Conference Program
All talks will be held at Atkinson Hall, in the CalIT2 building, adjacent to the CSE department building.
Sunday, February 23
17:00–19:00 Welcome Reception
(Generously supported by Microsoft Research.)
The reception will take place at the conference hotel Estancia, La Jolla.
Monday, February 24
8:30–9:20 Registration / Breakfast
9:20–9:30 Opening Remarks
9:30–10:45 Obfuscation (Chair: Eyal Kushilevitz)
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding |
Zvika Brakerski and Guy N. Rothblum
Obfuscation for Evasive Functions |
Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai
On Extractability Obfuscation |
Elette Boyle and Kai-Min Chung and Rafael Pass
10:45–11:15 Coffee Break
11:15–12:05 Applications of Obfuscation (Chair: Claudio Orlandi)
Two-round secure MPC from Indistinguishability Obfuscation |
Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova
Chosen Ciphertext Security via Point Obfuscation |
Takahiro Matsuda and Goichiro Hanaoka
12:20–13:20 Invited Talk I (Chair: Yehuda Lindell)
Collusion and Privacy in Mechanism Design |
Silvio Micali (MIT)
13:20–15:20 Lunch (provided)
15:20–16:10 Zero Knowledge I (Chair: Jens Groth)
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge |
Yuval Ishai and Mor Weiss
Achieving Constant Round Leakage-Resilient Zero-Knowledge |
Omkant Pandey
16:10–16:40 Coffee Break
16:40–17:30 Zero Knowledge II (Chair: Jens Groth)
Statistical Concurrent Non-Malleable Zero Knowledge |
Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
4-Round Resettably-Sound Zero Knowledge |
Kai-Min Chung and Rafail Ostrovsky and Rafael Pass and Muthuramakrishnan Venkitasubramaniam and Ivan Visconti
Tuesday, February 25
9:00–9:30 Breakfast
9:30–10:45 Black-Box Separations (Chair: Yevgeniy Dodis)
Can Optimally-Fair Coin Tossing be Based on One-Way Functions? |
Dana Dachman-Soled and Mohammad Mahmoody and Tal Malkin
On the Power of Public-key Encryption in Secure Computation |
Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations |
Takahiro Matsuda
10:45–11:15 Coffee Break
11:15–12:05 Secure Computation I (Chair: Mike Rosulek)
Towards Characterizing Complete Fairness in Secure Two-Party Computation |
Gilad Asharov
On the Cryptographic Complexity of the Worst Functions |
Amos Beimel and Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz
12:05–12:20 Short Break
12:20–13:10 Secure Computation II (Chair: Mike Rosulek)
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol |
Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto
One-Sided Adaptively Secure Two-Party Computation |
Carmit Hazay and Arpita Patra
13:10–15:10 Lunch (provided)
15:10–16:00 Secure Computation III (Chair: Eyal Kushilevitz)
Multi-Linear Secret Sharing Schemes |
Amos Beimel and Aner M. Ben-Efraim and Carles Padró
and Ilya Tomkin
Broadcast Amplification |
Martin Hirt and Ueli Maurer and Pavel Raykov
16:00–16:30 Coffee Break
16:30–17:45 Coding and Cryptographic Applications (Chair: Amos Beimel)
Non-Malleable Coding Against Bit-wise and Split-State Tampering |
Mahdi Cheraghchi and Venkatesan Guruswami
Continuous Non-malleable Codes |
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
Locally Updatable and Locally Decodable Codes |
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky
19:00–20:30 Dinner (provided)
19:45–20:00 Business Meeting (Chair: Shai Halevi)
20:00-22:00 Rump Session (Chair: abhi shelat)
Location: Hotel Estancia Theater
Rump Session Program
Wednesday, February 26
9:00–9:30 Breakfast
9:30–10:45 Leakage (Chair: Yevgeniy Dodis)
Leakage Resilient Fully Homomorphic Encryption |
Alexandra Berkoff and Feng-Hao Liu
Securing Circuits and Protocols Against 1/poly(k) Tampering Rate |
Dana Dachman-Soled and Yael Tauman Kalai
How to Fake Auxiliary Input |
Dimitar Jetchev and Krzysztof Pietrzak
10:45–11:15 Coffee Break
11:15–12:05 Encryption (Chair: Amos Beimel)
Standard versus Selective Opening Security: Separation and Equivalence Results |
Dennis Hofheinz and Andy Rupp
Dual System Encryption via Predicate Encodings |
Hoeteck Wee
12:05–12:20 Short Break
12:20–13:20 Invited Talk II (Chair: Yehuda Lindell)
General Versus Specific Hardness Assumptions in Cryptography |
Russell Impagliazzo (UCSD)
13:20–15:20 Lunch (provided)
15:20–16:10 Hardware-Aided Secure Protocols (Chair: Mohammad Mahmoody)
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens |
Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou
Lower Bounds in the Hardware Token Model |
Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen
16:10–16:40 Coffee Break
16:40–17:30 Encryption and Signatures (Chair: Mohammad Mahmoody)
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures |
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
On The Impossibility of Structure-Preserving Deterministic Primitives |
Masayuki Abe and Jan Camenisch and Rafael Dowsley and Maria Dubovitskaya