ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Protocols

Topics · Papers

Protocols

Practical Secure Aggregation for Privacy-Preserving Machine Learning
Keith Bonawitz (Google), Vladimir Ivanov (Google), Ben Kreuter (Google), Antonio Marcedone (Cornell University), H. Brendan McMahan (Google), Sarvar Patel (Google), Daniel Ramage (Google), Aaron Segal (Google), Karn Seth (Google)
Full accounting for verifiable outsourcing
Riad S. Wahby (Stanford University), Ye Ji (New York University), Andrew J. Blumberg (University of Texas at Austin), abhi shelat (Northeastern University), Justin Thaler (Georgetown University), Michael Walfish (New York University), Thomas Wies (New York University)
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov (Bell Labs), Jesper Buus Nielsen (Aarhus University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University), Roberto Trifiletti (Aarhus University)
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz (Indiana University), Ryan Henry (Indiana University)
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Nico Döttling (University of California, Berkeley), Satrajit Ghosh (Aarhus University), Jesper Buus Nielsen (Aarhus University), Tobias Nilges (Aarhus University), Roberto Trifiletti (Aarhus University)
[PDF]
Session: 1K
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain
Jan Camenisch (IBM Research - Zürich), Manu Drijvers (IBM Research - Zürich / ETH Zürich), Maria Dubovitskaya (IBM Research - Zürich)
[PDF]
Session: 5C
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Mathy Vanhoef (KU Leuven, imec-DistriNet), Frank Piessens (KU Leuven, imec-DistriNet)
(Award Finalist)
[PDF]
[Paper]
Session: 3F
Revive: Rebalancing Off-Blockchain Payment Networks
Rami Khalil (ETH Zürich), Arthur Gervais (ETH Zürich)
Efficient Public Trace-and-Revoke from Standard Assumptions
Shweta Agrawal (IIT Madras), Sanjay Bhattacherjee (Turing Lab, ASU, ISI Kolkata), Duong Hieu Phan (XLIM (U. Limoges, CNRS), France), Damien Stehle (ENS Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL)), Shota Yamada (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal (Oregon State University), Mike Rosulek (Oregon State University)
A Comprehensive Symbolic Analysis of TLS 1.3
Cas Cremers (University of Oxford), Marko Horvat (The Max Planck Institute For Software Systems), Jonathan Hoyland (Royal Holloway, University of London), Sam Scott (Royal Holloway, University of London), Thyla van der Merwe (Royal Holloway, University of London)
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Gottfried Herold (ENS Lyon), Max Hoffmann (Ruhr-Universität Bochum), Michael Klooß  (Karlsruhe Institute of Technology), Carla Ràfols (UPF Barcelona), Andy Rupp (Karlsruhe Institute of Technology)
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
Ruiyu Zhu (Indiana University), Yan Huang (Indiana University), Darion Cassel (Carnegie Mellon University)
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Gunnar Hartung (Karlsruhe Institute of Technology), Max Hoffmann (Ruhr-Universität Bochum), Matthias Nagel (Karlsruhe Institute of Technology), Andy Rupp (Karlsruhe Institute of Technology)
[PDF]
Session: 3I
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang (Oregon State University), Ceyhun D. Ozkaptan (Oregon State University), Attila A. Yavuz (Oregon State University), Jorge Guajardo (Robert Bosch Research and Technology Center), Tam Nguyen (Oregon State University)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost (Direction Générale de l’Armement - Maitrise de l’Information / Université de Rennes 1), Brice Minaud (Royal Holloway, University of London), Olga Ohrimenko (Microsoft Research, Cambridge)
Algorithm Substitution Attacks from a Steganographic Perspective
Sebastian Berndt (University of Luebeck), Maciej Liskiewicz (University of Luebeck)
A Type System for Privacy Properties
Véronique Cortier (Loria, CNRS / Inria), Niklas Grimm (TU Wien), Joseph Lallemand (Loria, CNRS / Inria), Matteo Maffei (TU Wien)
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao (The Ohio State University), Mengyuan Li (The Ohio State University), Sanchuan Chen (The Ohio State University), Yinqian Zhang (The Ohio State University)
HACL*: A Verified Modern Cryptographic Library
Jean-Karim Zinzindohoué (Inria Paris), Karthikeyan Bhargavan (Inria Paris), Jonathan Protzenko (Microsoft Research), Benjamin Beurdouche (Inria Paris)
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche (United States Naval Academy), Adam J. Aviv (United States Naval Academy), Seung Geol Choi (United States Naval Academy), Travis Mayberry (United States Naval Academy)
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen (Microsoft Research), Kim Laine (Microsoft Research), Peter Rindal (Oregon State University)
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta (Friedrich-Alexander University Erlangen Nuernberg), Pedro Moreno-Sanchez (Purdue University), Aniket Kate (Purdue University), Matteo Maffei (TU Wien), Srivatsan Ravi (University of Southern California)
Practical Quantum-Safe Voting from Lattices
Rafael del Pino (IBM Research - Zürich), Vadim Lyubashevsky (IBM Research - Zürich), Gregory Neven (IBM Research - Zürich), Gregor Seiler (IBM Research - Zürich)
[PDF]
Session: 4G
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
Scott Ames (University of Rochester), Carmit Hazay (Bar-Ilan University), Yuval Ishai (Technion / University of California, Los Angeles), Muthuramakrishnan Venkitasubramaniam (University of Rochester)
[PDF]
Session: 1J
Scaling ORAM for Secure Computation
Jack Doerner (Northeastern University), abhi shelat (Northeastern University)
(Award Finalist)
[PDF]
[Paper]
[Artifact]
Session: 1C
No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial
Yong Li (Huawei Technologies Düsseldorf), Sven Schäge (Ruhr-Universität Bochum)
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal (Visa Research), Melissa Chase (Microsoft Research)
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu (Aalto University), Mika Juuti (Aalto University), Yao Lu (Aalto University), N. Asokan (Aalto University)
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli (City College of New York), Rosario Gennaro (City College of New York), Steven Goldfeder (Princeton University), Luca Nizzardo (IMDEA Software Institute and Universidad Politécnica de Madrid)
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Vladimir Kolesnikov (Bell Labs), Naor Matania (Bar-Ilan University), Benny Pinkas (Bar-Ilan University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University)
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
Arka Rai Choudhuri (Johns Hopkins University), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), Gabriel Kaptchuk (Johns Hopkins University), Ian Miers (Johns Hopkins University)
[PDF]
Session: 5C
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green (Johns Hopkins University), Ian Miers (Johns Hopkins University)
[PDF]
Session: 5B
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping
Zhangkai Zhang (Beihang University), Xuhua Ding (Singapore Management University), Gene Tsudik (University of California, Irvine), Jinhua Cui (Singapore Management University), Zhoujun Li (Beihang University)
[PDF]
Session: 2A
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran (Microsoft Research India), Juan Garay (Texas A&M University), Payman Mohassel (Visa Research), Satyanarayana Vusirikala (Microsoft Research India)