所有文章 > 正文

信息安全顶会Crypto进行时,GCT带您信息速览!

作者: GCT

浏览量: 217

时间: 2019-08-19 12:01

关键词: 信息安全,Crypto,智库,GCT

8月18日,一年一度的信息安全盛会Crypto在美国加州的圣巴巴拉召开,本届会议为期5天。这次会议是由国际密码学研究协会(IACR)组织,IACR是一个非营利的科学组织,其宗旨是在密码学和相关领域进行深入研究。

zt2.png

本届会议一共接受论文81篇,论文方向主要集中在密码学、密码分析、量子安全等领域。本届的最佳论文奖也已经公布出来了,让我们来简单了解一下。

Best Paper

Title:Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

作者:Akiko Inoue,Tetsu Iwata,Kazuhiko Minematsu,Bertram Poettering

Abstrcat:We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and since its proposal about 15 years ago it belongs to the top performers in this realm. OCB2 was included in an ISO standard in 2009.An internal building block of OCB2 is the tweakable blockcipher obtained by operating a regular blockcipher in XEX mode. The latter provides security only when evaluated in accordance with certain technical restrictions that, as we note, are not always respected by OCB2. This leads to devastating attacks against OCB2’s security promises: We develop a range of very practical attacks that, amongst others, demonstrate universal forgeries and full plaintext recovery. We complete our report with proposals for (provably) repairing OCB2. To our understanding, as a direct consequence of our findings, OCB2 is currently in a process of removal from ISO standards. Our attacks do not apply to OCB1 and OCB3, and our privacy attacks on OCB2 require an active adversary.

Best Young Researcher Papers

Title:Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE

作者:Samuel Jaques,John M. Schanck

Abstract:We introduce models of computation that enable direct comparisons between classical and quantum algorithms. Incorporating previous work on quantum computation and error correction, we justify the use of the gate-count and depth-times-width cost metrics for quantum circuits. We demonstrate the relevance of these models to cryptanalysis by revisiting, and increasing, the security estimates for the Supersingular Isogeny Diffie–Hellman (SIDH) and Supersingular Isogeny Key Encapsulation (SIKE) schemes. Our models, analyses, and physical justifications have applications to a number of memory intensive quantum algorithms.

Title:Fully Secure Attribute-Based Encryption for t-CNF from LWE

作者:Rotem Tsabary

Abstract:Attribute-based Encryption (ABE), first introduced by [SW05,GPSW06], is a public key encryption system that can support multiple users with varying decryption permissions. One of the main properties of such schemes is the supported function class of policies. While there are fully secure constructions from bilinear maps for a fairly large class of policies, the situation with lattice-based constructions is less satisfactory and many efforts were made to close this gap. Prior to this work the only known fully secure lattice construction was for the class of point functions (also known as IBE).

In this work we construct for the first time a lattice-based (ciphertext-policy) ABE scheme for the function class?t-CNF, which consists of CNF formulas where each clause depends on at most t bits of the input, for any constant?t. This class includes NP-verification policies, bit-fixing policies and t-threshold policies. Towards this goal we also construct a fully secure single-key constrained PRF from OWF for the same function class, which might be of independent interest.

本届会议,除了精彩的论文汇报,还有学术大咖带来的讲座。本次会议共有两个特邀讲座,演讲者分别是来自康奈尔大学的Helen Nissenbaum 教授和来自马里兰大学的Jonathan Katz教授。小编也整理了两位学者的信息,不妨来了解一下。

Helen Nissenbaum

zt3.png

简介:Helen Nissenbaum是康奈尔理工学院和康奈尔大学信息科学系的教授。她的研究是从伦理的角度看待与信息技术、计算、数字媒体和数据科学相关的政策、法律、科学和工程。主题包括隐私、信任、责任感、安全性和技术设计中的价值观。她的书包括《困惑:隐私和抗议用户指南》、《隐私语境:技术、政策和社会生活的完整性》。

Jonathan Katz

zt4.png

简介:Jonathan Katz 1996年获得麻省理工学院数学和化学学士学位,随后于1998年获得哥伦比亚大学化学硕士学位。2002年获得哥伦比亚大学计算机科学博士学位。在研究生院期间,他在Telcordia Technologies(现在是ACS)担任研究科学家。他从2002年起就在马里兰大学教职。他曾在UCLA、IBM T.J.Watson研究中心和Ecole Normale Superieur担任访问职位。

学者图片来自GCT官网:https://gct.aminer.cn/

本次会议的附属活动已于8月17日-18日举行,活动的内容如下表:

zt5.png

更多本届会议的内容可登录Crypto官网查询:https://crypto.iacr.org/2019/index.html

[关于转载]:本文为“AMiner”官网文章。转载本文请联系原作者获取授权,转载仅限全文转载并保留文章标题及内容,不得删改、添加内容绕开原创保护,且文章开头必须注明:转自“AMiner”官网。谢谢您的合作。

扫码微信阅读
[关于转载]:本文转载于GCT,仅用于学术分享,有任何问题请与我们联系:report@aminer.cn。