<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Paris Crypto Day</title>
    <description>A full day of cryptography talks in the Paris area.
</description>
    <link>https://pariscryptoday.github.io/</link>
    <atom:link href="https://pariscryptoday.github.io/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Thu, 13 Jun 2019 12:19:55 +0000</pubDate>
    <lastBuildDate>Thu, 13 Jun 2019 12:19:55 +0000</lastBuildDate>
    <generator>Jekyll v3.8.5</generator>
    
      <item>
        <title>June 21 @ ENS</title>
        <description>&lt;p&gt;The next Paris Area Crypto Day will be held on 21.06.19 (Fri) at
ENS, co-located with &lt;a href=&quot;https://quefaire.paris.fr/40919/fete-de-la-musique&quot;&gt;Fête de la Musique&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#Access&quot;&gt;Amphi Rataud&lt;/a&gt;, ENS, 45 rue d’Ulm&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/e/1FAIpQLSdU9SDqLdHWnDRSyj-AKfPzGAsiwA9Ih_1sne8J3RXFDsAWLA/viewform&quot;&gt;register&lt;/a&gt; (free). Deadline 17.06.19&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;tentative-program&quot;&gt;Tentative Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;09:55–10:00&lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00–11:00&lt;/td&gt;
      &lt;td&gt;Jean Paul Degabriele: &lt;a href=&quot;#JP&quot;&gt;The Security of Onion Encryption in Tor&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:00–12:00&lt;/td&gt;
      &lt;td&gt;Joël Alwen: &lt;a href=&quot;#JA&quot;&gt;2-Party Secure Messaging for Unreliable Channels&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00–14:00&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00–14:30&lt;/td&gt;
      &lt;td&gt;Aisling Connolly: &lt;a href=&quot;#AC&quot;&gt;Freedom of Encryption&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:30–15:00&lt;/td&gt;
      &lt;td&gt;Ward Beullens: &lt;a href=&quot;#WB&quot;&gt;On Sigma Protocols with Helper for MQ and PKP, Fishy Signature Schemes and More&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00–15:30&lt;/td&gt;
      &lt;td&gt;Rotem Tsabary: &lt;a href=&quot;#RT&quot;&gt;Degree 2 is Complete for the Round Complexity of Malicious MPC&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30–16:00&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;16:00–17:00&lt;/td&gt;
      &lt;td&gt;Hoeteck Wee: &lt;a href=&quot;#HW&quot;&gt;Encrypted Computation from Lattices&lt;/a&gt;&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;!--

* [Joël Alwen](#JA) (Wickr) 
* [Ward Beullens](#WB) (KU Leuven)
* [Aisling Connolly](#AC) (ENS)
* [Jean Paul Degabriele](#JP) (TU Darmstadt)
* [Rotem Tsabary](#RT) (Weizmann)
* [Hoeteck Wee](#HW) (CNRS/ENS/PSL)

--&gt;

&lt;p&gt;&lt;strong&gt;Organizers.&lt;/strong&gt; Michel Abdalla, Georg Fuchsbauer and Hoeteck Wee (&lt;a href=&quot;https://crypto.di.ens.fr/web2py&quot;&gt;ENS&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Acknowledgements.&lt;/strong&gt; ERC &lt;a href=&quot;http://www.di.ens.fr/~pointche/CryptoCloud/&quot;&gt;CryptoCloud&lt;/a&gt;, &lt;a href=&quot;http://cordis.europa.eu/project/rcn/193658_en.html&quot;&gt;aSCEND&lt;/a&gt; and &lt;a href=&quot;https://www.di.ens.fr/~fuchsbau/eftrec.html&quot;&gt;EfTrEC&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;JP&quot;&gt;&lt;/a&gt;The Security of Onion Encryption in Tor&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Jean Paul Degabriele (TU Darmstadt)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to tagging attacks (Fu and Ling, 2009), which allow an active adversary controlling the first and last node of a circuit to deanonymize with near-certainty. This contrasts with less active traffic correlation attacks, where the same adversary can at best deanonymize with high probability. The Tor project has been actively looking to defend against tagging attacks and its most concrete alternative is proposal 261, which specifies a new onion encryption scheme based on a variable-input-length tweakable cipher. We provide a formal treatment of low-latency, circuit-based onion encryption, relaxed to the unidirectional setting, by expanding existing secure channel notions to the new setting and introducing circuit hiding to capture the anonymity aspect of Tor. We demonstrate that circuit hiding prevents tagging attacks and show proposal 261’s relay protocol is circuit hiding and thus resistant against tagging attacks.
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;JA&quot;&gt;&lt;/a&gt;2-Party Secure Messaging for Unreliable Channels&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Joël Alwen (Wickr)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Double Ratchet (DR) based protocols have rapidly become the world’s
dominant 2-party secure messaging (2SM) paradigm. Yet, despite the
paradigm’s wide spread adoption in wild, our cryptographic understanding
of it is still evolving.&lt;/p&gt;

&lt;p&gt;In this talk, we’ll look at the recent results of Alwen, Coretti and
Dodis at Eurocrypt 2019, which focus on building 2SM protocols using the
DR paradigm with the explicit goal of obtaining robust, simple and
efficient protocols for use in the real world yet provably exhibiting
very strong security properties.&lt;/p&gt;

&lt;p&gt;We first look at is their new security notion for 2SM.
The definition captures (in a clean, intuitive and yet succinct game)
both the desired functionality of 2SM, as well as the security
properties of Forward Secrecy, Authenticity, Post-Compromise Security
and “Resilience to Adversarially Chosen Randomness”. In an effort to
further reduce the assumptions about an underlying network’s behavior,
the new 2SM definition is also the first to capture the intuitive goal
of “Immediate Decryption”; namely that any honestly generated ciphertext
can be decrypted immediately upon delivery by the receiver. As this
property must hold regardless of the order in which ciphertexts are
delivered (and even when arbitrary previous protocol packets were
outright dropped) constructions enjoying Immediate Decryption will be
far more resilient when used over unreliable transports. This stands in
stark contrast to almost all 2SM’s that have been proposed thus far as
improvements over the original DR protocol still being used in practice.
In fact, essentially all stronger security notions for 2SM’s proposed in
those works seem to fundamentally contradict supporting Immediate
Decryption. Now, while it is easy to imagine practical settings that
require these stronger security notions and/or where the reliability of
the underlying transport can be guaranteed, we observe that, to the best
of our knowledge, essentially &lt;em&gt;all&lt;/em&gt; 2SM protocols actually deployed in
practice do indeed support Immediate Decryption. We believe this shows
that, often, in practice the added robustness afforded by Immediate
Decryption outweighs the value of achieving yet stronger
security properties.&lt;/p&gt;

&lt;p&gt;Armed with the new security notion, we will take a new look at the DR
design paradigm. In particular:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;We describe a modular construction of a DR-based 2SM (and prove its
security). For this we use 3, significantly simpler, black-box
primitives. In particular, we believe that this approach not only
“explains” a wide class of 2SM protocols but that it will also
generalize well to the (much more challenging and poorly understood)
group secure messaging setting.&lt;/li&gt;
  &lt;li&gt;We provide constructions of each of the 3 primitives based on a
variety of number-theoretic and black-box primitives. In particular, we
obtain:
  1) the original DR protocol as used in practice resulting in a new
security proof for a 2SM currently used by over 1 billion people.
  2) the first provably PQ-secure 2SM.
  3) a new highly efficient 2SM with stronger security properties than
anything used in practice (yet still enjoying Immediate Decryption).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, we extend the modular construction to include basic public-key
primitives. Using this, we obtain a yet more secure 2SM, albeit at a
moderate cost in efficiency.
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;AC&quot;&gt;&lt;/a&gt;Freedom of Encryption&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Aisling Connolly (ENS)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Legislation surrounding digital privacy has seen quite an upheaval in recent years. The introduction of the General Data Protection Regulation (GDPR) in the EU, and new resolutions within the United Nations Human Rights Council (UNHRC) have recognized the urgency to include recommendations on the use of encryption to protect the digital identities of citizens. In this work, we meander through the main events in history which have shaped the legislative landscape that encompasses the use of encryption, paying particular attention to recent (post-Snowden) developments.
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;WB&quot;&gt;&lt;/a&gt;On Sigma Protocols with Helper for MQ and PKP, Fishy Signature Schemes and More&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Ward Beullens (KU Leuven)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This work presents 2 sigma protocols with helper to prove knowledge of:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;A solution to a system of quadratic polynomials&lt;/li&gt;
  &lt;li&gt;A solution to an instance of the Permuted Kernel Problem&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We then remove the helper from the protocol with a “cut-and-choose” protocol and we apply the Fiat-Shamir transform to obtain signature schemes with security proof in the QROM. We show that the resulting signature schemes, which we call the “MUltivarite quaDratic FIat-SHamir” scheme (MUDFISH) and the “ShUffled Solution to Homogeneous linear SYstem FIat-SHamir” scheme (SUSHSYFISH), are more efficient than existing signatures based on the MQ problem and the Permuted Kernel Problem. We also leverage the ZK-proof for PKP to improve the efficiency of Stern-like Zero Knowledge proofs for lattice statements.
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;RT&quot;&gt;&lt;/a&gt;Degree 2 is Complete for the Round Complexity of Malicious MPC&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Rotem Tsabary (Weizmann)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We show, via a non-interactive reduction, that the existence of a secure multi-party computation (MPC) protocol for degree-2 functions implies the existence of a protocol with the same round complexity for general functions. Thus showing that when considering the round complexity of MPC, it is sufficient to consider very simple functions.&lt;/p&gt;

&lt;p&gt;Our completeness theorem applies in various settings: information theoretic and computational, fully malicious and malicious with various types of aborts. In fact, we give a master theorem from which all individual settings follow as direct corollaries. Our basic transformation does not require any additional assumptions and incurs communication and computation blow-up which is polynomial in the number of players and in S, 2^D, where S,D are the circuit size and depth of the function to be computed. Using one-way functions as an additional assumption, the exponential dependence on the depth can be removed.&lt;/p&gt;

&lt;p&gt;As a consequence, we are able to push the envelope on the state of the art in various settings of MPC, including the following cases.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;3-round perfectly-secure protocol (with guaranteed output delivery) against an active adversary that corrupts less than a quarter of the parties.&lt;/li&gt;
  &lt;li&gt;2-round statistically-secure protocol that achieves security with “selective abort” against an active adversary that corrupts less than half of the parties.&lt;/li&gt;
  &lt;li&gt;Assuming one-way functions, 2-round computationally-secure protocol that achieves security with (standard) abort against an active adversary that corrupts less than half of the parties.
&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;HW&quot;&gt;&lt;/a&gt;Encrypted Computation from Lattices&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Hoeteck Wee (CNRS/ENS/PSL)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;In this talk, we will survey three cryptographic notions of enabling
computation over encrypted data – attribute-based encryption, fully
homomorphic encryption, and laconic functional evaluation – as well
as their instantiations from lattices.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;h3 id=&quot;venue&quot;&gt;Venue&lt;/h3&gt;
&lt;p&gt;&lt;a name=&quot;Access&quot;&gt;&lt;/a&gt;45 rue d’Ulm, 75005 Paris, Amphi Rataud: level -1 in the building labeled “Bibliothèque” &lt;!---[here](https://www.di.ens.fr/static/img/Map_DIENS.jpg)--&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;img src=&quot;https://www.di.ens.fr/static/img/Map_DIENS.jpg&quot; width=&quot;75%&quot; height=&quot;75%&quot; /&gt;&lt;/p&gt;
</description>
        <pubDate>Sat, 01 Jun 2019 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/tenth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/tenth.html</guid>
        
        
      </item>
    
      <item>
        <title>Mar 18 @ ENS</title>
        <description>&lt;p&gt;The next Paris Area Crypto Day will be held on 18.03.2019 (Mon) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Amphi Jaurès, ENS (29 rue d’Ulm, level B1)&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1N_h57pxPSZmjYiCN5lPUz8XHWGMzZ5Qqnbo97NddhrQ/viewform&quot;&gt;register&lt;/a&gt; (free). Deadline 12.03.2019&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 10:05&lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:05 - 10:50&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#SA&quot;&gt;Shweta Agrawal&lt;/a&gt; Mathematical Assumptions Underlying Code Obfuscation&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:00 - 11:45&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#DH&quot;&gt;Dennis Hofheinz&lt;/a&gt; Tight Security (&lt;a href=&quot;../DennisHofheinz.pdf&quot;&gt;slides&lt;/a&gt;)&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 14:00&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 14:45&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#DF&quot;&gt;Dario Fiore&lt;/a&gt; Homomorphic Authentication for Computing Securely on Untrusted Machines (&lt;a href=&quot;../DarioFiore.pdf&quot;&gt;slides&lt;/a&gt;)&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00 - 15:45&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#TL&quot;&gt;Tancrède Lepoint&lt;/a&gt; Cryptographic Suite for Algebraic Lattices&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Organizers.&lt;/strong&gt; Michel Abdalla, Georg Fuchsbauer, and Hoeteck Wee (&lt;a href=&quot;https://crypto.di.ens.fr/web2py&quot;&gt;ENS&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Acknowledgements.&lt;/strong&gt; ERC &lt;a href=&quot;http://www.di.ens.fr/~pointche/CryptoCloud/&quot;&gt;CryptoCloud&lt;/a&gt; and &lt;a href=&quot;http://cordis.europa.eu/project/rcn/193658_en.html&quot;&gt;aSCEND&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;SA&quot;&gt;&lt;/a&gt;Mathematical Assumptions Underlying Code Obfuscation&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Shweta Agrawal&lt;/em&gt; (IIT Madras)&lt;/p&gt;

&lt;p&gt;In recent times, there has been significant interest in constructing
the cryptographic primitive of “indistinguishability obfuscation”.
Standard cryptographic hardness assumptions appear insufficient for
this task, and we now have a variety of new mathematical conjectures
to fill the gap. I will define the notion of indistinguishability
obfuscation, briefly describe its importance and discuss the new
mathematical conjectures, hard distributions, known attacks and open
problems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;DH&quot;&gt;&lt;/a&gt;Tight security&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Dennis Hofheinz&lt;/em&gt; (KIT)&lt;/p&gt;

&lt;p&gt;A cryptographic building block (such as an encryption or signature scheme) is
called tightly secure if its security reduction is tight, i.e., if its
reduction connects security and underlying assumption in a quantitatively close
way, even in a multi-instance/multi-use scenario. In particular, the security
of a tightly secure scheme should not degrade in the number of instances or
uses of that scheme. This property is beneficial in particular in scenarios in
which it is not clear a priori how many instances of that scheme are used.&lt;/p&gt;

&lt;p&gt;In this talk, we survey recent results to achieve tight security, with a focus
on encryption schemes. We explain the intrinsic difficulty to achieve tight
security (e.g., for chosen-ciphertext secure encryption or signatures), and
also showcase techniques to overcome this difficulty.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;DR&quot;&gt;&lt;/a&gt;Homomorphic Authentication for Computing Securely on Untrusted Machines&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Dario Fiore&lt;/em&gt; (IMDEA)&lt;/p&gt;

&lt;p&gt;Due to phenomena like the ubiquity of the Internet and cloud computing, it is increasingly common to store and process data on third-party machines. In spite of its attractive aspects, this trend raises a number of security concerns, including: how to ensure that the results computed by third parties are correct (integrity) and no unauthorized information is leaked (privacy)? This talk focuses on cryptographic solutions for integrity, and more specifically on the notion of homomorphic authentication. It presents this notion, gives an overview of the state of the art in this area,  and covers some of the recent efficient constructions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;DR&quot;&gt;&lt;/a&gt;Cryptographic Suite for Algebraic Lattices&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Tancrède Lepoint&lt;/em&gt; (Google)&lt;/p&gt;

&lt;p&gt;In this talk, I introduce CRYSTALS — Cryptographic Suite for Algebraic Lattices —, a cryptographic suite composed of a CCA-secure KEM and a digital signature based on module lattices and designed in collaboration with Joppe Bos, Léo Ducas, Eike Kiltz, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé in 2017. CRYSTALS is designed to enable ease of implementation and modularity in security by using module lattices and well established cryptographic assumptions. Module lattices not only enable simple implementations (the core operation, a polynomial multiplication, has only to be implemented in dimension 256), but enable extremely simple scaling up and down of the security without the need to reimplement anything.&lt;/p&gt;

&lt;p&gt;In January 2019, the algorithms in CRYSTALS were selected for the second round of the NIST post-standardization effort; I’ll report on performances and second round tweaks.&lt;/p&gt;

</description>
        <pubDate>Sat, 16 Mar 2019 10:10:10 +0000</pubDate>
        <link>https://pariscryptoday.github.io/ninth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/ninth.html</guid>
        
        
      </item>
    
      <item>
        <title>Oct 25 @ ENS</title>
        <description>&lt;p&gt;The next Paris Area Crypto Day will be held on 25.10.2018 (Thu) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Amphi Jaurès, ENS (29 rue d’Ulm, level B1)&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/e/1FAIpQLSeop24A0asJvd73HvUH8zTDorfzPOpswA_pfcyVxc2zkctoMg/viewform&quot;&gt;register&lt;/a&gt; (free). Deadline 23.10.2018&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;tentative-program&quot;&gt;Tentative Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 10:05&lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:05 - 11:05&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#SM&quot;&gt;Sarah Meiklejohn&lt;/a&gt;: Anonymity in Cryptocurrencies&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:15 - 11:45&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#MaMa&quot;&gt;Mary Maller&lt;/a&gt;: Updatable and Universal Common Reference Strings with Applications to zk-SNARKs&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:45 - 12:15&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#JL&quot;&gt;Julian Loss&lt;/a&gt;: The Algebraic Group Model and its Applications&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:15 - 14:15&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:15 - 15:15&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#BS&quot;&gt;Benjamin Smith&lt;/a&gt;: Post-quantum Diffie–Hellman: Caveat Emptor&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:15 - 15:45&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#MiMi&quot;&gt;Michele Minelli&lt;/a&gt;: Fast Homomorphic Evaluation of Deep Discretized Neural Networks&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:45 - 16:15&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;16:15 - 17:15&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#AO&quot;&gt;Adam O’Neill&lt;/a&gt;: Towards RSA-OAEP without Random Oracles&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Organizers.&lt;/strong&gt; Michel Abdalla, Georg Fuchsbauer, and Hoeteck Wee (&lt;a href=&quot;https://crypto.di.ens.fr/web2py&quot;&gt;ENS&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Acknowledgements.&lt;/strong&gt; ERC &lt;a href=&quot;http://www.di.ens.fr/~pointche/CryptoCloud/&quot;&gt;CryptoCloud&lt;/a&gt; and &lt;a href=&quot;http://cordis.europa.eu/project/rcn/193658_en.html&quot;&gt;aSCEND&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;SM&quot;&gt;&lt;/a&gt;Anonymity in Cryptocurrencies&lt;/strong&gt;
&lt;em&gt;Sarah Meiklejohn&lt;/em&gt; (UCL)&lt;/p&gt;

&lt;p&gt;A long line of recent research has demonstrated that existing cryptocurrencies often do not achieve the level of anonymity that users might expect they do, while at the same time another line of research has worked to increase the level of anonymity by adding new features to existing cryptocurrencies or creating entirely new cryptocurrencies.  This talk will explore both of these lines of research, briefly demonstrating de-anonymization attacks but focusing primarily on techniques for anonymity that achieve provably secure guarantees.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;MaMa&quot;&gt;&lt;/a&gt;Updatable and Universal Common Reference Strings with Applications to zk-SNARKs&lt;/strong&gt;
&lt;em&gt;Mary Maller&lt;/em&gt; (UCL)&lt;/p&gt;

&lt;p&gt;By design, existing (pre-processing) zk-SNARKs embed a secret trapdoor in a relation-dependent common reference strings (CRS). The trapdoor is exploited by a (hypothetical) simulator to prove the scheme is zero knowledge, and the secret-dependent structure facilitates a linear-size CRS and linear-time prover computation. If known by a real party, however, the trapdoor can be used to subvert the security of the system. The structured CRS that makes zk-SNARKs practical also makes deploying zk-SNARKS problematic, as it is difficult to argue why the trapdoor would not be available to the entity responsible for generating the CRS. Moreover, for pre-processing zk-SNARKs a new trusted CRS needs to be computed every time the relation is changed.&lt;/p&gt;

&lt;p&gt;In this paper, we address both issues by proposing a model where a number of users can update a universal CRS. The updatable CRS model guarantees security if at least one of the users updating the CRS is honest. We provide both a negative result, by showing that zk-SNARKs with private secret-dependent polynomials in the CRS cannot be updatable, and a positive result by constructing a zk-SNARK based on a CRS consisting only of secret-dependent monomials. The CRS is of quadratic size, is updatable, and is universal in the sense that it can be specialized into one or more relation-dependent CRS of linear size with linear-time prover computation.&lt;/p&gt;

&lt;p&gt;(Joint work with Jens Groth, Markulf Kohlweiss, Sarah Meiklejohn and Ian Miers)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;JL&quot;&gt;&lt;/a&gt;The Algebraic Group Model and its Applications&lt;/strong&gt;
&lt;em&gt;Julian Loss&lt;/em&gt; (RUB)&lt;/p&gt;

&lt;p&gt;One of the most important and successful tools for assessing hardness assumptions in cryptography is the Generic Group Model (GGM). Over the past two decades, numerous assumptions and protocols have been analyzed within this model. While a proof in the GGM can certainly provide some measure of confidence in an assumption, its scope is rather limited since it does not capture group-specific algorithms that make use of the representation of the group.&lt;/p&gt;

&lt;p&gt;To overcome this limitation, we propose the Algebraic Group Model (AGM), a model that lies in between the Standard Model and the GGM. It is the first restricted model of computation covering group-specific algorithms yet allowing to derive simple and meaningful security statements.&lt;br /&gt;
To prove its usefulness, we show that several important assumptions, among them the Computational Diffie-Hellman, the Strong Diffie-Hellman, and the interactive LRSW assumptions, are equivalent to the Discrete Logarithm (DLog) assumption in the AGM. 
On the more practical side, we prove tight security reductions for two important schemes in the AGM to DLog or a variant thereof: the BLS signature scheme and Groth’s zero-knowledge SNARK (EUROCRYPT 2016), which is the most efficient SNARK for which only a proof in the GGM was known.
Our proofs are quite simple and therefore less prone to subtle errors than those in the GGM.&lt;/p&gt;

&lt;p&gt;Moreover, in combination with known lower bounds on the Discrete Logarithm assumption in the GGM, our results can be used to derive lower bounds for all the above-mentioned results in the GGM.&lt;/p&gt;

&lt;p&gt;(Joint work with Georg Fuchsbauer and Eike Kiltz)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;BS&quot;&gt;&lt;/a&gt;Post-quantum Diffie–Hellman: Caveat Emptor&lt;/strong&gt;
&lt;em&gt;Benjamin Smith&lt;/em&gt; (INRIA/LIX)&lt;/p&gt;

&lt;p&gt;In the mad dash towards post-quantum crypto, it is often overlooked that
it has been surprisingly hard to find a practical drop-in replacement
for Diffie–Hellman key exchange (as opposed to post-quantum KEMs for
key establishment).  Recent work revisiting an old isogeny-based
primitive due to Couveignes, Rostovtsev, and Stolbunov has given some
very useful results in this direction: practical post-quantum
Diffie–Hellman is now in reach, especially with the new CSIDH proposal.
These key exchanges, based on isogenies of elliptic curves with
commutative endomorphism rings, have a clear superficial resemblance to
classical Diffie–Hellman; but the deeper we look, the further their
properties diverge from the common intuitions for Diffie–Hellman-based
cryptosystems that we have developed over the last four decades.  In
this talk we will compare and contrast pre- and post-quantum
Diffie–Hellman algorithms and their applications, highlighting some
important subtleties and distinctions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;MiMi&quot;&gt;&lt;/a&gt;Fast Homomorphic Evaluation of Deep Discretized Neural Networks&lt;/strong&gt;
&lt;em&gt;Michele Minelli&lt;/em&gt; (ENS)&lt;/p&gt;

&lt;p&gt;The rise of machine learning as a service multiplies scenarios where one faces a privacy dilemma: either sensitive user data must be revealed to the entity that evaluates the cognitive model (e.g., in the Cloud), or the model itself must be revealed to the user so that the evaluation can take place locally. Fully Homomorphic Encryption (FHE) offers an elegant way to reconcile these conflicting interests in the Cloud-based scenario and also preserve non-interactivity. However, due to the inefficiency of existing FHE schemes, most applications prefer to use Somewhat Homomorphic Encryption (SHE), where the complexity of the computation to be performed has to be known in advance, and the efficiency of the scheme depends on this global complexity.&lt;/p&gt;

&lt;p&gt;In this paper, we present a new framework for homomorphic evaluation of neural networks, that we call FHE-DiNN, whose complexity is strictly linear in the depth of the network and whose parameters can be set beforehand. To obtain this scale-invariance property, we rely heavily on the bootstrapping procedure. We refine the recent FHE construction by Chillotti et al. (ASIACRYPT 2016) in order to increase the message space and apply the sign function (that we use to activate the neurons in the network) during the bootstrapping. We derive some empirical results, using TFHE library as a starting point, and classify encrypted images from the MNIST dataset with more than 96% accuracy in less than 1.7 seconds.&lt;/p&gt;

&lt;p&gt;Finally, as a side contribution, we analyze and introduce some variations to the bootstrapping technique of Chillotti et al. that offer an improvement in efficiency at the cost of increasing the storage requirements.&lt;/p&gt;

&lt;p&gt;(Joint work with Florian Bourse, Matthias Minihold and Pascal Paillier)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;AO&quot;&gt;&lt;/a&gt;Towards RSA-OAEP without Random Oracles&lt;/strong&gt;
&lt;em&gt;Adam O’Neill&lt;/em&gt; (Georgetown)&lt;/p&gt;

&lt;p&gt;We give the first positive results about instantiability of the widely implemented and standarized RSA-OAEP encryption scheme of Bellare and Rogaway (EUROCRYPT 1994) and variants &lt;em&gt;under chosen-ciphertext attack&lt;/em&gt;. Recall that RSA-OAEP adds redundancy and randomness to a message before composing two rounds of an underlying Feistel transform, whose round functions are modeled as random oracles (ROs), with RSA. First, we show that either of the two oracles (while still modeling the other as a RO) can be instantiated in RSA-OAEP under IND-CCA2 using mild standard model assumptions. Surprisingly, ours are the first “partial instantiation” results for RSA-OAEP. We obtain them by exploiting (generalizations of) algebraic properties of RSA proven by Barthe, Pointcheval, and Báguelin (CCS 2012). Second, we show that both oracles can be instantiated simultaneously for two variants of RSA-OAEP, called “t-clear” and “s-clear” RSA-OAEP. In particular, we are the first to consider s-clear RSA-OAEP, and our result for it yields the most efficient RSA-based IND-CCA2 secure scheme (under plausible assumptions) in the standard model to date. We obtain it by leveraging a new hierarchy of extractability-style assumptions in the sense of Canetti and Dakdouk (TCC 2010) on the round functions, as well as novel yet plausible assumptions on RSA.&lt;/p&gt;

&lt;p&gt;(Joint work with Nairen Cao and Mohammad Zaheri)&lt;/p&gt;
</description>
        <pubDate>Mon, 01 Oct 2018 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/eighth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/eighth.html</guid>
        
        
      </item>
    
      <item>
        <title>June 14 @ ENS</title>
        <description>&lt;p&gt;The next Paris Area Crypto Day will be held on 14.06.2018 (Thu) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Amphi Jaurès, ENS (29 rue d’Ulm, level B1)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;14:30 - 15:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#DB&quot;&gt;Dan Boneh&lt;/a&gt; Cryptography for crypto currencies&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;DB&quot;&gt;&lt;/a&gt;Cryptography for crypto currencies&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://crypto.stanford.edu/~dabo/&quot;&gt;Dan Boneh&lt;/a&gt;&lt;/em&gt; (Stanford)&lt;/p&gt;

&lt;p&gt;Cryptocurrencies raise many new questions in cryptography, including in the area of digital signatures. In this talk we will describe recent progress on signatures, aggregate signatures, and multi-signatures that is motivated by their use in cryptocurrencies. These new constructions show how modern signatures can significantly shrink the size of the blockchain.&lt;/p&gt;

&lt;p&gt;This is joint work with Manu Drijvers and Gregory Neven.&lt;/p&gt;
</description>
        <pubDate>Mon, 04 Jun 2018 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/seventh.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/seventh.html</guid>
        
        
      </item>
    
      <item>
        <title>Nov 30 @ ENS</title>
        <description>&lt;p&gt;The sixth Paris Area Crypto Day will be held on 30.11.2017 (Thu) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http://www.ens.fr/IMG/pdf/Plan_45ULM_RDC.pdf&quot;&gt;Salle Celan&lt;/a&gt;, ENS&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1S-31XgG6q7iFgNBcOhWh8nSJxij-_VivJfxv4bvscag/viewform&quot;&gt;register&lt;/a&gt; (free). Deadline 27.11.2016&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;13:30 - 14:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#YI&quot;&gt;Yuval Ishai&lt;/a&gt; Secure Arithmetic Computation with Constant Computational Overhead&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:40 - 15:40&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#JG&quot;&gt;Jens Groth&lt;/a&gt; Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:45 - 16:30&lt;/td&gt;
      &lt;td&gt;Coffee &amp;amp; Snacks @ S16, ENS&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;YI&quot;&gt;&lt;/a&gt;Secure Arithmetic Computation with Constant Computational Overhead&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://www.cs.technion.ac.il/~yuvali/&quot;&gt;Yuval Ishai&lt;/a&gt;&lt;/em&gt; (Technion)&lt;/p&gt;

&lt;p&gt;Motivated by the goal of efficient secure computations on sensitive
numerical data, we present a protocol for securely computing
arithmetic circuits that requires only a constant (amortized) number
of arithmetic operations per gate. This applies to the model of
security against passive (or “semi-honest”) adversaries. Our protocol
is based on new cryptographic assumptions that can be viewed as
natural arithmetic analogues of well studied assumptions. Beyond the
asymptotic result, a key building block in our protocol can yield
concrete efficiency improvements for natural secure computation tasks.&lt;/p&gt;

&lt;p&gt;Joint work with Benny Applebaum, Ivan Damgård, Michael Nielsen, and Lior Zichron&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;JG&quot;&gt;&lt;/a&gt;Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://www0.cs.ucl.ac.uk/staff/j.groth/&quot;&gt;Jens Groth&lt;/a&gt;&lt;/em&gt; (UCL)&lt;/p&gt;

&lt;p&gt;We give computationally efficient zero-knowledge proofs of knowledge
for arithmetic circuit satisfiability over a large field. For a
circuit with N addition and multiplication gates, the prover only uses
O(N) multiplications and the verifier only uses O(N) additions in the
field. If the commitments we use are statistically binding, our
zero-knowledge proofs have unconditional soundness, while if the
commitments are statistically hiding we get computational soundness.
Our zero-knowledge proofs also have sub-linear communication if the
commitment scheme is compact.&lt;/p&gt;

&lt;p&gt;Our construction proceeds in three steps. First, we give a
zero-knowledge proof for arithmetic circuit satisfiability in an ideal
linear commitment model where the prover may commit to secret vectors
of field elements, and the verifier can receive certified linear
combinations of those vectors. Second, we show that the ideal linear
commitment proof can be instantiated using error-correcting codes and
non-interactive commitments. Finally, by choosing efficient
instantiations of the primitives we obtain linear-time zero-knowledge
proofs.&lt;/p&gt;

</description>
        <pubDate>Thu, 02 Nov 2017 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/sixth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/sixth.html</guid>
        
        
      </item>
    
      <item>
        <title>Jun 27-28 @ ENS</title>
        <description>&lt;p&gt;The next Paris Area Crypto Day will take place on 27.06.2017 and 28.06.2017 (Tue/Wed) at ENS. The event will be co-located with the ECRYPT NET Workshop on Crypto for the Cloud &amp;amp; Implementation; the website is &lt;a href=&quot;https://crypto-events.di.ens.fr/ecryptnet/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http://www.di.ens.fr/CryptoAccess.html.en&quot;&gt;Salle Dussane&lt;/a&gt;, ENS (item 9 of this &lt;a href=&quot;https://crypto-events.di.ens.fr/ecryptnet/docs/Plan_45ULM_RDC.pdf&quot;&gt;map&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/e/1FAIpQLSeGa89lxTKtPi7BReaWC4x9Gl_p9HkqQESZKJVim0JRi2zlmg/viewform?entry.2092238618&amp;amp;entry.1135279802&amp;amp;entry.479301265&amp;amp;entry.1753222212=First+day+(June+27)&amp;amp;entry.1753222212=Second+day+(June+28)&quot;&gt;register here&lt;/a&gt; (free)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;h4 id=&quot;day-one-jun-27&quot;&gt;Day one (Jun 27)&lt;/h4&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;09:30 - 10:00&lt;/td&gt;
      &lt;td&gt;Coffee &amp;amp; Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:10 - 11:10&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#DavEva&quot;&gt;David Evans&lt;/a&gt; Secure multi-party computation: promises, protocols, and practicalities [&lt;a href=&quot;https://www.jeffersonswheel.org/2017/secure-multi-party-computation-promises-protocols-and-practicalities&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:15 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#GeoFuc&quot;&gt;Georg Fuchsbauer&lt;/a&gt; Subversion-resistant zero knowledge [&lt;a href=&quot;http://www.di.ens.fr/~fuchsbau/ParisCryptoDay.pdf&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 14:00&lt;/td&gt;
      &lt;td&gt;Lunch (not provided)&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 15:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#IngVer&quot;&gt;Ingrid Verbauwhede&lt;/a&gt; Energy efficiency and security for cryptographic algorithm implementations&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00 - 15:30&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30 - 16:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#PasPai&quot;&gt;Pascal Paillier&lt;/a&gt; Whitebox cryptomania [&lt;a href=&quot;https://crypto-events.di.ens.fr/ecryptnet/slides/Whitebox_Cryptomania-4.pdf&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h4 id=&quot;day-two-jun-28&quot;&gt;Day two (Jun 28)&lt;/h4&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;09:50 - 10:00&lt;/td&gt;
      &lt;td&gt;Coffee &amp;amp; Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 11:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#KenPat&quot;&gt;Kenneth Paterson&lt;/a&gt; Secure storage in the cloud using property preserving encryption [&lt;a href=&quot;https://crypto-events.di.ens.fr/ecryptnet/slides/secure-storage-property-preserving.pdf&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:15 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#RapBos&quot;&gt;Raphael Bost&lt;/a&gt; Searchable encryption: from theory to implementation [&lt;a href=&quot;https://raphael.bost.fyi/slides/SSE_ENS.pdf&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 14:00&lt;/td&gt;
      &lt;td&gt;Lunch (not provided)&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 15:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#SerGor&quot;&gt;Sergey Gorbunov&lt;/a&gt; IRON: functional encryption using Intel SGX [&lt;a href=&quot;https://crypto-events.di.ens.fr/ecryptnet/slides/FEonSGX_public.pdf&quot;&gt;slides&lt;/a&gt;]&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00 - 15:30&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30 - 16:00&lt;/td&gt;
      &lt;td&gt;Panel&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;DavEva&quot;&gt;&lt;/a&gt;Secure multi-party computation: promises, protocols, and practicalities&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://www.cs.virginia.edu/~evans/&quot;&gt;David Evans&lt;/a&gt;&lt;/em&gt; (University of Virginia)&lt;/p&gt;

&lt;p&gt;Secure multi-party computation (MPC) provides a way for two (or more) parties to compute a function that depends on inputs from both parties, while keeping their inputs private. A general solution to this problem have been known since Yao’s pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. Over the past decade, the costs of executing MPC protocols have dropped by about 7 orders of magnitude, but real-world deployments remain rare, and mostly unsatisfying. In this talk, I’ll provide a brief introduction to MPC and summarize some of the work our group has done to make secure computation scalable, efficient, and accessible. I’ll describe some attempts to build interesting practical systems with MPC including an ongoing effort to develop a decentralized certificate authority that can produce signed certificates without ever exposing the private signing key. Finally, I’ll discuss the remaining impediments that are holding back MPC from being widely used in practice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;GeoFuc&quot;&gt;&lt;/a&gt;Subversion-resistant zero knowledge&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://www.di.ens.fr/~fuchsbau/&quot;&gt;Georg Fuchsbauer&lt;/a&gt;&lt;/em&gt; (INRIA and ENS)&lt;/p&gt;

&lt;p&gt;Motivated by the subversion of “trusted” public parameters in mass-surveillance activities, we study the security of non-interactive zero-knowledge (NIZK) proofs in the presence of a maliciously chosen common reference string. We first provide definitions for subversion-resistant soundness, witness indistinguishability and zero knowledge. We show that certain combinations of goals are unachievable but for all other combinations we give constructions that achieve them.&lt;/p&gt;

&lt;p&gt;We then turn to zk-SNARKs (succinct non-interactive arguments of knowledge), which are computationally sound NIZK systems with short and efficiently verifiable proofs, used e.g. in cryptocurrencies such as Zcash. We show that under plausible hardness assumptions, many zk-SNARK schemes proposed in the literature can be made subversion-zero-knowledge at very little cost.&lt;/p&gt;

&lt;p&gt;(joint work with Mihir Bellare and Alessandra Scafuro)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;IngVer&quot;&gt;&lt;/a&gt;Energy efficiency and security for cryptographic algorithm implementations&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://homes.esat.kuleuven.be/~iverbauw/&quot;&gt;Ingrid Verbauwhede&lt;/a&gt;&lt;/em&gt; (K.U. Leuven)&lt;/p&gt;

&lt;p&gt;Energy and power efficiency is an extremely important optimization goal when implementing applications on any digital platform. This is important for light-weight InternetOfThings devices as well as high end servers and cloud computing. The first one requires a long battery life, the second one needs to reduce the cost of cooling (and the electricity bill).&lt;/p&gt;

&lt;p&gt;The energy and power optimization also holds for the implementation of cryptographic algorithms. Our goal is to build devices that can perform the mathematically demanding cryptographic operations in an efficient way. At the same time, we request that the implementations are also secure against a wide range of physical attacks, including side-channel attacks. Unfortunately countermeasures to side-channel attacks impose an extra cost.&lt;/p&gt;

&lt;p&gt;This presentation will focus on the implementation aspects of cryptographic operations and how to balance the computation requirements with the resource constraints. These concepts will be illustrated with the design of several cryptographic co-processors, secret key, public key and new generation of post-quantum secure algorithms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;PasPai&quot;&gt;&lt;/a&gt;Whitebox cryptomania&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://www.cryptoexperts.com/&quot;&gt;Pascal Paillier&lt;/a&gt;&lt;/em&gt; (CryptoExperts)&lt;/p&gt;

&lt;p&gt;In the utopic world of whitebox cryptomania, cryptographic programs can be freely executed, copied and shared without endangering their inner secret keys, as breaking them requires intractable computational efforts. Once again, constructive cryptography has prevailed over cryptanalysis thanks to reductionist proofs and tamper-resistant cryptographic software has suddenly become a reality. This talk explores the side effects of this parallel universe on cryptographic constructions - good and bad alike - and what they potentially mean for the security of the Cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;KenPat&quot;&gt;&lt;/a&gt;Secure storage in the cloud using property preserving encryption&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://www.isg.rhul.ac.uk/~kp/&quot;&gt;Kenneth Paterson&lt;/a&gt;&lt;/em&gt; (Royal Holloway)&lt;/p&gt;

&lt;p&gt;In this talk, we’ll take a look at how Property Preserving Encryption (PPE) schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. We’ll explain why some of the currently deployed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;RapBos&quot;&gt;&lt;/a&gt;Searchable encryption: from theory to implementation&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://raphael.bost.fyi/&quot;&gt;Raphael Bost&lt;/a&gt;&lt;/em&gt; (DGA and Universite Rennes 1)&lt;/p&gt;

&lt;p&gt;Searchable encryption is a very appealing concept to store data on an untrusted server, so as to keep search functionalities while ensuring privacy of both the queries and the data.
Many different solutions emerged, differing on their security and on their efficiency, originating both from the industry and the academia. Actually, these past few years, searchable encryption has actually been a very hot topic, a lot of work on new constructions or new attacks has been done.&lt;/p&gt;

&lt;p&gt;In this presentation, I will try to give an insight on the big challenges of searchable encryption, and explain why the compromise between security and performance is the core problem in this area.
To do so, I will talk about lower bounds, recent attacks and constructions, and ongoing work, both theoretical and practical. This will give you a glimpse at the variety of techniques and tools that can be applied to searchable encryption, and at how wide this topic can be, ranging from theoretical computer science, to systems design.
Finally, I will conclude by describing some exciting open problems on searchable encryption, again both theoretical and practical.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;SerGor&quot;&gt;&lt;/a&gt;IRON: functional encryption using Intel SGX&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://cs.uwaterloo.ca/~sgorbuno/&quot;&gt;Sergey Gorbunov&lt;/a&gt;&lt;/em&gt; (University of Waterloo)&lt;/p&gt;

&lt;p&gt;Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an authorized entity compute on encrypted data, and learn the results in the clear. However, all current cryptographic instantiations for general FE are too impractical to be implemented. We build Iron, a practical and usable FE system using Intel’s recent Software Guard Extensions (SGX). We show that Iron can be applied to complex functionalities, and even for simple functions, outperforms the best known cryptographic schemes. We argue security by modeling FE in the context of hardware elements, and prove that Iron satisfies the security model.&lt;/p&gt;

&lt;p&gt;Joint work with: Ben A Fisch, Dhinakaran Vinayagamurthy, Dan Boneh&lt;/p&gt;
</description>
        <pubDate>Fri, 02 Jun 2017 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/fifth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/fifth.html</guid>
        
        
      </item>
    
      <item>
        <title>Jan 12 @ ENS</title>
        <description>&lt;p&gt;The fourth Paris Area Crypto Day will be held on 12.01.2017 (Thu) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http://www.di.ens.fr/CryptoAccess.html.en&quot;&gt;Amphi Dussane&lt;/a&gt;, ENS (&lt;a href=&quot;http://www.di.ens.fr/~wee/docs/ENS-map.pdf&quot;&gt;map&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1yAlkUyKNNxf0JeYJ_n9hgJHboi3lCgB-0TG6PqHVReU/viewform&quot;&gt;register&lt;/a&gt; (free, lunch included). Deadline 09.01.2016&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;09:30 - 09:50&lt;/td&gt;
      &lt;td&gt;Coffee &amp;amp; Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 11:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#VV&quot;&gt;Vinod Vaikuntanathan&lt;/a&gt; Low-Complexity Cryptographic Hash Functions&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:00 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#MC&quot;&gt;Melissa Chase&lt;/a&gt; Basing Privacy-Preserving Credentials on Standard Signatures&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 13:30&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 15:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#GP&quot;&gt;Guillaume Poupard&lt;/a&gt; De la crypto à la « cyberguerre » ?&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00 - 15:30&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30 - 16:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#PAF&quot;&gt;Pierre-Alain Fouque&lt;/a&gt; Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;VV&quot;&gt;&lt;/a&gt;Low-Complexity Cryptographic Hash Functions&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://people.csail.mit.edu/vinodv/&quot;&gt;Vinod Vaikuntanathan&lt;/a&gt;&lt;/em&gt; (MIT)&lt;/p&gt;

&lt;p&gt;Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is collision resistant hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which the function has the same output.&lt;/p&gt;

&lt;p&gt;Despite the ubiquitous role of hash functions in cryptography, several of the most basic questions regarding their computational and algebraic complexity remained open. In this work we settle most of these questions under new, but arguably quite conservative, cryptographic assumptions, whose study may be of independent interest.&lt;/p&gt;

&lt;p&gt;Concretely, we obtain the following results:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Low-complexity CRH. Assuming the intractability of finding short codewords in natural families of linear error-correcting codes, there are CRH that shrink the input by a constant factor and have a constant algebraic degree over Z_2 (as low as 3), or even constant output locality and input locality and thus computable by linear-size circuits. Such CRH are potentially MPC- and FHE-friendly.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Win-win results. If low-degree CRH with good shrinkage do not exist, this has useful consequences for learning algorithms and data structures.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Degree-2 hash functions. Assuming the conjectured intractability of solving a random system of quadratic equations over Z_2, a uniformly random degree-2 mapping is a universal one-way hash function (UOWHF). UOWHF relaxes CRH by forcing the attacker to find a collision with a random input picked by a challenger. On the other hand, a uniformly random degree-2 mapping is not a CRH. We leave the existence of degree-2 CRH open, and relate it to open questions on the existence of degree-2 randomized encodings of functions.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An important research direction is to understand the security of our assumptions from the cryptanalysis standpoint.&lt;/p&gt;

&lt;p&gt;Joint Work with Benny Applebaum, Naama Haramaty, Yuval Ishai and Eyal Kushilevitz, to appear in ITCS 2017.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;MC&quot;&gt;&lt;/a&gt;Basing Privacy-Preserving Credentials on Standard Signatures&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://research.microsoft.com/en-us/um/people/melissac/&quot;&gt;Melissa Chase&lt;/a&gt;&lt;/em&gt; (Microsoft Research)&lt;/p&gt;

&lt;p&gt;Practical anonymous credential systems are generally built around sigma-protocol ZK proofs. This requires that credentials be based on specially formed signatures. Here we ask whether we can instead use a standard (say, RSA, or (EC)DSA) signature that includes formatting and hashing messages, as a credential, and still provide privacy. Existing techniques do not provide efficient solutions for proving knowledge of such a signature: On the one hand, ZK proofs based on garbled circuits (Jawurek et al. 2013) give efficient proofs for checking formatting of messages and evaluating hash functions. On the other hand they are expensive for checking algebraic relations such as RSA or discrete-log, which can be done efficiently with sigma protocols.&lt;/p&gt;

&lt;p&gt;We design new constructions obtaining the best of both worlds: combining the efficiency of the garbled circuit approach for non-algebraic statements and that of sigma protocols for algebraic ones. We then discuss how to use these as building-blocks to construct privacy-preserving credential systems based on standard RSA and (EC)DSA signatures.&lt;/p&gt;

&lt;p&gt;Other applications of our techniques include anonymous credentials with more complex policies, the ability to efficiently switch between commitments (and signatures) in different groups, and secure two-party computation on committed/signed inputs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;GP&quot;&gt;&lt;/a&gt; De la crypto à la « cyberguerre » ?&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://www.ssi.gouv.fr/agence/organisation/la-direction-generale/&quot;&gt;Guillaume Poupard&lt;/a&gt;&lt;/em&gt; (ANSSI)&lt;/p&gt;

&lt;p&gt;Discipline pourtant exclusivement défensive, la cryptographie a historiquement été associée à nombre de conflits et d’histoires d’espionnage en tout genre. On aurait pu croire, avec la libéralisation mais également la banalisation de son usage dans notre vie de tous les jours que la crypto allait réintégrer le simple champ des technologies indispensables aux développements numériques mais il n’en est rien. Dans un contexte de fortes incertitudes géopolitiques où le « cyber » tend à jouer un rôle déstabilisateur de plus important mais également face à la menace de terroristes présumés adeptes de « messageries cryptées », la cryptologie continue à jouer un rôle complexe mais déterminant. Petit tour d’horizon de la question et des enjeux vu de l’ANSSI…&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;PAF&quot;&gt;&lt;/a&gt; Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;https://www.di.ens.fr/~fouque/&quot;&gt;Pierre-Alain Fouque&lt;/a&gt;&lt;/em&gt; (Rennes)&lt;/p&gt;

&lt;p&gt;The Transport Layer Security (TLS) protocol is designed to allow two
parties, a client and a server, to communicate securely over an
insecure network.  However, when TLS connections are proxied through
an intermediate middlebox, like a Content Delivery Network (CDN), the
standard end-to-end security guarantees of the protocol no longer
apply.  In this talk, we will investigate the security guarantees
provided by Keyless SSL, a CDN architecture currently deployed by
CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied
TLS connection. We demonstrate new attacks that show that Keyless SSL
does not meet its intended security goals. These attacks have been
reported to CloudFlare and we are in the process of discussing fixes.&lt;/p&gt;

&lt;p&gt;We argue that proxied TLS handshakes require a new, stronger, 3-party
security definition. We modify Keyless SSL and prove that our
modifications guarantee the new 3-party security, assuming
ACCE-security for the individual TLS 1.2 connections. We also propose
a new design for Keyless TLS 1.3 and prove its security, assuming that
the TLS 1.3 handshake implements an authenticated 2-party key
exchange. Notably, we show that secure proxying in Keyless TLS 1.3 is
computationally lighter and requires simpler assumptions on the
certificate infrastructure than our proposed fix for Keyless SSL. Our
results indicate that proxied TLS architectures, as currently used by
a number of CDNs, may be vulnerable to subtle attacks and deserve
close attention.&lt;/p&gt;

&lt;p&gt;joint work with K. Bhargavan, I. Carlson, C. Onete, and B. Richard
Will appear at EURO S&amp;amp;P 2017.&lt;/p&gt;

</description>
        <pubDate>Sun, 08 Jan 2017 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/fourth.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/fourth.html</guid>
        
        
      </item>
    
      <item>
        <title>Sep 6 @ INRIA</title>
        <description>&lt;p&gt;The third Paris Area Crypto Day will be held on 06.09.16 (Tue) at
INRIA.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://www.inria.fr/en/centre/paris/overview/how-to-reach-us&quot;&gt;Salle JL Lions&lt;/a&gt;, INRIA&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1q8oqAj31ODGjPV00q8bE6p4GMFHZgBXO6-V3p9Zc-No/&quot;&gt;register&lt;/a&gt; (free, lunch included). Deadline 01.09.2016&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 10:10&lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:10 - 11:10&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#VL&quot;&gt;Vadim Lyubashevsky&lt;/a&gt; Directions in Lattice Cryptography&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:30 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#MM&quot;&gt;Michele Minelli&lt;/a&gt; FHE Circuit Privacy Almost For Free&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 12:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#VLa&quot;&gt;Virginie Lallemand&lt;/a&gt; Cryptanalysis of the FLIP Family of Stream Ciphers&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:30 - 14:30&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:30 - 15:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#CB&quot;&gt;Chris Brzuska&lt;/a&gt; Assumptions in Cryptography&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30 - 16:00&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;16:00 - 16:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#BC&quot;&gt;Benoît Cogliati&lt;/a&gt; EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;16:30 - 17:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#GC&quot;&gt;Geoffroy Couteau&lt;/a&gt; Encryption Switching Protocols&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;VL&quot;&gt;&lt;/a&gt;Directions in Lattice Cryptography&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://researcher.ibm.com/researcher/view.php?person=zurich-VAD&quot;&gt;Vadim Lyubashevsky&lt;/a&gt;&lt;/em&gt; (IBM Zurich)&lt;/p&gt;

&lt;p&gt;In the past 20 years, lattice cryptography went from a purely
theoretical research area to actually being implemented inside of
Google Chrome today.  I will describe the state-of-the-art results in
practical lattice cryptography and sketch out what I consider to be
interesting directions for further research.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;MM&quot;&gt;&lt;/a&gt;HE Circuit Privacy Almost For Free&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Michele Minelli&lt;/em&gt; (ENS)&lt;/p&gt;

&lt;p&gt;Circuit privacy is an important property for many applications of
fully homomorphic encryption. Prior approaches for achieving circuit
privacy rely on superpolynomial noise flooding or on bootstrapping. In
this work, we present a conceptually different approach to circuit
privacy based on a novel characterization of the noise
distribution. In particular, we show that a variant of the GSW FHE for
branching programs already achieves circuit privacy; this immediately
yields a circuit-private FHE for NC1 circuits under the standard LWE
assumption with polynomial modulus-to-noise ratio. Our analysis relies
on a variant of the discrete Gaussian leftover hash lemma which states
that $e^t G^{−1}(v)$ + small noise does not depend on $v$. We believe
that this result is of independent interest.&lt;/p&gt;

&lt;p&gt;Joint work with Florian Bourse, Rafaël Del Pino and Hoeteck Wee&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;VLa&quot;&gt;&lt;/a&gt;Cryptanalysis of the FLIP Family of Stream Ciphers&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Virginie Lallemand&lt;/em&gt; (INRIA)&lt;/p&gt;

&lt;p&gt;At Eurocrypt 2016, Méaux et al. proposed FLIP, a new family of stream
ciphers intended for use in Fully Homomorphic Encryption
systems. Unlike its competitors which either have a low initial noise
that grows at each successive encryption, or a high constant noise,
the FLIP family of ciphers achieves a low constant noise thanks to a
new construction called filter permutator. In this paper, we present
an attack on the early version of FLIP that exploits the structure of
the filter function and the constant internal state of the
cipher. Applying this attack to the two instantiations proposed by
Méaux et al. allows for a key recovery in $2^{54}$ basic operations
(resp. $2^{68}$), compared to the claimed security of $2^{80}$
(resp. $2^{128}$).&lt;/p&gt;

&lt;p&gt;Joint work with Sébastien Duval and Yann Rotella&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;CB&quot;&gt;&lt;/a&gt;Assumptions in Cryptography&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;a href=&quot;http://chrisbrzuska.de/&quot;&gt;Chris Brzuska&lt;/a&gt;&lt;/em&gt; (TU Hamburg)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;BC&quot;&gt;&lt;/a&gt;EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Benoît Cogliati&lt;/em&gt; (University of Versailles)&lt;/p&gt;

&lt;p&gt;We propose a nonce-based MAC construction called EWCDM (&lt;em&gt;Encrypted
Wegman-Carter with Davies-Meyer&lt;/em&gt;), based on an almost xor-universal
hash function and a block cipher, with the following properties: (i)
it is simple and efficient, requiring only two calls to the block
cipher, one of which can be carried out in parallel to the hash
function computation; (ii) it is provably secure beyond the birthday
bound when nonces are not reused; (iii) it provably retains security
up to the birthday bound in case of nonce misuse. Our construction is
a simple modification of the Encrypted Wegman-Carter construction,
which is known to achieve only (i) and (iii) when based on a block
cipher. Underlying our new construction is a new PRP-to-PRF conversion
method coined Encrypted Davies-Meyer, which turns a pair of secret
random permutations into a function which is provably
indistinguishable from a perfectly random function up to at least
$2^{2n/3}$ queries, where $n$ is the bit-length of the domain of the
permutations.&lt;/p&gt;

&lt;p&gt;Joint work with Yannick Seurin&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;GC&quot;&gt;&lt;/a&gt;Encryption Switching Protocols&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Geoffroy Couteau&lt;/em&gt; (ENS)&lt;/p&gt;

&lt;p&gt;We put forth a novel cryptographic primitive: encryption switching
protocol (ESP), allowing to switch between two encryption
schemes. Intuitively, this two-party protocol converts given
ciphertexts from one scheme into ciphertexts of the same messages in
the other scheme, for any polynomial number of switches, in any
direction. Although ESP is a special kind of two-party computation
protocol, it turns out that ESP implies general two-party computation
under natural conditions. In particular, our new paradigm is tailored
to the evaluation of functions over rings. Indeed, assuming the
compatibility of two additively and multiplicatively homomorphic
encryption schemes, switching ciphertexts makes it possible to
efficiently reconcile the two internal laws. Since no such pair of
schemes appeared in the literature, except for the non-interactive
case of fully homomorphic encryption which still remains prohibitive
in practice, we build the first ElGamal-like encryption scheme over
$(Z_n;\times)$ as a complement to the Paillier encryption scheme over $(Z_n;+)$,
where $n$ is a strong RSA modulus. Eventually, we also instantiate
secure ESP between the two schemes, in front of malicious
adversaries. Thanks to a pre-processing step, we manage to get an
online communication in terms of group elements which neither depends
on the security parameter nor on the modulus $n$. This makes use of a
new technique called refreshable twin-ciphertext pool that is of
independent interest.&lt;/p&gt;

&lt;p&gt;Joint work with Thomas Peters and David Pointcheval&lt;/p&gt;
</description>
        <pubDate>Thu, 01 Sep 2016 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/third.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/third.html</guid>
        
        
      </item>
    
      <item>
        <title>June 30 @ ENS</title>
        <description>&lt;p&gt;The second Paris Area Crypto Day will be held on 30.06.16 (Thur) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://www.di.ens.fr/AccesDI.html.fr&quot;&gt;Amphi Rataud&lt;/a&gt;, ENS&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1avLA_9MSnv5qR0D1MriNhbKLsqB17CyOx2fP_sv_x4k/viewform&quot;&gt;register&lt;/a&gt; (free, lunch included). Deadline 27.06.16&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt; 9:50 - 10:00  &lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 11:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#AC&quot;&gt;Anne Canteaut&lt;/a&gt; Algebraic Distinguishers against Symmetric Primitives&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:00 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#LR&quot;&gt;Leonid Reyzin&lt;/a&gt; On Memory Hardness of SCrypt&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 14:00&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 15:30&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#VS&quot;&gt;Victor Shoup&lt;/a&gt; Hash Proof Systems, Old and New&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:30 - 16:00&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;16:00 - 17:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#RP&quot;&gt;Rafael Pass&lt;/a&gt; Analysis of the Blockchain Protocol in Asynchronous Networks&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Organizers.&lt;/strong&gt; Michel Abdalla and Hoeteck Wee (&lt;a href=&quot;https://crypto.di.ens.fr/web2py&quot;&gt;ENS&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Acknowledgements.&lt;/strong&gt; ERC &lt;a href=&quot;http://www.di.ens.fr/~pointche/CryptoCloud/&quot;&gt;CryptoCloud&lt;/a&gt;, &lt;a href=&quot;http://cordis.europa.eu/project/rcn/193658_en.html&quot;&gt;aSCEND&lt;/a&gt;, and &lt;a href=&quot;http://www.ecrypt.eu.org/net/&quot;&gt;ECRYPT-NET&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;AC&quot;&gt;&lt;/a&gt;Algebraic Distinguishers against Symmetric Primitives&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Anne Canteaut, INRIA&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Higher-order differential attacks, introduced by Knudsen in 1994, are the first family of attacks against block ciphers which exploit some specific property of the polynomial representation of the cipher. Indeed, these attacks rely on the fact that, for all keys, the involved multivariate polynomial does not have maximal degree. This idea has then been generalized by several authors and has led to the notion of cube distinguishers, and more recently to the so-called division property. Both generalizations actually exploit the fact that some given monomials do not appear in the polynomials. In this talk, I will present some unified view of these attacks, and I will show how such algebraic properties propagate through the successive layers of iterated primitives.&lt;/p&gt;

&lt;p&gt;Joint work with Christina Boura (Université de Versailles St Quentin)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;LR&quot;&gt;&lt;/a&gt;On Memory Hardness of SCrypt&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Leonid Reyzin, BU&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The key derivation function scrypt (Percival, 2009) is defined as the
result of n steps, where each step consists of selecting one or two
previously computed values (the selection depends on the values themselves)
and hashing them. It is conjectured that this function is memory-hard.&lt;/p&gt;

&lt;p&gt;We show that indeed scrypt is maximally memory-hard in the parallel random
oracle model. Specifically, we show that the product of memory and time
used during the computation of scrypt must be Theta(n^2). Moreover, even if
the amount of memory used fluctuates during the computation, we show that
the sum of memory usage over time (a.k.a. “cumulative memory complexity”
introduced by Alwen and Serbinenko in 2015) is Theta(n^2). This suggests
that computation of multiple instances of scrypt in cannot be improved via
amortization. Our result holds even if the adversary is allowed to make an
unlimited number of parallel random oracle queries at each step.&lt;/p&gt;

&lt;p&gt;Previous work (Alwen, Chen, Kamath, Kolmogorov, Pietrzak, Tessaro 2016)
showed a lowerbounds of Omega( n^2 / log^2 n) on the memory complexity of
scrypt in more restricted models, where the adversary was assumed to store
only random oracle outputs or specific functions of them. Our result
improves the bound quantitatively by eliminating the log^2 n factor and
qualitatively by allowing arbitrary storage by the adversary.&lt;/p&gt;

&lt;p&gt;Joint work with Joel Alwen, Jeremiah Blocki, and Krzysztof Pietrzak.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;VS&quot;&gt;&lt;/a&gt;Hash Proof Systems, Old and New&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Victor Shoup, NYU&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This talk will be an exposition on hash proof systems and
their applications. I will review the basic definitions,
constructions, and applications of hash proof systems, focusing on the
original application to chosen ciphertext secure public key
encryption, as well as more recent applications to password
authenticated key exchange.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;RP&quot;&gt;&lt;/a&gt;Analysis of the Blockchain Protocol in Asynchronous Networks&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Rafael Pass, Cornell&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called &lt;em&gt;permissionless&lt;/em&gt; setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend on the identities of the players. His ingenious protocol prevents “sybil attacks” (where an adversary spawns any number of new players) by relying on computational puzzles (a.k.a. “moderately hard functions”) introduced by Dwork and Naor (Crypto’92).&lt;/p&gt;

&lt;p&gt;Prior works that analyze the blockchain protocol either make the simplifying assumption that network channels are fully synchronous (i.e. messages are instantly delivered without delays) (Garay et al, Eurocrypt’15) or only consider specific attacks (Nakamoto’08; Sampolinsky and Zohar, FinancialCrypt’15); additionally, as far as we know, none of them deal with players joining or leaving the protocol.&lt;/p&gt;

&lt;p&gt;We prove that the blockchain consensus mechanism satisfies a strong forms of consistency and liveness in an asynchronous network with adversarial delays that are a-priori bounded, within a formal model allowing for adaptive corruption and spawning of new players, assuming that the computational puzzle is modeled as a random oracle. (We complement this result by showing a simple attack against the blockchain protocol in a fully asynchronous setting, showing that the “puzzle-hardness” needs to be appropriately set as a function of the maximum network delay.)&lt;/p&gt;

&lt;p&gt;As an independent contribution, we define an abstract notion of a blockchain protocol and identify appropriate security properties of such protocols; we prove that Nakamoto’s blockchain protocol satisfies them and that these properties are sufficient for typical applications. We finally show how to use our analysis to build &lt;em&gt;new&lt;/em&gt; blockchain protocols that overcome some of the bottlenecks in Nakamoto’s original protocol.&lt;/p&gt;

&lt;p&gt;The analysis of Nakamoto’s blockchain is based on joint work with Lior Seeman and abhi shelat, and new blockchain protocols are based on joint work with Elaine Shi.
No prior knowledge of Bitcoin or the blockchain will be assumed.&lt;/p&gt;

</description>
        <pubDate>Fri, 03 Jun 2016 10:10:00 +0000</pubDate>
        <link>https://pariscryptoday.github.io/second.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/second.html</guid>
        
        
      </item>
    
      <item>
        <title>Crypto Day 10000.10.10000</title>
        <description>&lt;p&gt;The first Paris Area Crypto Day will be held on 16.02.16 (Tues) at
ENS.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://www.di.ens.fr/AccesDI.html.fr&quot;&gt;Amphi Rataud&lt;/a&gt;, ENS&lt;/li&gt;
  &lt;li&gt;Please &lt;a href=&quot;https://docs.google.com/forms/d/1VkvweWTJN8s1s6CH_1PGq5NlDcNYGvpziEmRW-jkb1E/viewform&quot;&gt;register&lt;/a&gt; (free, lunch included). Deadline 11.02.16&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;program&quot;&gt;Program&lt;/h3&gt;

&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;10:00 - 10:10&lt;/td&gt;
      &lt;td&gt;Welcome&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;10:10 - 11:10&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#AJ&quot;&gt;Antoine Joux&lt;/a&gt; Technical History of Discrete Logarithms in Small Characteristic Finite Fields&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:20 - 11:40&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#RG&quot;&gt;Romain Gay&lt;/a&gt; Tightly Secure CCA-Secure Encryption without Pairings&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;11:40 - 12:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#PM&quot;&gt;Pierrick Méaux&lt;/a&gt; Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;12:00 - 14:00&lt;/td&gt;
      &lt;td&gt;Lunch&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;14:00 - 15:00&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#SB&quot;&gt;Sonia Belaïd&lt;/a&gt; On the Use of Masking to Defeat Power-Analysis Attacks&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:00 - 15:20&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#AP&quot;&gt;Alain Passelègue&lt;/a&gt; Randomness Complexity of Private Circuits for Multiplication&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:20 - 15:50&lt;/td&gt;
      &lt;td&gt;Coffee Break&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;15:50 - 16:50&lt;/td&gt;
      &lt;td&gt;&lt;a href=&quot;#KB&quot;&gt;Karthikeyan Bhargavan&lt;/a&gt; Freak, Logjam, and Sloth: Protecting TLS from Legacy Crypto&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Organizers.&lt;/strong&gt; Michel Abdalla and Hoeteck Wee (&lt;a href=&quot;https://crypto.di.ens.fr/web2py&quot;&gt;ENS&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Acknowledgements.&lt;/strong&gt; ERC &lt;a href=&quot;http://www.di.ens.fr/~pointche/CryptoCloud/&quot;&gt;CryptoCloud&lt;/a&gt; and &lt;a href=&quot;http://cordis.europa.eu/project/rcn/193658_en.html&quot;&gt;aSCEND&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;h3 id=&quot;abstracts&quot;&gt;Abstracts&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;AJ&quot;&gt;&lt;/a&gt;Technical History of Discrete Logarithms in Small Characteristic Finite Fields&lt;/strong&gt;
&lt;em&gt;Antoine Joux&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Due to its use in cryptographic protocols such as the Diffie–Hellman
key exchange, the discrete logarithm problem attracted a considerable
amount of attention in the past 40 years. In this talk, we summarize
the key technical ideas and their evolution for the case of discrete
logarithms in small characteristic finite fields. This road leads from
the original belief that this problem was hard enough for
cryptographic purpose to the current state of the art where the
algorithms are so efficient and practical that the problem can no
longer be considered for cryptographic use.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;SB&quot;&gt;&lt;/a&gt;On the Use of Masking to Defeat Power-Analysis Attacks&lt;/strong&gt;
&lt;em&gt;Sonia Belaïd&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;While most cryptographic algorithms are assumed to be secure against
black-box attacks, they are often vulnerable to side-channel attacks
which exploit the physical emanations of the underlying device (e.g.,
temperature, power consumption, time). In order to defeat such
attacks, several countermeasures have been exhibited within the last
two decades. So far, the most deployed one at the algorithmic level is
probably the use of masking. It consists in randomly splitting each
sensitive variable of the computation into t+1 shares, where the
masking order t represents the security level. While this
countermeasure is very efficient in practice, it can be complex to
design while t grows. During this talk, I will discuss the current
issues to build higher-order masking schemes and the solutions that
currently show up. In particular, I will present the construction of
theoretical proofs to show the security of such schemes in the widely
used t-probing leakage model.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;KB&quot;&gt;&lt;/a&gt;Freak, Logjam, and Sloth: Protecting TLS from Legacy Crypto&lt;/strong&gt;
&lt;em&gt;Karthikeyan Bhargavan&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The Transport Layer Security (TLS) protocol suffers from legacy bloat:
after 20 years of evolution, it features many versions, extensions,
and ciphersuites, some of which are obsolete and known to be
insecure. Implementations and deployments of TLS deal with this
complexity by implementing composite state machines that allow new and
old features to coexist for interoperability, while waiting for
deprecated features to be disabled over time. Getting this composition
right is tricky, and any flaw can result in a serious attack that
bypasses the expected security of TLS.&lt;/p&gt;

&lt;p&gt;This talk will discuss three recent vulnerabilities discovered in our
group: FREAK uses legacy support for export-grade RSA cipher suites to
break into connections between mainstream browsers and 25% of the web;
Logjam exploits a protocol flaw to confuse DHE key exchanges into
using export-grade Diffie-Hellman groups; SLOTH exploits hash function
collisions to mount downgrade and impersonation attacks on TLS. These
attacks rely on a combination of protocol-level weaknesses,
implementation bugs, and weak cryptography. The talk will advocate
principled methods to avoid such weaknesses in the future, such as
software verification and new robust designs for new protocols like
TLS 1.3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;RG&quot;&gt;&lt;/a&gt;Tightly Secure CCA-Secure Encryption without Pairings&lt;/strong&gt;
&lt;em&gt;Romain Gay&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We present the first CCA-secure public-key encryption scheme based on
DDH where the security loss is independent of the number of challenge
ciphertexts and the number of decryption queries. Our construction
extends also to the standard k-Lin assumption in pairing-free groups,
whereas all prior constructions starting with Hofheinz and Jager
(Crypto ‘12) rely on the use of pairings. Moreover, our construction
improves upon the concrete efficiency of existing schemes, reducing
the ciphertext overhead by about half (to only 3 group elements under
DDH), in addition to eliminating the use of pairings. We also show how
to use our techniques in the NIZK setting. Specifically, we construct
the first tightly simulation-sound designated-verifier NIZK for linear
languages without pairings. Using pairings, we can turn our
construction into a highly optimized publicly verifiable NIZK with
tight simulation-soundness.&lt;/p&gt;

&lt;p&gt;Joint work with Dennis Hofheinz, Eike Kiltz and Hoeteck Wee&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;PM&quot;&gt;&lt;/a&gt;Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts&lt;/strong&gt;
&lt;em&gt;Pierrick Méaux&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have
recently been proposed for two main reasons. First, minimizing the
implementation (time and memory) overheads that are inherent to
current FHE schemes. Second, improving the homomorphic capacity,
i.e. the amount of operations that one can perform on homomorphic
ciphertexts before bootstrapping, which amounts to limit their level
of noise.  Existing solutions for this purpose suggest a gap between
block ciphers and stream ciphers. The first ones typically allow a
constant but small homomorphic capacity, due to the iteration of
rounds eventually leading to complex Boolean functions (hence large
noise). The second ones typically allow a larger homomorphic capacity
for the first ciphertext blocks, that decreases with the number of
ciphertext blocks (due to the increasing Boolean complexity of the
stream ciphers’ output).  In this work, we aim to combine the best of
these two worlds, and propose a new stream cipher construction that
allows constant and small(er) noise. Its main idea is to apply a
Boolean (filter) function to a public bit permutation of a constant
key register, so that the Boolean complexity of its outputs is
constant.  We then propose an instantiation of the filter designed to
exploit recent (3rd-generation) FHE schemes, where the error growth is
quasi-additive when adequately multiplying ciphertexts with the same
amount of noise.  We finally analyze the cryptanalytic security and
noise of a couple of instances of this stream cipher, and conclude by
highlighting its excellent properties regarding the other goal of
minimizing the time and memory complexity of calculus delegation (for
2nd-generation FHE schemes).&lt;/p&gt;

&lt;p&gt;Joint work with Anthony Journault, François-Xavier Standaert and Claude Carlet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a name=&quot;AP&quot;&gt;&lt;/a&gt;Randomness Complexity of Private Circuits for Multiplication&lt;/strong&gt;
&lt;em&gt;Alain Passelègue&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Many cryptographic algorithms appear to be vulnerable to side channel
analysis and several leakage models have been introduced to better
understand these analyses. In 2003, Ishai, Sahai and Wagner introduced
the $d$-probing security model, in which an attacker can observe at
most $d$ intermediate values during a processing. They also proposed
an algorithm that securely performs the multiplication of 2 bits in
this model, using only $d(d+1)/2$ random bits to protect the
computation.  The $d$-probing model and the latter multiplication
algorithm are nowadays widely used by the community to either prove
the security of constructions or to define secure implementations.&lt;/p&gt;

&lt;p&gt;In this paper, we study the randomness complexity of multiplication
algorithms secure in the $d$-probing model. On this subject, we
propose several contributions: we provide new theoretical
characterizations and constructions, new practical constructions and a
new efficient algorithmic tool to analyze the security of such
schemes.&lt;/p&gt;

&lt;p&gt;We first start by a theoretical treatment of the subject: we propose
an algebraic model for multiplication algorithms and exhibit an
algebraic characterization of the security in the $d$-probing
model. Using this algebraic characterization, we prove a linear (in
$d$) lower bound as well as a quasi-linear (non-constructive) upper
bound for this randomness cost.  This characterization also allows us
to better understand the security of a multiplication algorithm and we
construct a new generic algorithm to perform secure multiplication in
the $d$-probing model that only uses $d + d^2/4$ random bits.&lt;/p&gt;

&lt;p&gt;From a practical point of view, we consider the important cases $d \le
4$ that are actually used in real-life implementations and we build
optimal algorithms for these small-order cases. More precisely, we
propose algorithms with a randomness complexity matching our
theoretical lower bound. Finally, still using our algebraic
characterization, we provide a new dedicated verification tool, based
on information set decoding, which aims at finding attacks on
algorithms for fixed order $d$ at a very low computational cost.&lt;/p&gt;

&lt;p&gt;Joint work with Sonia Belaïd, Fabrice Benhamouda, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.&lt;/p&gt;
</description>
        <pubDate>Thu, 04 Feb 2016 23:20:28 +0000</pubDate>
        <link>https://pariscryptoday.github.io/first.html</link>
        <guid isPermaLink="true">https://pariscryptoday.github.io/first.html</guid>
        
        
      </item>
    
  </channel>
</rss>
