statistical Databases
                      Adam Smith. Pennsylvania State University

18:00-23:00: Dinner and Rump Session, UCEN
                   
(Rump session starts at 19:30.)

Wednesday, August 22, 2012                                                                         Top

7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons

9:00 - 9:40: Session 8 — Privacy

ˇ         9:00 - 9:20: Crowd-Blending Privacy
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass

ˇ         9:20 - 9:40: Differential Privacy with Imperfect Randomness
Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan

9:40 - 10:40: Session 9 — Leakage and Side-Channels

ˇ         9:40 - 10:00: Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu, Anna Lysyanskaya

ˇ         10:00 - 10:20: Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled, Yael Tauman Kalai

ˇ         10:20 - 10:40: How to Compute under AC^0 Leakage without Secure Hardware
Guy Rothblum

Coffee Break

11:10 - 12:10: Invited Talk 2 — Recent Advances and Existing Research Questions in Platform 
                      Security
                     
Ernie Brickell, Intel Corporation

12:10 - 13:40: Lunch, De La Guerra Dining Commons

13:40 - 14:20: Session 10 — Signatures

ˇ         13:40 - 14:00: Group Signatures with Almost-for-free Revocation
Benoit Libert, Thomas Peters, Moti Yung

ˇ         14:00 - 14:20: Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz, Tibor Jager

14:20 - 15:00: Session 11 — Implementation Analysis

ˇ         14:20 - 14:40: Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Graham Steel, Joe-Kai Tsay

ˇ         14:40 - 15:00: Public Keys
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter

Coffee Break

15:30 - 16:30: Session 12 — Secure Computation II

ˇ         15:30 - 15:50: Multiparty Computation from Somewhat Homomorphic Encryption
Ivan Damgard, Valerio Pastro, Nigel Smart, Sarah Zakarias

ˇ         15:50 - 16:10: Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky

ˇ         16:10 - 16:30: A New Approach to Practical Active-Secure Two-Party Computation
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra

16:30 - 16:50: Session 13 — Blackbox Separation

ˇ         16:30 - 16:50: The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody, Rafael Pass

16:50 - 17:40: IACR Membership Meeting, Campbell Hall

18:00 - 20:00: Beach Barbecue, Goleta Beach

20:00 - 22:30: Crypto Cafe, Anacapa Formal Lounge

Thursday, August 23, 2012                                                                            Top

7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons

9:00 - 9:40: Session 14 — Cryptanalysis

ˇ         9:00 - 9:20: Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems (Best Paper Award)
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir

ˇ         9:20 - 9:40: Resistance Against Iterated Attacks Revisited
Asli Bay, Atefeh Mashatan, Serge Vaudenay

9:40 - 10:40: Session 15 — Quantum Cryptography

ˇ         9:40 - 10:00: Secure Identity-based Encryption in the Quantum Random Oracle Model
Mark Zhandry

ˇ         10:00 - 10:20: Quantum to Classical Randomness Extractors
Mario Berta, Omar Fawzi, Stephanie Wehner

ˇ         10:20 - 10:40: Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis,
Louis Salvail, Jesper Buus Nielsen

Coffee Break

11:10 - 11:50 Session 16 — Key Encapsulation and One-way Functions

ˇ         11:10 - 11:30: On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda, Jacob C.N. Schuldt

ˇ         11:30 - 11:50: Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves
Alexandre Duc, Dimitar Jetchev

11:50 - 12:30: Session 17 — Homomorphic Encryption

ˇ         11:50 - 12:10: Homomorphic Evaluation of the AES Circuit
Craig Gentry, Shai Halevi, Nigel P. Smart

ˇ         12:10 - 12:30: Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski

12:15-13:45: Lunch, De La Guerra Dining Commons