September 5-7, 2018, Amalfi, Italy.


Note: each regular talk has a slot of 25 minutes which includes the questions session at the end of the talk. Tuesday, September 4

19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).

Wednesday, September 5

08:30-08:50 Registration
08:50-09:00 Opening Remarks

09:00-10:00 Session 1: Invited Talk (Chair: D. Catalano)

  • On The Foundations of Program Obfuscation
    Huijia (Rachel) Lin, University of Santa Barbara, CA, USA

10:00-10:30 Coffee break

10:30-12:10 Session 2: Signatures and Watermarking (Chair: I. Visconti)

  • Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
    M. Abe, M. Ambrona, M. Ohkubo, M. Tibouchi (NTT, Japan - IMDEA, Spain - NICT, Japan)
  • Fully Anonymous Group Signature with Verifier-Local Revocation
    A. Ishida, Y. Sakai, K. Emura, G. Hanaoka, K. Tanaka (AIST, Japan - NICT, Japan - Tokyo Inst. of Techn., Japan)
  • Matrioska: A Compiler for Multi-Key Homomorphic Signatures
    D. Fiore, E. Pagnin (IMDEA, Spain - Chalmers U., Sweden)
  • Unforgeable Watermarking Schemes with Public Extraction
    R. Yang, M.H. Au, J. Lai, Q. Xu, Z. Yu (Shandong U., China - Hong Kong Pol. U. - Jinan U., China)

12:10-15:00 Lunch break

15:00-15:50 Session 3: Composability (Chair: M. Abe)

  • Security Definitions For Hash Functions: Combining UCE and Indierentiabili
    D. Jost, U. Maurer (ETH Zurich, Switzerland)
  • A Constructive Perspective on Signcryption Security
    C. Badertscher, F. Banfi, U. Maurer (ETH Zurich, Switzerland)

15:50-16:20 Coffee break

16:20-17:35 Session 4: Encryption I (Chair: D. Fiore)

  • Function-Revealing Encryption
    M. Joye, A. Passelègue (NXP, USA - UCLA, USA)
  • Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
    K. Hara, F. Kitagawa, T. Matsuda, G. Hanaoka, K. Tanaka (Tokyo Inst. of Techn., Japan - AIST, Japan)
  • Lizard: Cut off the Tail! A Practical Post-Quantum Public-Key Encryption from LWE and LWR
    J.H. Cheon, D. Kim, J. Lee, Y. Song (Seoul national U., Korea - UCSD, USA)

Thursday, September 6

09:00-10:40 Session 5: Multiparty Computation (Chair: A. Passalegue)

  • Reducing Communication Channels in MPC
    M. Keller, D. Rotaru, N.P. Smart, T. Wood (U. Bristol, UK - KU Leuven, Belgium)
  • Proactive Secure Multiparty Computation with a Dishonest Majority
    K. Eldefrawy, R. Ostrovsky, S. Park, M. Yung (SRI, US - UCLA, USA - MIT, USA - Columbia U., USA)
  • From Fairness to Full Security in Multiparty Computation
    R. Cohen, I. Haitner, E. Omri, L. Rotem (MIT, USA - Northeastern U., USA - Ariel U., Israel - Hebrew U., Israel)
  • Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters
    R. Inbar, E. Omri, B. Pinkas (Ariel U., Israel - Bar-Ilan U., Israel)

10:40-11:10 Coffee break

11:10-12:25 Session 6: Anonimity and Zero Knowledge (Chair: A. Kiayias)

  • Semantically Secure Anonymity: Foundations of Re-Encryption
    A.L. Young, M. Yung (Cryptovirology Labs, USA - Columbia U., USA)
  • Securing Abe's Mix-net Against Malicious Veriers via Witness Indistinguishability
    E. Boyle, S. Klein, A. Rosen, G. Segev (IDC Herzliya, Israel - MIT, USA - Hebrew U., Israel)
  • Zero-Knowledge Protocols for Search Problems
    B. Berger, Z. Brakerski (Weizmann, Israel)

12:25-15:00 Lunch break

15:00-15:50 Session 7: Secret Sharing and Oblivious Transfer (Chair: E. Boyle)

  • Evolving Ramp Secret-Sharing Schemes
    A. Beimel, H. Othman (Ben Gurion U., Israel)
  • Actively Secure OT-Extension from q-ary Linear Codes
    I. Cascudo, R.B. Christensen, J. S. Gundersen (Aalborg University, Denmark)

15:50-16:20 Coffee break

16:20-17:35 Session 8: Lattices and Post Quantum Cryptography (Chair: Z. Brakerski)

  • Estimate all the {LWE, NTRU} schemes!
    M.R. Albrecht, B.R. Curtis, A. Deo, A. Davidson, R. Player, E.W. Postlethwaite, F. Virdia, T. Wunderer (U. London, UK - Sorbonne U., France - U. Darmstadt, Germany)
  • More Effcient Commitments from Structured Lattice Assumptions
    C. Baum, I. Damgård, V. Lyubashevsky, S. Oechsner, C. Peikert (Bar-Ilan U., Isarel - Aarhus U., Denmark - IBM Zurich, Switzerland - U. Michigan, USA)
  • Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
    A. Hosoyamada, Y. Sasaki (NTT, Japan)

18:00-20:00 Social event: a guided tour of Amalfi

20:30-23:00 Social dinner

Friday, September 7

09:00-10:00 Session 9: Invited Talk (Chair: D. Catalano)

  • Active Security in a Post-Quantum Setting
    Eike Kiltz (Ruhr-Universitat, Bochum, Germany)

10:00-10:30 Coffee break

10:30-11:20 Session 10: Obfuscation (Chair: L. Siniscalchi)

  • Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
    Y. Kang, C. Lin, T. Malkin, M. Raykova (Columbia U., USA)
  • Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
    Z. Brakerski, A. Jain, I. Komargodski, A. Passelègue, D. Wichs (Weizman, Israel - UCLA, USA - Cornell, USA - Northeastern U., USA)
11:20-12:10 Session 11: Two-party Computation (Chair: C. Blundo)
  • Secure Two-Party Computation over Unreliable Channels
    R. Gelles, A. Paskin-Cherniavsky, V. Zikas (Bar-Ilan U., Israel - Ariel U., Israel - U. of Edinburgh, UK)
  • Combining Private Set-Intersection with Secure Two-Party Computation
    M. Ciampi, C. Orlandi (U. of Edinburgh, UK - Aarhus University, Denmark)

12:10-15:00 Lunch break

15:00-15:50 Session 12: Protocols (Chair: M. Ciampi)

  • Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange
    J.Y. Hwang, S. Jarecki, T. Kwon, J. Lee, J.S. Shin, J. Xu (ETRI, Korea -U. California Irvine, USA - Yonsei U., Korea - Seoul U., Korea - Sejong U., Korea)
  • On the Security Properties of e-Voting Bulletin Boards
    A. Kiayias, A. Kuldmaa, H. Lipmaa, J. Siim, T. Zacharias (U. of Edinburgh, UK - U. of Tartu, Estonia - CEIV, Estonia - STACC, Estonia)

15:50-16:20 Coffee break

16:20-17:35 Session 13: Encryption II (Chair: G. Persiano)

  • Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
    R. Gay, L. Kowalczyk, H. Wee (ENS, France - Columbia U., USA - CNRS, France)
  • Function-Hiding Inner Product Encryption is Practical
    S. Kim, K. Lewi, A. Mandal, H. Montgomery, A. Roy, D.J. Wu (Stanford U., USA - Facebook, USA - Fujitsu Labs, USA)
  • Compact IBBE and Fuzzy IBE from Simple Assumptions
    J. Gong, B. Libert, S.C. Ramanna (ENS, Lyon, France - CNRS, France - Indian Inst. of Techn., Kharagpur, India)

17:35-17:45 Closing remarks