CRYPTO 2014:
Rosario Gennaro and Juan A. Garay (Eds.):
Advances in Cryptology - CRYPTO 2014
34th Annual Cryptology Conference
Santa Barbara, CA, USA,
August 17-21, 2014, Proceedings
Proceedings.
CRYPTO 2014, Vol1
CRYPTO 2014, Vol2
Organizational Committee
Program Chairs : | Rosario Gennaro and Juan A. Garay | |
General Chair : | Alexandra Boldyreva |
Program Committee
Gilles Van Assche |
Ran Canetti |
Yevgeniy Dodis |
Orr Dunkelman |
Serge Fehr |
Pierre-Alain Fouque |
Craig Gentry |
Vipul Goyal |
Nadia Heninger |
Thomas Holenstein |
Yuval Ishai |
Dimitar Jetchev |
Aggelos Kiayias |
Kaoru Kurosawa |
Alexander May |
Jörn Müller-Quade |
Ilya Mironov |
Payman Mohassel |
María Naya-Plasencia |
Claudio Orlandi |
Rafael Pass |
Chris Peikert |
Krzysztof Pietrzak |
Leonid Reyzin |
Ronald L. Rivest |
Amit Sahai |
Gil Segev |
Elaine Shi |
Thomas Shrimpton |
Alice Silverberg |
Marc Stevens |
Katsuyuki Takashima |
Stefano Tessaro |
Vinod Vaikuntanathan |
Muthuramakrishnan Venkitasubramaniam |
Ivan Visconti |
Bogdan Warinschi |
Brent Waters |
Vassilis Zikas |
External Referees
-
Session 1: Symmetric Encryption and PRFs
-
Security of Symmetric Encryption against Mass Surveillance
, 1-19,
Mihir Bellare
,
Kenneth G. Paterson
,
Phillip Rogaway
bib info , video -
The Security of Multiple Encryption in the Ideal Cipher Model
, 20-38,
John P. Steinberger
,
Jooyoung Lee
,
Bart Mennink
,
Yuanxi Dai
bib info , video -
Minimizing the Two-Round Even-Mansour Cipher
, 39-56,
Yannick Seurin
,
John P. Steinberger
,
Jooyoung Lee
,
Rodolphe Lampe
,
Shan Chen
bib info , video -
Block Ciphers - Focus on the Linear Layer (feat. PRIDE)
, 57-76,
Gregor Leander
,
Christof Paar
,
Martin R. Albrecht
,
Elif Bilge Kavun
,
Tolga Yalçin
,
Benedikt Driessen
bib info , video -
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
, 77-94,
Michel Abdalla
,
Kenneth G. Paterson
,
Fabrice Benhamouda
,
Alain Passelègue
bib info , video
-
Security of Symmetric Encryption against Mass Surveillance
, 1-19,
Mihir Bellare
,
Kenneth G. Paterson
,
Phillip Rogaway
- Formal Methods
-
Hash Functions
-
The Exact PRF-Security of NMAC and HMAC
, 113-130,
Krzysztof Pietrzak
,
Peter Gazi
,
Michal Rybár
bib info , video -
Updates on Generic Attacks against HMAC and NMAC
, 131-148,
Thomas Peyrin
,
Yu Sasaki
,
Lei Wang
,
Jian Guo
bib info , video -
Improved Generic Attacks against Hash-Based MACs and HAIFA
, 149-168,
Gaëtan Leurent
,
Itai Dinur
bib info , video -
Cryptography from Compression Functions: The UCE Bridge to the ROM
, 169-187,
Mihir Bellare
,
Viet Tung Hoang
,
Sriram Keelveedhi
bib info , video -
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
, 188-205,
Pooya Farshim
,
Christina Brzuska
,
Arno Mittelbach
bib info , video
-
The Exact PRF-Security of NMAC and HMAC
, 113-130,
Krzysztof Pietrzak
,
Peter Gazi
,
Michal Rybár
-
Groups and Maps
-
Low Overhead Broadcast Encryption from Multilinear Maps
, 206-223,
Dan Boneh
,
Brent Waters
,
Mark Zhandry
bib info , video -
Security Analysis of Multilinear Maps over the Integers
, 224-240,
Jae Hong Seo
,
Hyung Tae Lee
bib info , video -
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups
, 241-260,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
,
Takeya Tango
bib info , video -
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
, 261-279,
Andy Rupp
,
Dennis Hofheinz
,
Carla Ràfols
,
Gottfried Herold
,
Julia Hesse
bib info , video
-
Low Overhead Broadcast Encryption from Multilinear Maps
, 206-223,
Dan Boneh
,
Brent Waters
,
Mark Zhandry
-
Lattices
-
Revisiting the Gentry-Szydlo Algorithm
, 280-296,
H. W. Lenstra
,
A. Silverberg
bib info -
Faster Bootstrapping with Polynomial Error
, 297-314,
Chris Peikert
,
Jacob Alperin-Sheriff
bib info , video -
Hardness of k-LWE and Applications in Traitor Tracing
, 315-334,
Duong Hieu Phan
,
Ron Steinfeld
,
Damien Stehlé
,
San Ling
bib info , video -
Improved Short Lattice Signatures in the Standard Model
, 335-352,
Daniele Micciancio
,
Léo Ducas
bib info , video -
New and Improved Key-Homomorphic Pseudorandom Functions
, 353-370,
Chris Peikert
,
Abhishek Banerjee
bib ippnfo , video
-
Revisiting the Gentry-Szydlo Algorithm
, 280-296,
H. W. Lenstra
,
A. Silverberg
-
Asymmetric Encryption and Signatures
-
Homomorphic Signatures with Efficient Verification for Polynomial Functions
, 371-389,
Dario Catalano
,
Bogdan Warinschi
,
Dario Fiore
bib info , video -
Structure-Preserving Signatures from Type II Pairings
, 390-407,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
,
Mehdi Tibouchi
bib info , video -
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
, 408-425,
Eike Kiltz
,
Olivier Blazy
,
Jiaxin Pan
bib info , video -
Witness Encryption from Instance Independent Assumptions
, 426-443,
Craig Gentry
,
Brent Waters
,
Allison B. Lewko
bib info
-
Homomorphic Signatures with Efficient Verification for Polynomial Functions
, 371-389,
Dario Catalano
,
Bogdan Warinschi
,
Dario Fiore
- Side Channels and Leakage Resilience I
-
Obfuscation I
-
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
, 480-499,
Dan Boneh
,
Mark Zhandry
bib info , video -
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
, 500-517,
Rafael Pass
,
Sidharth Telang
,
Karn Seth
bib info , video -
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
, 518-535,
Shai Halevi
,
Craig Gentry
,
Daniel Wichs
,
Sanjam Garg
bib info , video
-
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
, 480-499,
Dan Boneh
,
Mark Zhandry
-
FHE
-
Maliciously Circuit-Private FHE
, 536-553,
Rafail Ostrovsky
,
Anat Paskin-Cherniavsky
,
Beni Paskin-Cherniavsky
bib info , video -
Algorithms in HElib
, 554-571,
Shai Halevi
,
Victor Shoup
bib info , video
-
Maliciously Circuit-Private FHE
, 536-553,
Rafail Ostrovsky
,
Anat Paskin-Cherniavsky
,
Beni Paskin-Cherniavsky
- Quantum Cryptography
- Foundations of Hardness
-
Obfuscation II
-
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
, 71-89,
Ran Canetti
,
Shafi Goldwasser
,
Alon Rosen
,
Yael Tauman Kalai
,
Nir Bitansky
,
Omer Paneth
,
Henry Cohn
bib info , video -
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
, 90-107,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Takashi Yamakawa
,
Shota Yamada
bib info , video -
On Virtual Grey Box Obfuscation for General Circuits
, 108-125,
Ran Canetti
,
Yael Tauman Kalai
,
Nir Bitansky
,
Omer Paneth
bib info , video
-
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
, 71-89,
Ran Canetti
,
Shafi Goldwasser
,
Alon Rosen
,
Yael Tauman Kalai
,
Nir Bitansky
,
Omer Paneth
,
Henry Cohn
- Number-Theoretic Hardness
- Side Channels and Leakage Resilience II
-
Information-Theoretic Security
-
Amplifying Privacy in Privacy Amplification
, 183-198,
Leonid Reyzin
,
Yevgeniy Dodis
,
Divesh Aggarwal
,
Eric Miles
,
Zahra Jafargholi
bib info , video -
On the Communication Complexity of Secure Computation
, 199-216,
Manoj Prabhakaran
,
Deepesh Data
,
Vinod M. Prabhakaran
bib info -
Optimal Non-perfect Uniform Secret Sharing Schemes
, 217-234,
Oriol Farràs
,
Torben Hansen
,
Tarik Kaced
,
Carles Padró
bib info , video
-
Amplifying Privacy in Privacy Amplification
, 183-198,
Leonid Reyzin
,
Yevgeniy Dodis
,
Divesh Aggarwal
,
Eric Miles
,
Zahra Jafargholi
-
Key Exchange and Secure Communication
-
Proving the TLS Handshake Secure (As It Is)
, 235-255,
Markulf Kohlweiss
,
Karthikeyan Bhargavan
,
Cédric Fournet
,
Alfredo Pironti
,
Pierre-Yves Strub
,
Santiago Zanella Béguelin
bib info , video -
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment
, 256-275,
Jan Camenisch
,
Gregory Neven
,
Anna Lysyanskaya
,
Anja Lehmann
bib info , video
-
Proving the TLS Handshake Secure (As It Is)
, 235-255,
Markulf Kohlweiss
,
Karthikeyan Bhargavan
,
Cédric Fournet
,
Alfredo Pironti
,
Pierre-Yves Strub
,
Santiago Zanella Béguelin
-
Zero Knowledge
-
Scalable Zero Knowledge via Cycles of Elliptic Curves
, 276-294,
Eran Tromer
,
Alessandro Chiesa
,
Eli Ben-Sasson
,
Madars Virza
bib info -
Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces
, 295-312,
Charanjit S. Jutla
,
Arnab Roy
bib info -
Physical Zero-Knowledge Proofs of Physical Properties
, 313-336,
Moni Naor
,
Ben Fisch
,
Daniel Freund
bib info , video
-
Scalable Zero Knowledge via Cycles of Elliptic Curves
, 276-294,
Eran Tromer
,
Alessandro Chiesa
,
Eli Ben-Sasson
,
Madars Virza
- Composable Security
-
Secure Computation -- Foundations
-
Secure Multi-Party Computation with Identifiable Abort
, 369-386,
Rafail Ostrovsky
,
Yuval Ishai
,
Vassilis Zikas
bib info , video -
Non-Interactive Secure Multiparty Computation
, 387-404,
Eyal Kushilevitz
,
Yuval Ishai
,
Amos Beimel
,
Sigurd Meldgaard
,
Anat Paskin-Cherniavsky
,
Ariel Gabizon
bib info , video -
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
, 405-420,
Jonathan Katz
,
Anna Lysyanskaya
,
Dana Dachman-Soled
,
Dominique Schröder
,
Nils Fleischhacker
bib info -
How to Use Bitcoin to Design Fair Protocols
, 421-439,
Ranjit Kumaresan
,
Iddo Bentov
bib info , video
-
Secure Multi-Party Computation with Identifiable Abort
, 369-386,
Rafail Ostrovsky
,
Yuval Ishai
,
Vassilis Zikas
-
Secure Computation -- Implementations
-
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR
, 440-457,
Vladimir Kolesnikov
,
Payman Mohassel
,
Mike Rosulek
bib info , video -
Amortizing Garbled Circuits
, 458-475,
Vladimir Kolesnikov
,
Jonathan Katz
,
Ranjit Kumaresan
,
Yan Huang
,
Alex J. Malozemoff
bib info -
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
, 476-494,
Yehuda Lindell
,
Ben Riva
bib info -
Dishonest Majority Multi-Party Computation for Binary Circuits
, 495-512,
Nigel P. Smart
,
Emmanuela Orsini
,
Enrique Larraia
bib info , video -
Efficient Three-Party Computation from Cut-and-Choose
, 513-530,
Jonathan Katz
,
Seung Geol Choi
,
Vassilis Zikas
,
Alex J. Malozemoff
bib info
-
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR
, 440-457,
Vladimir Kolesnikov
,
Payman Mohassel
,
Mike Rosulek