Accepted Papers
- Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security.
Takahiro Matsuda (ITRI, AIST, Japan),
Goichiro Hanaoka (ITRI, AIST, Japan) - Extended Nested Dual System Groups, Revisited.
Junqing Gong (Shanghai Jiao Tong University),
Jie Chen (East China Normal University),
Xiaolei Dong (East China Normal University),
Zhenfu Cao (East China Normal University),
Shaohua Tang (South China University of Technology) - Functional Encryption for Inner Product with Full Function Privacy.
Pratish Datta (Department of Mathematics, IIT Kharagpur),
Ratna Dutta (Department of Mathematics, IIT Kharagpur),
Sourav Mukhopadhyay (Department of Mathematics, IIT Kharagpur) - On Public Key Encryption from Noisy Codewords.
Eli Ben-Sasson (Department of Computer Science, Technion),
Iddo Ben-Tov (Department of Computer Science, Technion),
Ivan Damgard (Department of Computer Science, Aarhus University),
Yuval Ishai (Department of Computer Science, Technion and Department of Computer Science, UCLA),
Noga Ron-Zewi (School of Mathematics, Institute for Advanced Study, Princeton and DIMACS, Rutgers University) - ARMed SPHINCS – Computing a 41KB signature in 16KB of RAM.
Andreas Hülsing (Eindhoven University of Technology),
Joost Rijneveld (Radboud University),
Peter Schwabe (Radboud University) - Algebraic approaches for the Elliptic Curve Discrete Logarithm Problem over prime fields.
Christophe Petit (University of Oxford),
Michiel Kosters (University of California, Irvine),
Ange Messeng (University of Passau) - Degenerate Curve Attacks.
Samuel Neves (University of Coimbra, Portugal),
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan). - CCA-Secure Keyed-Fully Homomorphic Encryption.
Junzuo Lai (Jinan University, China),
Robert H. Deng (Singapore Management University, Singapore),
Changshe Ma (South China Normal University, China),
Kouichi Sakurai (Kyushu University, Japan),
Jian Weng (Jinan University, China) - Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys.
Nils Fleischhacker (CISPA, Saarland University),
Johannes Krupp (CISPA, Saarland University),
Giulio Malavolta (CISPA, Saarland University),
Jonas Schneider (CISPA, Saarland University),
Dominique Schröder (CISPA, Saarland University),
Mark Simkin (CISPA, Saarland University) - Nearly Optimal Verifiable Data Streaming.
Johannes Krupp (CISPA, Saarland University),
Dominique Schröder (CISPA, Saarland University),
Mark Simkin (CISPA, Saarland University),
Dario Fiore (IMDEA Software Institute),
Giuseppe Ateniese (Stevens Institute of Technology),
Stefan Nuernberger (CISPA, Saarland University) - On the Hardness of Proving CCA-Security of Signed ElGamal.
David Bernhard (University of Bristol, UK),
Marc Fischlin (TU Darmstadt, Germany),
Bogdan Warinschi (University of Bristol, UK) - Universally Composable Direct Anonymous Attestation.
Jan Camenisch (IBM Research - Zurich),
Manu Drijvers (IBM Research - Zurich),
Anja Lehmann (IBM Research - Zurich) - Robust Secret Sharing Schemes Against Local Adversaries.
Allison Bishop (Columbia University),
Valerio Pastro (Columbia University) - On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.
Fuyuki Kitagawa (Tokyo Institute of Technology / AIST),
Takahiro Matsuda (AIST),
Goichiro Hanaoka (AIST),
Keisuke Tanaka (Tokyo Institute of Technology) - Asynchronous Secure Multiparty Computation in Constant Time.
Ran Cohen (Bar-Ilan University) - Identity-Based Cryptosystems and Quadratic Residuosity.
Marc Joye (Technicolor, USA) - Mitigating Multi-Target Attacks in Hash-based Signatures.
Andreas Hülsing (Eindhoven University of Technology),
Joost Rijneveld (Radboud University),
Fang Song (University of Waterloo) - Deniable Functional Encryption.
Angelo de Caro (IBM),
Vincenzo Iovino (University of Luxembourg),
Adam O'Neill (Georgetown University) - KDM-Security via Homomorphic Smooth Projective Hashing.
Hoeteck Wee (CNRS and ENS, Paris) - Delegatable Functional Signatures.
Michael Backes (CISPA, Saarland University and MPI-SWS),
Sebastian Meiser (CISPA, Saarland University),
Dominique Schröder (CISPA, Saarland University) - Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness.
Fabrice Benhamouda (ENS, CNRS, INRIA, and PSL, Paris, France),
Céline Chevalier (CRED, Université Panthéon-Assas, Paris, France),
Adrian Thillard (ANSSI, ENS, CNRS, INRIA, and PSL, Paris, France),
Damien Vergnaud (ENS, CNRS, INRIA, and PSL, Paris, France) - Chosen-Ciphertext Security from Subset Sum.
Sebastian Faust, Ruhr-Universität Bochum,
Daniel Masny, Ruhr-Universität Bochum,
Daniele Venturi, Sapienza University of Rome - Attribute-Based Signatures for Circuits from Bilinear Map.
Yusuke Sakai (AIST, Japan),
Nuttapong Attrapadung (AIST, Japan),
Goichiro Hanaoka (AIST, Japan) - Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1.
Nishanth Chandran (Microsoft Research, India),
Srinivasan Raghuraman (MIT),
Dhinakaran Vinayagamurthy (University of Waterloo) - On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes.
Mohammad Hajiabadi (University of Victoria),
Bruce M. Kapron (University of Victoria),
Venkatesh Srinivasan (University of Victoria) - Non-Trivially Efficient Indistinguishability Obfuscation.
Huijia Lin (UCSB),
Rafael Pass (Cornell),
Karn Seth (Cornell),
Sidharth Telang (Cornell) - Leakage-Resilient Public-Key Encryption from Obfuscation.
Dana Dachman-Soled (University of Maryland),
S. Dov Gordon (George Mason University),
Feng-Hao Liu (Florida Atlantic University),
Adam O'Neill (Georgetown University),
Hong-Sheng Zhou (Virginia Commonwealth University) - Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE).
Ivan Damgård (Aarhus University),
Antigoni Polychroniadou (Aarhus University),
Vanishree Rao (PARC, a Xerox Company) - Non-Malleable Functions and Their Applications.
Yu Chen (Institute of Information Engineering, Chinese Academy of Sciences and Department of Information Engineering, the Chinese University of Hong Kong),
Baodong Qin (School of Computer Science and Technology, Southwest University of Science and Technology),
Jiang Zhang (State Key Laboratory of Cryptology, Beijing, China),
Yi Deng (Institute of Information Engineering, Chinese Academy of Sciences),
Sherman S.M. Chow (Department of Information Engineering, the Chinese University of Hong Kong) - Universally Composable Authentication and Key-Exchange with Global PKI.
Ran Canetti (Tel-Aviv University and Boston University),
Daniel Shahaf (Tel-Aviv University),
Margarita Vald (Tel Aviv University) - Fault-Tolerant Aggregate Signatures.
Gunnar Hartung (Karlsruhe Institute of Technology),
Björn Kaidel (Karlsruhe Institute of Technology),
Alexander Koch (Karlsruhe Institute of Technology),
Jessica Koch (Karlsruhe Institute of Technology),
Andy Rupp (Karlsruhe Institute of Technology) - Identity-based Hierarchical Key-insulated Encryption without Random Oracles.
Yohei Watanabe (Yokohama National University, Japan),
Junji Shikata (Yokohama National University, Japan) - Very-efficient simulatable flipping of many coins into a well.
Luís T. A. N. Brandão (University of Lisbon and Carnegie Mellon University) - How to Generalize RSA Cryptanalyses.
Atsushi Takayasu (The University of Tokyo),
Noboru Kunihiro (The University of Tokyo)