August 31 - September 2, 2016, Amalfi, Italy.

Program

Note: each regular talk has a slot of 25 minutes which includes the questions session at the end of the talk. Tuesday, August 30

19:00-20:30 Welcome cocktail and registration (Hotel La Bussola).

Wednesday, August 31

08:30-08:50 Registration
08:50-09:00 Opening Remarks

09:00-10:00 Session 1: Invited Talk

  • Foundations of Blockchain Protocols
    Aggelos Kiayias (University of Edinburgh, UK)

10:00-10:30 Coffee break

10:30-12:10 Session 2: Encryption (Chair: TBA)

  • Tag-Based Encoding: An Efficient Encoding for Predicate Encryptions in Prime-Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
  • Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys
    Jie Chen, BenoƮt Libert, Somindu C. Ramanna
  • Attribute-Based Encryption for Range Attributes
    Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
  • Naor-Yung Paradigm with Shared Randomness and Applications
    Silvio Biagioni, Daniel Masny, Daniele Venturi

12:10-15:00 Lunch break

10:30-12:10 Session 3: Memory Protection (Chair: TBA)

  • Provably-Secure Remote Memory Attestation for Heap Overflow Protection
    Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi
  • Memory Erasability Amplification
    Jan Camenisch, Robert R. Enderlein, Ueli Maurer

15:50-16:20 Coffee break

16:20-17:35 Session 4: Multi-Party Computation (Chair: TBA)

  • On Adaptively Secure Multiparty Computation with a Short CRS
    Ran Cohen, Chris Peikert
  • Linear Overhead Optimally-resilient Robust MPC Using Preprocessing
    Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
  • High-precision Secure Computation of Satellite Collision Probabilities
    B. Hemenway, S. Lu, R. Ostrovsky, W. Welser IV

Thursday, September 1

09:00-10:30 Session 5: Zero-Knowledge Proofs (Chair: TBA)

  • Zero Knowledge Made Easy, So It Won't Make You Dizzy (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce)
    Trotta Gnam
  • Fiat-Shamir for Highly Sound Protocols is Instantiable
    Arno Mittelbach, Daniele Venturi
  • Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees
    Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
  • On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
    Yi Deng, Juan Garay, San Ling, Huaxiong Wang and Moti Yung

10:30-11:00 Coffee break

11:00-12:15 Session 6: Efficient Protocols (Chair: TBA)

  • Improving Practical UC-Secure Commitments based on the DDH Assumption
    Eiichiro Fujisaki
  • The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs
    Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
  • Efficient Asynchronous Accumulators for Distributed PKI
    Leonid Reyzin, Sophia Yakoubov

12:15-15:00 Lunch break

15:00-15:50 Session 7: Outsourcing Computation (Chair: TBA)

  • The Feasibility of Outsourced Database Search in the Plain Model
    Carmit Hazay, Hila Zarosim
  • Verifiable Pattern Matching on Outsourced Texts
    Dario Catalano, Mario Di Raimondo, Simone Faro

15:50-16:20 Coffee break

16:20-17:35 Session 8: Digital Signatures (Chair: TBA)

  • Virtual Smart Cards: How to Sign with a Password and a Server
    Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
  • Signatures Resilient to Uninvertible Leakage
    Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
  • Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
    Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig

18:00-20:00 Social event: a guided tour of Amalfi

20:30-23:00 Social dinner

Friday, September 2

09:00-10:00 Session 9: Invited Talk

  • Cryptography and Game Theory
    Rafael Pass
10:00-10:50 Session 10: Cryptanalysis (Chair: TBA)
  • How (Not) to Instantiate Ring-LWE
    Chris Peikert
  • Pen and Paper Arguments for SIMON and SIMON-like Designs
    Christof Beierle

10:50-11:20 Coffee break

11:20-12:35 Session 11: Two-Party Computation (Chair: TBA)

  • Bounded Size-Hiding Private Set Intersection
    Tatiana Bradley, Sky Faber, Gene Tsudik
  • On Garbling Schemes with and without Privacy
    Carsten Baum
  • What Security Can We Achieve In Less Than 4-Rounds?
    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

12:35-15:00 Lunch break

15:00-15:50 Session 12: Secret Sharing (Chair: TBA)

  • Secret Sharing Schemes for Dense Forbidden Graphs
    Amos Beimel, Oriol Farr, Naty Peter
  • Proactive Secret Sharing with a Dishonest Majority
    Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung

15:50-17:35 Coffee break

15:00-15:50 Session 13: Obfuscation (Chair: TBA)

  • Shorter Circuit Obfuscation in Challenging Security Models
    Zvika Brakerski, Or Dagmi
  • Bounded KDM Security from iO and OWF
    Antonio Marcedone, Rafael Pass, abhi shelat
  • A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
    Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou

17:35-17:45 Closing remarks