Program
Tuesday March 28 2017
18:00 - 20:00 | Welcome Reception and Registration Taking place at the Hotel Amsterdam American, very close to the conference venue De Balie |
Wednesday March 29 2017
08:00 - 09:00 | Registration |
09:00 - 09:10 | Welcome |
Session I - Cryptanalysis (Chair: Leo Ducas)
09:10 - 09:35 | LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE. Gottfried Herold, Alexander May |
09:35 - 10:00 | Improved Algorithms for the Approximate k-List Problem in Euclidean norm. Gottfried Herold, Elena Kirshanova |
10:00 - 10:25 | Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi |
10:25 - 10:55 | Coffee |
Session II - E-Cash and ORAM (Chair: Ronald Cramer)
10:55 - 11:20 | Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash. David Pointcheval, Olivier Sanders, Jacques Traoré |
11:20 - 11:45 | Asymptotically tight bounds for composing ORAM with PIR. Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren |
Session III - Invited Talk I (Chair: Ronald Cramer)
11:45 - 12:45 | The Evolution of Public Key Cryptography in SSL/TLS Kenny Paterson |
12:45 - 14:00 | Lunch |
Session IV - Protocols (Chair: Ivan Visconti)
14:00 - 14:25 | Predictable Arguments of Knowledge. Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi |
14:25 - 14:50 | Removing Erasures with Explainable Hash Proof Systems. Michel Abdalla, Fabrice Benhamouda, David Pointcheval |
14:50 - 15:15 | Scalable Multi-Party Private Set-Intersection. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
15:15 - 15:45 | Coffee |
Session V - Encryption Schemes (Chair: Carmit Hazay)
15:45 - 16:10 | Tightly Secure IBE under Constant-size Master Public Key. Jie Chen, Junqing Gong, Jian Weng |
16:10 - 16:35 | Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Rishab Goyal, Venkata Koppula, Brent Waters |
16:35 - 17:00 | Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts. Benoît Libert, Thomas Peters, Chen Qian |
17:00 | End of Day |
Thursday March 30 2017
Session VI - Leakage-Resilient and Non-Malleable Codes (Chair: Fabrice Benhamouda)
09:00 - 09:25 | Non-Malleable Codes with Split-State Refresh. Antonio Faonio, Jesper Buus Nielsen |
09:25 - 09:50 | Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes. Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi |
09:50 - 10:15 | Fully Leakage-Resilient Codes. Antonio Faonio, Jesper Buus Nielsen |
10:15 - 10:45 | Coffee |
Session VII - Number Theory and Diffie-Hellman (Chair: Cecile Pierrot)
10:45 - 11:10 | On the Bit Becurity of Elliptic Curve Diffie-Hellman. Barak Shani |
11:10 - 11:35 | Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. Taechan Kim, Jinhyuck Jeong |
11:35 - 12:00 | Provably Secure NTRU Instances over Prime Cyclotomic Rings. Yang Yu, Guangwu Xu, Xiaoyun Wang |
12:00 - 12:25 | Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Jorge Luis Villar |
12:25 - 13:45 | Lunch |
Session VIII - Encryption with Access Control (Chair: Dario Fiore)
13:45 - 14:10 | Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. Nuttapong Attrapadung (AIST) |
14:10 - 14:35 | CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. Fabrice Benhamouda, Florian Bourse, Helger Lipmaa |
14:35 - 15:00 | Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich |
15:00 - 15:25 | Access Control Encryption for Equality, Comparison, and More. Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi |
15:25 - 15:55 | Coffee |
Session IX - Special Signatures (Chair: Pierre Karpman)
15:55 - 16:20 | Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Mihir Bellare, Bertram Poettering, Douglas Stebila |
16:20 - 16:45 | Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
16:45 - 17:10 | Improved Structure Preserving Signatures under Standard Bilinear Assumptions. Charanjit Jutla, Arnab Roy |
Conference Dinner
19:30 - 22:00 | Conference dinner Walk-in & aperitif from 19:00. Taking place at I Dock, a short walk from the Amsterdam Central Station |
Friday March 31 2017
Session X - FHE (Chair: Masayuki Abe)
09:00 - 09:25 | Chosen-Ciphertext Secure Fully Homomorphic Encryption. Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan |
09:25 - 09:50 | Circuit-Private Multi-key FHE. Wutichai Chongchitmate, Rafail Ostrovsky |
09:50 - 10:15 | FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime. Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint |
10:15 - 10:45 | Coffee |
Session XI - Real-World Schemes (Chair: Serge Fehr)
10:45 - 11:10 | Ceremonies for End-to-End Verifiable Elections. Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang |
11:10 - 11:35 | A Modular Security Analysis of EAP and IEEE 802.11. Chris Brzuska, Håkon Jacobsen |
Session XII - Invited Talk II (Chair: Serge Fehr)
11:35 - 12:35 | Recent Advances in Non-Malleable Cryptography Vipul Goyal |
12:35 - 14:00 | Lunch |
Session XIII - Multiparty Computation (Chair: Marcel Keller)
14:00 - 14:25 | On the Computational Overhead of MPC with Dishonest Majority. Jesper Buus Nielsen, Samuel Ranellucci |
14:25 - 14:50 | Better Two-Round Adaptive Multiparty Computation. Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam |
14:50 - 15:15 | Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam |
15:15 - 15:45 | Coffee |
Session XIV - Primitives (Chair: Yuliang Zheng)
15:45 - 16:10 | Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
16:10 - 16:35 | Constraining Pseudorandom Functions Privately. Dan Boneh, Kevin Lewi, David J. Wu |
16:35 - 17:00 | Universal Samplers with Fast Verification. Venkata Koppula, Andrew Poelstra, Brent Waters |
17:00 | Closing Remarks |