Preliminary Program
Notice that technical programs, reception, and banquet will be held in different places! See the venue page or the guidebook for more information.
February 26
17:00 Opening
17:00–20:00 Registration (at Nara National Museum)
You can visit Buddhist Sculpture Hall in Nara National Museum (reserved by PKC) until 18:00.
18:00–20:00 Reception (Restaurant “葉風泰夢 (Half-Time)” located in Nara National Museum)
Notice the registration desk is still open during the reception.
February 27
8:40– Registration (at the Nara Prefectural New Public Hall)
In Feb. 27th–Mar. 1st, the registration desk is in Nara Prefectural New Public Hall. Do not go to Nara National Museum!
9:10–9:25 Opening
9:25–10:40 Encryption (Session Chair: Masayuki Abe)
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
- Takahiro Matsuda (AIST, Japan)
- Goichiro Hanaoka (AIST, Japan)
- Robust Encryption, Revisited
- Pooya Farshim (Darmstadt University of Technology, Germany)
- Benoit Libert (Technicolor, France)
- Kenneth G. Paterson (Royal Holloway, University of London, UK)
- Elizabeth A. Quaglia (ENS, France)
- Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Zhengan Huang (Shanghai Jiao Tong University, China)
- Shengli Liu (Shanghai Jiao Tong University, China)
- Baodong Qin (Shanghai Jiao Tong University, China and Southwest University of Science and Technology, China)
10:40–11:00 Coffee Break
11:00–12:00 Invited Talk (Session Chair: Tatsuaki Okamoto)
- Functional Encryption: Origins and Recent Developments
- Brent Waters (University of Texas at Austin, USA)
12:00–14:00 Lunch (Yume-Kaze Plaza)
14:00–15:40 Primitives (Session Chair: Claudio Orlandi)
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption (#1)
- Jonathan Katz (University of Maryland, USA)
- Aishwarya Thiruvengadam (University of Maryland, USA)
- Hong-Sheng Zhou (University of Maryland, USA)
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
- Seung Geol Choi (Columbia University)
- Jonathan Katz (University of Maryland)
- Hoeteck Wee (George Washington University)
- Hong-Sheng Zhou (University of Maryland)
- Cryptography Using CAPTCHA Puzzles
- Abishek Kumarasubramanian (UCLA, USA)
- Rafail Ostrovsky (UCLA, USA)
- Omkant Pandey (The University of Texas at Austin, USA)
- Akshay Wadia (UCLA, USA)
- Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
- San Ling (Nanyang Technological University, Singapore)
- Khoa Nguyen (Nanyang Technological University, Singapore)
- Damien Stehle (ENS, Lyon, France)
- Huaxiong Wang (Nanyang Technological University, Singapore)
15:40–16:00 Coffee Break
16:00–17:15 Functional Encryption/Signatures (Session Chair: Mehdi Tibouchi)
- Decentralized Attribute-Based Signatures
- Tatsuaki Okamoto (NTT, Japan)
- Katsuyuki Takashima (Mitsubishi Electric, Japan)
- On the Semantic Security of Functional Encryption Schemes
- Manuel Barbosa (HASLab - INESC TEC and Universidade do Minho, Portugal)
- Pooya Farshim (Darmstadt University of Technology, Germany)
- Attribute-Based Encryption with Fast Decryption
- Susan Hohenberger (Johns Hopkins University, USA)
- Brent Waters (University of Texas at Austin, USA)
February 28
9:00–9:50 On RSA (Session Chair: Steven Galbraith)
- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
- Noboru Kunihiro (The University of Tokyo, Japan)
- Naoyuki Shinohara (NICT, Japan)
- Tetsuya Izu (Fujitsu Laboratories, Japan)
- Combined Attack on CRT-RSA -- Why Public Verification Must Not Be Public
- Guillaume Barbu (Oberthur Technologies, France)
- Alberto Battistello (Oberthur Technologies, France)
- Guillaume Dabosville (Oberthur Technologies, France)
- Christophe Giraud (Oberthur Technologies, France)
- Guénaël Renault (Université Paris 6 / LIP6, France)
- Soline Renner (Oberthur Technologies and Université Bordeaux 1 / IMB, France)
- Rina Zeitoun (Oberthur Technologies and Université Paris 6 / LIP6, France)
9:50–10:40 IBE and IPE (Session Chair: Katsuyuki Takashima)
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Jae Hong Seo (NICT, Japan)
- Keita Emura (NICT, Japan)
- Improved (Hierarchical) Inner-Product Encryption from Lattices
- Keita Xagawa (NTT, Japan)
10:40–11:00 Coffee Break
11:00–12:00 Invited Talk (Session Chair: Kaoru Kurosawa)
- Techniques for Efficient Secure Computation Based on Yao's Protocol
- Yehuda Lindell (Bar-Ilan University, Israel)
12:00–14:00 Lunch (Yume-Kaze Plaza)
14:00–18:00 Excursion (Bus Tour to Horyuji Temple)
We meet at 14:00 at Nara Prefectural New Public Hall (the conference venue). After the tour the buses will go to the banquet venue. If you don't attend the tour, go directly to Nara Hotel for the banquet. See the venue page for location information.
18:00–21:00 Banquet (Nara Hotel)
March 1
9:00–9:50 Key Exchange (Session Chair: Shai Halevi)
- Non-Interactive Key Exchange
- Eduarda S.V. Freire (Royal Holloway, University of London, UK)
- Dennis Hofheinz (Karlsruhe Institute of Technology, Germany)
- Eike Kiltz (Ruhr-Universität Bochum, Germany)
- Kenneth G. Paterson (Royal Holloway, University of London, UK)
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
- Fabrice Ben Hamouda (ENS, Paris, France)
- Olivier Blazy (Ruhr-Universität Bochum, Germany)
- Céline Chevalier (University of Paris II, France)
- David Pointcheval (ENS, Paris, France)
- Damien Vergnaud (ENS, Paris, France)
9:50–10:40 Signature Schemes I (Session Chair: Benoît Libert)
- Tighter Reductions for Forward-Secure Signature Schemes
- Michel Abdalla (ENS, Paris, France)
- Fabrice Ben Hamouda (ENS, Paris, France)
- David Pointcheval (ENS, Paris, France)
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Masayuki Abe (NTT, Japan)
- Bernardo David (University of Brasilia, Brazil)
- Markulf Kohlweiss (Microsoft Research, USA)
- Ryo Nishimaki (NTT, Japan)
- Miyako Ohkubo (NICT, Japan)
10:40–11:00 Coffee Break
11:00–12:15 Homomorphic Encryption (Session Chair: Ludovic Perret)
- Packed Ciphertexts in LWE-based Homomorphic Encryption
- Zvika Brakerski (Stanford University, USA)
- Craig Gentry (IBM Research, USA)
- Shai Halevi (IBM Research, USA)
- Vector Commitments and their Applications (#2)
- Dario Catalano (Università di Catania, Italy)
- Dario Fiore (MPI-SWS, Germany)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
- Keita Emura (NICT, Japan)
- Goichiro Hanaoka (AIST, Japan)
- Go Ohtake (Japan Broadcasting Corporation, Japan)
- Takahiro Matsuda (AIST, Japan)
- Shota Yamada (The University of Tokyo, Japan)
12:15–14:00 Lunch (Yume-Kaze Plaza)
14:00–15:40 Signature Schemes II (Session Chair: Noboru Kunihiro)
- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
- Nuttapong Attrapadung (AIST, Japan)
- Benoit Libert (Technicolor, France)
- Thomas Peters (Universite catholique de Louvain, Belgium)
- Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
- Ryo Nishimaki (NTT, Japan)
- Keita Xagawa (NTT, Japan)
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
- Kwangsu Lee (Columbia University, USA)
- Dong Hoon Lee (Korea University, Korea)
- Moti Yung (Google Inc. and Columbia University, USA)
- New Constructions and Applications of Trapdoor DDH Groups
- Yannick Seurin (ANSSI, Paris, France)
15:40–16:00 Coffee Break
16:00–17:15 Protocols (Session Chair: Eiichiro Fujisaki)
- Rate-Limited Secure Function Evaluation
- Özgür Dagdelen (Technische Universität Darmstadt, Germany)
- Payman Mohassel (University of Calgary, Canada)
- Daniele Venturi (Aarhus University, Denmark)
- Verifiable Elections That Scale for Free
- Melissa Chase (MSR Redmond, USA)
- Markulf Kohlweiss (MSR Cambridge, USA)
- Anna Lysyanskaya (Brown University, USA)
- Sarah Meiklejohn (UC San Diego, USA)
- On the Connection between Leakage Tolerance and Adaptive Security
- Jesper Buus Nielsen (Aarhus University, Denmark)
- Daniele Venturi (Aarhus University, Denmark)
- Angela Zottarel (Aarhus University, Denmark)
17:15–17:30 Closing
#1 and #2 have been switched.