EUROCRYPT 2017
30 April – 4 May 2017
Paris, France
EUROCRYPT 2017

Conference Program (also available in pdf A4, A5 or A6)

Sunday, April 30

18:30-21:00 Welcome reception at Campus Jussieu
4 place Jussieu
75005 Paris, France

Monday, May 1

Slot Track A Track B
8:50 - 8:55 Opening remarks
9:00-10:15
Lattice attacks and constructions 1
Chair: Leo Ducas
Obfuscation and functional encryption
Chair: Daniel Wichs
Revisiting Lattice Attacks on overstretched NTRU parameters Paul Kirchner, Pierre-Alain Fouque (slides) Robust transforming combiners from indistinguishability obfuscation to functional encryption Prabhanjan Ananth, Aayush Jain, Amit Sahai (slides)
Short generators without quantum computers: the case of multiquadratics Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal (slides) From Minicrypt to Obfustopia via Private-Key Functional Encryption Ilan Komargodski, Gil Segev (slides)
Computing generator in cyclotomic integer rings Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner (slides) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth, Amit Sahai (slides)
10:15-10:20 Track-switch break
10:20-11:20
Discrete logarithm
Chair: Robert Granger
Multiparty computation 1
Chair: Stefan Dziembowski
Computation of a 768-bit prime field discrete logarithm Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke (slides) Improved Private Set Intersection against Malicious Adversaries Peter Rindal, Mike Rosulek (slides)
A kilobit hidden SNFS discrete logarithm computation Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé (slides) Formal Abstractions for Attested Execution Secure Processors Rafael Pass, Elaine Shi, Florian Tramèr (slides)
11:10-11:40 Coffee break
11:40-12:40 Invited talk (Chair: Jean-Sebastien Coron)
Advances in computer-aided cryptography Gilles Barthe (IMDEA Software Institute, Spain) (slides)
12:40-14:15 Lunch
14:15-15:05
Lattice attacks and constructions 2
Chair: Nicolas Gama
Universal composability
Chair: Vlad Kolesnikov
One-Shot Verifiable Encryption from Lattices Vadim Lyubashevsky, Gregory Neven (slides) Concurrently composable security with shielded super-polynomial simulators Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel (slides)
Short Stickelberger Class Relations and application to Ideal-SVP Ronald Cramer, Léo Ducas, Benjamin Wesolowski (slides) Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti (slides)
15:05-15:10 Track-switch break
15:10-16:00
Lattice attacks and constructions 3
Chair: Nicolas Gama
Zero knowledge 1
Chair: Rafail Ostrovsky
Private Puncturable PRFs From Standard Lattice Assumptions Dan Boneh, Sam Kim, Hart Montgomery (slides) Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack Ronald Cramer, Ivan Damgård, Chaoping Xing, Chen Yuan (slides)
Constraint-hiding constrained PRFs for NC1 from LWE Ran Canetti, Yilei Chen (slides) Sublinear Zero-Knowledge Arguments for RAM Programs Payman Mohassel, Mike Rosulek, Alessandra Scafuro (slides)
16:00-16:30 Coffee break
16:30-17:20
Side-channel attacks and countermeasures
Chair: Jean-Sebastien Coron
Functional encryption 1
Chair: Nuttapong Attrapadung
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub (slides) Multi-Input Inner-Product Functional Encryption from Pairings Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee (slides)
How Fast Can Higher-Order Masking Be in Software? Dahmun Goudarzi, Matthieu Rivain (slides) Simplifying Design and Analysis of Complex Predicate Encryption Schemes Shashank Agrawal, Melissa Chase (slides)
17:20-17:25 Track-switch break
17:25-18:15
Elliptic curves
Chair: San Ling
Functional encryption 2
Chair: Eyal Kushilevitz
Twisted μ4-normal form for elliptic curves David Kohel (slides) On Removing Graded Encodings from Functional Encryption Nir Bitansky, Huijia Lin, Omer Paneth (slides)
Efficient compression of SIDH public keys Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik (slides) Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions Shashank Agrawal, David Wu (slides)

Tuesday, May 2

Slot Track A Track B
9:00-10:15
Lattice attacks and constructions 4
Chair: Leo Ducas
Multiparty computation 2
Chair: Abhi Shelat
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono, Phong Q. Nguyen (slides) Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation Elette Boyle, Niv Gilboa, Yuval Ishai
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL Martin R. Albrecht (slides) On the Exact Round Complexity of Self-Composable Two-Party Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey (slides)
Small CRT-Exponent RSA Revisited Atsushi Takayasu, Yao Lu, Liquiang Peng (slides) High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein (slides)
10:15-10:20 Track-switch break
10:20-11:10
Symmetric cryptanalysis 1
Chair: Maria Naya-Plasencia
Zero knowledge 2
Chair: Miyako Ohkubo
Conditional Cube Attack on Reduced-Round Keccak Sponge Function Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao Removing the Strong RSA Assumption from Arguments over the Integers Geoffroy Couteau, Thomas Peters, David Pointcheval (slides)
New Collision Attacks on Round-Reduced Keccak Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo (slides) Magic Adversaries Versus Individual Reduction: Science Wins Either Way Yi Deng (slides)
11:10-11:40 Coffee break
11:40-12:40 Invited talk (Chair: Jesper Buus Nielsen)
Living Between the Ideal and Real Worlds Nigel Smart (University of Bristol) (slides)
18:30- Rump session

Wednesday, May 3

Slot Track A Track B
9:00-9:50
Provable Security for Symmetric Cryptography 1
Chair: Eike Kiltz
Security models 1
Chair: Krzysztof Pietrzak
The Multi-User Security of Double Encryption Viet Tung Hoang, Stefano Tessaro (slides) Cryptography with Updates Prabhanjan Ananth, Aloni Cohen, Abhishek Jain (slides)
Public-Seed Pseudorandom Permutations Pratik Soni, Stefano Tessaro (slides) Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited Yevgeniy Dodis, Siyao Guo, Jonathan Katz (slides)
9:50-9:55 Track-switch break
9:55-10:45
Blockchain
Chair: Brent Waters
Security models 2
Chair: Krzysztof Pietrzak
Decentralized Anonymous Micropayments Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra (slides) Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions Mohammad Hajiabadi, Bruce M. Kapron (slides)
Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass, Lior Seeman, abhi shelat (slides) A Note on Perfect Correctness by Derandomization Nir Bitansky, Vinod Vaikuntanathan (slides)
10:45-11:15 Coffee break
11:15-12:05
Provable Security for Symmetric Cryptography 2
Chair: Aggelos Kiayias
Memory hard functions
Chair: Ilya Mironov
Modifying an Enciphering Scheme after Deployment Paul Grubbs, Thomas Ristenpart, Yuval Yarom (slides) Depth-Robust Graphs and Their Cumulative Memory Complexity Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak (slides)
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption Rishab Goyal, Venkata Koppula, Brent Waters (slides) Scrypt is Maximally Memory-Hard Best Paper Award
Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro (slides)
12:05-14:00 Lunch
14:00-14:50
Symmetric-key constructions
Chair: Daniel Wichs
Obfuscation 1
Chair: Nir Bitansky
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts Gorjan Alagic, Alexander Russell (slides) Patchable Indistinguishability Obfuscation: iO for Evolving Software Prabhanjan Ananth, Abhishek Jain, Amit Sahai (slides)
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity Seny Kamara, Tarik Moataz (slides) Breaking the Sub-Exponential Barrier in Obfustopia Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry (slides)
14:50-15:20 Coffee break
15:20-16:10
Symmetric cryptanalysis 2
Chair: Maria Naya-Plasencia
Obfuscation 2
Chair: Nir Bitansky
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects Yu Sasaki, Yosuke Todo (slides) Lattice-Based SNARGs and Their Application to More Efficient Obfuscation Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu (slides)
A New Structural-Differential Property of 5-Round AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom (slides) Cryptanalyses of Candidate Branching Program Obfuscators Yilei Chen, Craig Gentry, Shai Halevi (slides)
16:15-17:15 IACR Membership Meeting
19:00-00:00 Banquet at Pavillon Dauphine
Place du Maréchal de Lattre de Tassigny
75116 PARIS
DIRECTIONS

Thursday, May 4

Slot Track A Track B
9:00-10:15
Quantum cryptography
Chair: Fabrice Benhamouda
Multiparty computation 3
Chair: Jesper Buus Nielsen
Quantum Authentication and Encryption with Key Recycling Serge Fehr, Louis Salvail (slides) Faster Secure Two-Party Computation in the Single-Execution Setting Xiao Wang, Alex J. Malozemoff, Jonathan Katz
Quantum authentication with key recycling Christopher Portmann (slides) Non-Interactive Secure 2PC in the Offline/Online and Batch Settings Payman Mohassel, Mike Rosulek (slides)
Relativistic (or 2-prover 1-round) zero-knowledge protocol for NP secure against quantum adversaries André Chailloux, Anthony Leverrier Hashing Garbled Circuits for Free Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov (slides)
10:15-10:45 Coffee break
10:45-12:00
Public-key encryption and key-exchange
Chair: Fabrice Benhamouda
Multiparty computation 4
Chair: Jesper Buus Nielsen
Adaptive partitioning Dennis Hofheinz (slides) Computational integrity with a public random string from quasi-linear PCPs Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza (slides)
0-RTT Key Exchange with Full Forward Secrecy Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer (slides) Ad Hoc PSM Protocols: Secure Computation without Coordination Amos Beimel, Yuval Ishai, Eyal Kushilevitz (slides)
Topology-Hiding Computation Beyond Logarithmic Diameter Adi Akavia, Tal Moran (slides)