Program
19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).
Wednesday, August 31
08:30-08:50 Registration
08:50-09:00 Opening Remarks
09:00-10:00 Session 1: Invited Talk
-
Foundations of Blockchain Protocols
Aggelos Kiayias (University of Edinburgh, UK)
10:00-10:30 Coffee break
10:30-12:10 Session 2: Encryption (Chair: TBA)
- Tag-Based Encoding: An Efficient Encoding for Predicate Encryptions in Prime-Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
-
Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys
Jie Chen, BenoƮt Libert, Somindu C. Ramanna -
Attribute-Based Encryption for Range Attributes
Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada -
Naor-Yung Paradigm with Shared Randomness and Applications
Silvio Biagioni, Daniel Masny, Daniele Venturi
12:10-15:00 Lunch break
15:00-15:50 Session 3: Memory Protection (Chair: TBA)
-
Provably-Secure Remote Memory Attestation for Heap Overflow Protection
Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi -
Memory Erasability Amplification
Jan Camenisch, Robert R. Enderlein, Ueli Maurer
15:50-16:20 Coffee break
16:20-17:35 Session 4: Multi-Party Computation (Chair: TBA)
-
On Adaptively Secure Multiparty Computation with a Short CRS
Ran Cohen, Chris Peikert -
Linear Overhead Optimally-resilient Robust MPC Using Preprocessing
Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart -
High-precision Secure Computation of Satellite Collision Probabilities
B. Hemenway, S. Lu, R. Ostrovsky, W. Welser IV
Thursday, September 1
09:00-10:30 Session 5: Zero-Knowledge Proofs (Chair: TBA)
-
Zero Knowledge Made Easy, So It Won't Make You Dizzy (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce)
Trotta Gnam -
Fiat-Shamir for Highly Sound Protocols is Instantiable
Arno Mittelbach, Daniele Venturi -
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees
Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia -
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng, Juan Garay, San Ling, Huaxiong Wang and Moti Yung
10:30-11:00 Coffee break
11:00-12:15 Session 6: Efficient Protocols (Chair: TBA)
-
Improving Practical UC-Secure Commitments based on the DDH Assumption
Eiichiro Fujisaki -
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval -
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin, Sophia Yakoubov
12:15-15:00 Lunch break
15:00-15:50 Session 7: Outsourcing Computation (Chair: TBA)
-
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay, Hila Zarosim -
Verifiable Pattern Matching on Outsourced Texts
Dario Catalano, Mario Di Raimondo, Simone Faro
15:50-16:20 Coffee break
16:20-17:35 Session 8: Digital Signatures (Chair: TBA)
-
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin -
Signatures Resilient to Uninvertible Leakage
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka -
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
18:00-20:00 Social event: a guided tour of Amalfi
20:30-23:00 Social dinner
Friday, September 2
09:00-10:00 Session 9: Invited Talk
-
Cryptography and Game Theory
Rafael Pass (Cornell University)
-
How (Not) to Instantiate Ring-LWE
Chris Peikert -
Pen and Paper Arguments for SIMON and SIMON-like Designs
Christof Beierle
10:50-11:20 Coffee break
11:20-12:35 Session 11: Two-Party Computation (Chair: TBA)
-
Bounded Size-Hiding Private Set Intersection
Tatiana Bradley, Sky Faber, Gene Tsudik -
On Garbling Schemes with and without Privacy
Carsten Baum -
What Security Can We Achieve In Less Than 4-Rounds?
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
12:35-15:00 Lunch break
15:00-15:50 Session 12: Secret Sharing (Chair: TBA)
-
Secret Sharing Schemes for Dense Forbidden Graphs
Amos Beimel, Oriol Farr, Naty Peter -
Proactive Secret Sharing with a Dishonest Majority
Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung
15:50-16:20 Coffee break
16:20-17:35 Session 13: Obfuscation (Chair: TBA)
-
Shorter Circuit Obfuscation in Challenging Security Models
Zvika Brakerski, Or Dagmi -
Bounded KDM Security from iO and OWF
Antonio Marcedone, Rafael Pass, abhi shelat -
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
17:35-17:45 Closing remarks