ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Applied cryptography

Topics · Papers

Applied cryptography

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
Vasilios Mavroudis (University College London), Andrea Cerulli (University College London), Petr Svenda (Masaryk University), Dan Cvrcek (EnigmaBridge), Dusan Klinec (EnigmaBridge), George Danezis (University College London)
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli
Matus Nemec (Masaryk University / Ca’ Foscari University of Venice), Marek Sys (Masaryk University), Petr Svenda (Masaryk University), Dusan Klinec (Masaryk University / EnigmaBridge), Vashek Matyas (Masaryk University)
(Award Finalist)
[PDF]
[Artifact]
Session: 1H
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates
Kee Sung Kim (National Security Research Institute), Minkyu Kim (National Security Research Institute), Dongsoo Lee (National Security Research Institute), Je Hong Park (National Security Research Institute), Woo-Hwan Kim (National Security Research Institute)
[PDF]
Session: 1G
T/Key: Second-Factor Authentication From Secure Hash Chains
Dmitry Kogan (Stanford University), Nathan Manohar (Stanford University), Dan Boneh (Stanford University)
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov (Bell Labs), Jesper Buus Nielsen (Aarhus University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University), Roberto Trifiletti (Aarhus University)
Identity-Based Format-Preserving Encryption
Mihir Bellare (University of California, San Diego), Viet Tung Hoang (Florida State University)
[PDF]
Session: 3G
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Melissa Chase (Microsoft Research), David Derler (Graz University of Technology), Steven Goldfeder (Princeton University), Claudio Orlandi (Aarhus University), Sebastian Ramacher (Graz University of Technology), Christian Rechberger (Graz University of Technology / Denmark Technical University), Daniel Slamanig (AIT Austrian Institute of Technology), Greg Zaverucha (Microsoft Research)
[PDF]
Session: 1I
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz (Indiana University), Ryan Henry (Indiana University)
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Nico Döttling (University of California, Berkeley), Satrajit Ghosh (Aarhus University), Jesper Buus Nielsen (Aarhus University), Tobias Nilges (Aarhus University), Roberto Trifiletti (Aarhus University)
[PDF]
Session: 1K
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Mathy Vanhoef (KU Leuven, imec-DistriNet), Frank Piessens (KU Leuven, imec-DistriNet)
(Award Finalist)
[PDF]
[Paper]
Session: 3F
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Daniel Genkin (University of Pennsylvania / University of Maryland), Luke Valenta (University of Pennsylvania), Yuval Yarom (University of Adelaide / Data61)
Efficient Public Trace-and-Revoke from Standard Assumptions
Shweta Agrawal (IIT Madras), Sanjay Bhattacherjee (Turing Lab, ASU, ISI Kolkata), Duong Hieu Phan (XLIM (U. Limoges, CNRS), France), Damien Stehle (ENS Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL)), Shota Yamada (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal (Oregon State University), Mike Rosulek (Oregon State University)
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Gottfried Herold (ENS Lyon), Max Hoffmann (Ruhr-Universität Bochum), Michael Klooß  (Karlsruhe Institute of Technology), Carla Ràfols (UPF Barcelona), Andy Rupp (Karlsruhe Institute of Technology)
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Gunnar Hartung (Karlsruhe Institute of Technology), Max Hoffmann (Ruhr-Universität Bochum), Matthias Nagel (Karlsruhe Institute of Technology), Andy Rupp (Karlsruhe Institute of Technology)
[PDF]
Session: 3I
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs
Ming-Hsien Tsai (Academia Sinica), Bow-Yaw Wang (Academia Sinica), Bo-Yin Yang (Academia Sinica)
[PDF]
Session: 4I
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
Mihir Bellare (University of California, San Diego), Joseph Jaeger (University of California, San Diego), Julia Len (University of California, San Diego)
[PDF]
Session: 4D
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang (Oregon State University), Ceyhun D. Ozkaptan (Oregon State University), Attila A. Yavuz (Oregon State University), Jorge Guajardo (Robert Bosch Research and Technology Center), Tam Nguyen (Oregon State University)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost (Direction Générale de l’Armement - Maitrise de l’Information / Université de Rennes 1), Brice Minaud (Royal Holloway, University of London), Olga Ohrimenko (Microsoft Research, Cambridge)
Generic Semantic Security against a Kleptographic Adversary
Alexander Russell (University of Connecticut), Qiang Tang (New Jersey Institute of Technology), Moti Yung (Snap, Inc. / Columbia University), Hong-Sheng Zhou (Virginia Commonwealth University)
[PDF]
Session: 4D
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti (Cornell University), Fan Zhang (Cornell University), Yan Ji (Cornell University), Ahmed Kosba (University of Maryland), Ari Juels (Cornell Tech, Jacobs Institute), Elaine Shi (Cornell University)
To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures
Peter Pessl (Graz University of Technology), Leon Groot Bruinderink (Technische Universiteit Eindhoven), Yuval Yarom (University of Adelaide / Data61)
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
Cryptographically Secure Information Flow Control on Key-Value Stores
Lucas Waye (Harvard University), Pablo Buiras (Harvard University), Owen Arden (University of California, Santa Cruz), Alejandro Russo (Chalmers University of Technology), Stephen Chong (Harvard University)
HACL*: A Verified Modern Cryptographic Library
Jean-Karim Zinzindohoué (Inria Paris), Karthikeyan Bhargavan (Inria Paris), Jonathan Protzenko (Microsoft Research), Benjamin Beurdouche (Inria Paris)
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche (United States Naval Academy), Adam J. Aviv (United States Naval Academy), Seung Geol Choi (United States Naval Academy), Travis Mayberry (United States Naval Academy)
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang (University of Maryland), Samuel Ranellucci (University of Maryland / George Mason University), Jonathan Katz (University of Maryland)
(Award Finalist)
[PDF]
[Paper]
[Artifact]
Session: 1A
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen (Microsoft Research), Kim Laine (Microsoft Research), Peter Rindal (Oregon State University)
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Miguel Ambrona (IMDEA Software Institute / Universidad Politécnica de Madrid), Gilles Barthe (IMDEA Software Institute), Romain Gay (ENS, Paris), Hoeteck Wee (ENS, Paris)
[PDF]
Session: 4C
Iron: Functional Encryption using Intel SGX
Ben Fisch (Stanford University), Dhinakaran Vinayagamurthy (University of Waterloo), Dan Boneh (Stanford University), Sergey Gorbunov (University of Waterloo)
(Award Finalist)
[PDF]
[Paper]
Session: 1D
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare (University of California, San Diego), Wei Dai (University of California, San Diego)
[PDF]
Session: 4D
Scaling ORAM for Secure Computation
Jack Doerner (Northeastern University), abhi shelat (Northeastern University)
(Award Finalist)
[PDF]
[Paper]
[Artifact]
Session: 1C
Verified Correctness and Security of mbedTLS HMAC-DRBG
Katherine Q. Ye (Princeton University / Carnegie Mellon University), Matthew Green (Johns Hopkins University), Naphat Sanguansin (Princeton University), Lennart Beringer (Princeton University), Adam Petcher (Oracle), Andrew W. Appel (Princeton University)
Implementing BP-Obfuscation Using Graph-Induced Encoding
Shai Halevi (IBM), Tzipora Halevi (IBM), Victor Shoup (IBM and New York University), Noah Stephens-Davidowitz (New York University)
Global-Scale Secure Multiparty Computation
Xiao Wang (University of Maryland), Samuel Ranellucci (University of Maryland / George Mason University), Jonathan Katz (University of Maryland)
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
Shay Gueron (Haifa University / AWS), Yehuda Lindell (Bar-Ilan University)
(Award Finalist)
[PDF]
[Paper]
Session: 1E
The TypTop System: Personalized Typo-tolerant Password Checking
Rahul Chatterjee (Cornell Tech), Joanne Woodage (Royal Holloway, University of London), Yuval Pnueli (Technion - Israel Institute of Technology), Anusha Chowdhury (Cornell University), Thomas Ristenpart (Cornell Tech)
No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial
Yong Li (Huawei Technologies Düsseldorf), Sven Schäge (Ruhr-Universität Bochum)
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal (Visa Research), Melissa Chase (Microsoft Research)
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau (UPMC), Pierre-Alain Fouque (Université de Rennes 1), Benoït Gérard (DGA.MI), Mehdi Tibouchi (NTT Secure Platform Laboratories)
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu (Aalto University), Mika Juuti (Aalto University), Yao Lu (Aalto University), N. Asokan (Aalto University)
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli (City College of New York), Rosario Gennaro (City College of New York), Steven Goldfeder (Princeton University), Luca Nizzardo (IMDEA Software Institute and Universidad Politécnica de Madrid)
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Vladimir Kolesnikov (Bell Labs), Naor Matania (Bar-Ilan University), Benny Pinkas (Bar-Ilan University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University)
Jasmin: High-Assurance and High-Speed Cryptography
José Bacelar Almeida (HASLab – INESC TEC / Universidade do Minho), Manuel Barbosa (HASLab – INESC TEC / DCC FC Universidade do Porto), Gilles Barthe (IMDEA Software Institute), Arthur Blot (ENS Lyon), Benjamin Grégoire (Inria), Vincent Laporte (IMDEA Software Institute), Tiago Oliveira (HASLab – INESC TEC / Universidade do Minho), Hugo Pacheco (HASLab – INESC TEC / Universidade do Minho), Benedikt Schmidt (IMDEA Software Institute), Pierre-Yves Strub (Ecole Polytechnique)
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
Arka Rai Choudhuri (Johns Hopkins University), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), Gabriel Kaptchuk (Johns Hopkins University), Ian Miers (Johns Hopkins University)
[PDF]
Session: 5C
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green (Johns Hopkins University), Ian Miers (Johns Hopkins University)
[PDF]
Session: 5B
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors
Fahad Shaon (University of Texas at Dallas), Murat Kantarcioglu (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas), Latifur Khan (University of Texas at Dallas)
[PDF]
Session: 5E
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran (Microsoft Research India), Juan Garay (Texas A&M University), Payman Mohassel (Visa Research), Satyanarayana Vusirikala (Microsoft Research India)
Homomorphic Secret Sharing: Optimizations and Applications
Elette Boyle (IDC Herzliya), Geoffroy Couteau (ENS, Paris), Niv Gilboa (Ben Gurion University), Yuval Ishai (Technion / University of California, Los Angeles), Michele Orru (ENS, Paris)