PKC 2017
28-31 March 2017
Amsterdam,
The Netherlands
20th International Conference on
Practice and Theory of Public-Key Cryptography

Program

Tuesday March 28 2017

18:00 - 20:00Welcome Reception and Registration
Taking place at the Hotel Amsterdam American, very close to the conference venue De Balie

Wednesday March 29 2017

08:00 - 09:00Registration
09:00 - 09:10Welcome

Session I - Cryptanalysis (Chair: Leo Ducas)

09:10 - 09:35LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE.
Gottfried Herold, Alexander May
09:35 - 10:00Improved Algorithms for the Approximate k-List Problem in Euclidean norm.
Gottfried Herold, Elena Kirshanova
10:00 - 10:25Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
10:25 - 10:55Coffee

Session II - E-Cash and ORAM (Chair: Ronald Cramer)

10:55 - 11:20Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash.
David Pointcheval, Olivier Sanders, Jacques Traoré
11:20 - 11:45Asymptotically tight bounds for composing ORAM with PIR.
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren

Session III - Invited Talk I (Chair: Ronald Cramer)

11:45 - 12:45The Evolution of Public Key Cryptography in SSL/TLS
Kenny Paterson
12:45 - 14:00Lunch

Session IV - Protocols (Chair: Ivan Visconti)

14:00 - 14:25Predictable Arguments of Knowledge.
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
14:25 - 14:50Removing Erasures with Explainable Hash Proof Systems.
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
14:50 - 15:15Scalable Multi-Party Private Set-Intersection.
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
15:15 - 15:45Coffee

Session V - Encryption Schemes (Chair: Carmit Hazay)

15:45 - 16:10Tightly Secure IBE under Constant-size Master Public Key.
Jie Chen, Junqing Gong, Jian Weng
16:10 - 16:35Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Rishab Goyal, Venkata Koppula, Brent Waters
16:35 - 17:00Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts.
Benoît Libert, Thomas Peters, Chen Qian
17:00End of Day

Thursday March 30 2017

Session VI - Leakage-Resilient and Non-Malleable Codes (Chair: Fabrice Benhamouda)

09:00 - 09:25Non-Malleable Codes with Split-State Refresh.
Antonio Faonio, Jesper Buus Nielsen
09:25 - 09:50Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes.
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
09:50 - 10:15Fully Leakage-Resilient Codes.
Antonio Faonio, Jesper Buus Nielsen
10:15 - 10:45Coffee

Session VII - Number Theory and Diffie-Hellman (Chair: Cecile Pierrot)

10:45 - 11:10On the Bit Becurity of Elliptic Curve Diffie-Hellman.
Barak Shani
11:10 - 11:35Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree.
Taechan Kim, Jinhyuck Jeong
11:35 - 12:00Provably Secure NTRU Instances over Prime Cyclotomic Rings.
Yang Yu, Guangwu Xu, Xiaoyun Wang
12:00 - 12:25Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems.
Jorge Luis Villar
12:25 - 13:45Lunch

Session VIII - Encryption with Access Control (Chair: Dario Fiore)

13:45 - 14:10Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits.
Nuttapong Attrapadung (AIST)
14:10 - 14:35CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions.
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
14:35 - 15:00Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
15:00 - 15:25Access Control Encryption for Equality, Comparison, and More.
Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
15:25 - 15:55Coffee

Session IX - Special Signatures (Chair: Pierre Karpman)

15:55 - 16:20Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Mihir Bellare, Bertram Poettering, Douglas Stebila
16:20 - 16:45Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
16:45 - 17:10Improved Structure Preserving Signatures under Standard Bilinear Assumptions.
Charanjit Jutla, Arnab Roy

Conference Dinner

19:30 - 22:00Conference dinner
Walk-in & aperitif from 19:00. Taking place at I Dock, a short walk from the Amsterdam Central Station

Friday March 31 2017

Session X - FHE (Chair: Masayuki Abe)

09:00 - 09:25Chosen-Ciphertext Secure Fully Homomorphic Encryption.
Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan
09:25 - 09:50Circuit-Private Multi-key FHE.
Wutichai Chongchitmate, Rafail Ostrovsky
09:50 - 10:15FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime.
Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
10:15 - 10:45Coffee

Session XI - Real-World Schemes (Chair: Serge Fehr)

10:45 - 11:10Ceremonies for End-to-End Verifiable Elections.
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
11:10 - 11:35A Modular Security Analysis of EAP and IEEE 802.11.
Chris Brzuska, Håkon Jacobsen

Session XII - Invited Talk II (Chair: Serge Fehr)

11:35 - 12:35Recent Advances in Non-Malleable Cryptography
Vipul Goyal
12:35 - 14:00Lunch

Session XIII - Multiparty Computation (Chair: Marcel Keller)

14:00 - 14:25On the Computational Overhead of MPC with Dishonest Majority.
Jesper Buus Nielsen, Samuel Ranellucci
14:25 - 14:50Better Two-Round Adaptive Multiparty Computation.
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
14:50 - 15:15Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
15:15 - 15:45Coffee

Session XIV - Primitives (Chair: Yuliang Zheng)

15:45 - 16:10Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
16:10 - 16:35Constraining Pseudorandom Functions Privately.
Dan Boneh, Kevin Lewi, David J. Wu
16:35 - 17:00Universal Samplers with Fast Verification.
Venkata Koppula, Andrew Poelstra, Brent Waters
17:00Closing Remarks