September 5-7, 2012, Amalfi, Italy.

Program (definitive)

Note: The length of each regular talk is 20 minutes. Tuesday, September 4

19:00-20:30 Welcome cocktail and registration (Sala IBSEN).

Wednesday, September 5

08:30-09:00 Registration
09:00-09:10 Opening Remarks

09:10-10:40 Session I: Cryptography from Lattices (Chair: Yvo Desmedt)

  • Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting (Best Paper Award)
    Xiang Xie (Chinese Academy of Sciences, China), Rui Xue (Chinese Academy of Sciences, China), and Rui Zhang (Chinese Academy of Sciences, China)
  • Ring Switching in BGV-Style Homomorphic Encryption
    Craig Gentry (IBM Research, USA), Shai Halevi (IBM Research, USA), Chris Peikert (Georgia Institute of Technology, USA) and Nigel P. Smart (University of Bristol, UK)
  • Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
    Ivan Damgård (Aarhus University, Denmark) and Adriana López-Alt (NYU, USA)
  • Fully Anonymous Attribute Tokens from Lattices
    Jan Camenisch (IBM Research Zurich, Switzerland), Gregory Neven (IBM Research Zurich, Switzerland) and Markus Rückert
10:40-11:20 Coffee break


11:20-12:20 Session II: Invited Talk (Chair: Ivan Visconti)

  • Functional Encryption: Games and Simulation
    Giuseppe Persiano (Università di Salerno, Italy)
12:20-14:20 Lunch break


14:20-15:50 Session III: Signature Schemes(Chair: Vladimir Kolesnikov)

  • Efficient Structure-Preserving Signature Scheme from Standard Assumptions
    Jan Camenisch (IBM Research Zurich, Switzerland), Maria Dubovitskaya (IBM Research Zurich/ETHZ, Switzerland) and Kristiyan Haralambiev (IBM Research Zurich, Switzerland)
  • Compact Round-Optimal Partially-Blind Signatures
    Olivier Blazy (ENS Paris, France), David Pointcheval (ENS Paris, France ) and Damien Vergnaud (ENS Paris, France )
  • History-Free Sequential Aggregate Signatures
    Marc Fischlin (TU Darmstadt, Germany), Anja Lehmann (IBM Research Zurich, Switzerland) and Dominique Schröder (University of Maryland, USA)
  • A New Hash and Sign Approach and Structure-Preserving Signatures from DLIN
    Melissa Chase (Microsoft Research, USA) and Markulf Kohlweiss (Microsoft Research, USA)
15:50-16:30 Coffee break


16:30-17:40 Session IV: Encryption Schemes I(Chair: Helger Lipmaa)

  • Blackbox Construction of A More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness
    Steven Myers (Indiana University, USA), Mona Sergi (University of Virginia, USA) and abhi shelat (University of Virginia, USA)
  • Decentralized Dynamic Broadcast Encryption
    Duong Hieu Phan (University of Paris 8/ENS/CNRS/INRIA, France), David Pointcheval (ENS/CNRS/INRIA, France) and Mario Strefler (ENS/CNRS/INRIA, France)
  • Time-Specific Encryption from Forward-Secure Encryption
    Kouhei Kasamatsu (Chuo University, Japan), Takahiro Matsuda (AIST, Japan), Keita Emura (NICT, Japan), Nuttapong Attrapadung (AIST, Japan), Goichiro Hanaoka (AIST, Japan) and Hideki Imai (Chuo University, Japan)
Thursday, September 6

09:00-10:10 Session V: Efficient Two-Party and Multi-Party Computation(Chair: Paolo D'Arco)

  • Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits
    Vladimir Kolesnikov (Bell Labs, USA) and Ranjit Kumaresan (University of Maryland, USA)
  • 5PM: Secure Pattern Matching
    Joshua Baron (UCLA, USA), Karim El Defrawy (HRL Laboratories, USA), Kirill Minkovich (HRL Laboratories, USA), Rafail Ostrovsky (UCLA, USA) and Eric Tressler (HRL Laboratories USA)
  • Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
    Ivan Damgård (Aarhus University, Denmark), Marcel Keller (University of Bristol, UK), Enrique Larraia (University of Bristol, UK), Christian Miles (University of Bristol, UK) and Nigel P. Smart (University of Bristol, UK)

10:10-10:55 Session VI: Security in the UC Framework(Chair: Melissa Chase)

  • On The Centrality of Off-Line E-Cash to Concrete Partial Information Games
    Seung Geol Choi (University of Maryland, USA), Dana Dachman-Soled (Microsoft Research New England, USA) and Moti Yung (Google & Columbia University, USA)
  • Universally Composable Security With Local Adversaries
    Ran Canetti (Boston University, USA) and Margarita Vald (Tel Aviv University, Israel)
10:55-11:35 Coffee break


11:35-12:35 Session VII: Invited Talk(Chair: Ivan Visconti)

  • The Complexity of Cryptography
    Yuval Ishai (Technion, Israel)
12:35-14:20 Lunch break


14:20-15:50 Session VIII: Cryptanalysis(Chair: Nigel Smart)

  • On the Strength Comparison of the ECDLP and the IFP
    Masaya Yasuda (Fujitsu Laboratories LTD., Japan), Takeshi Shimoyama (Fujitsu Laboratories LTD., Japan), Jun Kogure (Fujitsu Laboratories LTD., Japan) and Tetsuya Izu (Fujitsu Laboratories LTD., Japan)
  • New Attacks for Knapsack Based Cryptosystems
    Gottfried Herold (Ruhr-University Bochum, Germany) and Alexander Meurer (Ruhr-University Bochum, Germany)
  • Multiple Differential Cryptanalysis using LLR and Χ2 Statistics
    Céline Blondeau (Aalto University School of Science, Finland), Benoît Gérard (Universitè catholique de Louvain, Belgium) and Kaisa Nyberg (Aalto University School of Science, Finland)
  • Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
    Enrico Thomae (Ruhr-University of Bochum, Germany)
15:50-16:30 Coffee break


16:30-17:40 Session IX: Encryption Schemes II(Chair: Gregory Neven)

  • Homomorphic Encryption for Multiplications and Pairing Evaluation
    Guilhem Castagnos (Université of Bordeaux 1/CNRS, France), Fabien Laguillaumie (Université de Caen Basse-Normandie/CNRS/ENSL/INRIA/UCBL LIP, France)
  • Publicly Verifiable Ciphertexts
    Juan Manuel Gonzàlez Nieto (Queensland University of Technology, Australia), Mark Manulis (University of Surrey, UK), Bertram Poettering (Royal Holloway University of London, UK), Jothi Rangasamy (Queensland University of Technology, Australia) and Douglas Stebila (Queensland University of Technology, Australia)
  • Public-Key Encryption with Lazy Parties
    Kenji Yasunaga (ISIT, Japan)
18:30 Social Event: A guided tour of Amalfi
20:30 Social Dinner

Friday, September 7

09:00-10:30 Session X: Efficient Constructions(Chair: Markulf Kohlweiss)

  • Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
    Ching-Hua Yu (National Taiwan University, Taiwan) and Bo-Yin Yang (Academia Sinica, Taiwan)
  • MAC Aggregation with Message Multiplicity
    Vladimir Kolesnikov (Bell Labs, USA)
  • Efficiency Limitations of Σ-protocols for Group Homomorphisms Revisited
    Björn Terelius (KTH Royal Institute of Technology, Sweden) and Douglas Wikström (KTH Royal Institute of Technology, Sweden)
  • A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
    Helger Lipmaa (University of Tartu, Estonia) and Bingsheng Zhang (State University of New York at Buffalo, USA)
10:30-11:10 Coffee break


11:10-12:40 Session XI: Protocols and Combiners(Chair: Mark Manulis)

  • Active Security in Multiparty Computation over Black-Box Groups
    Yvo Desmedt (UCL, UK), Josef Piperzyk (Macquarie University, Australia) and Ron Steinfeld (Monash University, Australia)
  • Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
    Arno Mittelbach (Darmstadt University of Technology & CASED, Germany)
  • Human Perfectly Secure Message Transmission Protocols and their Applications
    Stelios Erotokritou (UCL, UK and The Cyprus Institute, Cyprus) and Yvo Desmedt (UCL, UK)
  • Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
    Jan Camenisch (IBM Research Zurich, Switzerland), Robert R. Enderlein (IBM Research Zurich/ETHZ, Switzerland), Maria Dubovitskaya (IBM Research Zurich/ETHZ, Switzerland) and Gregory Neven (IBM Research Zurich, Switzerland)

12:40-12:45 Farewell