ASIACRYPT 2022: 
Taipei, Taiwan
December 5-12, 2022
cryptodb information for ASIACRYPT 2022
Organizational Committee
Program Chairs:
Shweta Agrawal Dongdai Lin
General Chairs:
Kai-Min Chung and Bo-Yin Yang
Shweta Agrawal Dongdai Lin
General Chairs:
Kai-Min Chung and Bo-Yin Yang
Program Committee
Divesh Aggarwal
Adi Akavia
Martin R. Albrecht
Ghada Almashaqbeh
Benny Applebaum
Lejla Batina
Carsten Baum
Sonia Belaïd
Mihir Bellare
Andrej Bogdanov
Christina Boura
Ran Canetti
Jie Chen
Yilei Chen
Jung Hee Cheon
Ilaria Chillotti
Michele Ciampi
Craig Costello
Itai Dinur
Nico Döttling
Maria Eichlseder
Saba Eskandarian
Marc Fischlin
Pierre-Alain Fouque
Steven D. Galbraith
Chaya Ganesh
Juan A. Garay
Sanjam Garg
Daniel Genkin
Siyao Guo
Jian Guo
Mohammad Hajiabadi
Mike Hamburg
David Heath
Viet Tung Hoang
Xinyi Huang
Takanori Isobe
Tetsu Iwata
Khoongming Khoo
Elena Kirshanova
Ilan Komargodski
Gregor Leander
Tianren Liu
Shengli Liu
Zhe Liu
Qipeng Liu
Hemanta K. Maji
Giulio Malavolta
Bart Mennink
Tal Moran
Pratyay Mukherjee
Omkant Pandey
Anat Paskin-Cherniavsky
Alain Passelègue
Svetla Petkova-Nikova
Duong Hieu Phan
Cécile Pierrot
Silas Richelson
Yu Sasaki
Tobias Schneider
Dominique Schröder
abhi shelat
Mark Simkin
Fang Song
Ling Song
Pratik Soni
Akshayaram Srinivasan
Damien Stehlé
Ron Steinfeld
Qiang Tang
Yiannis Tselekounis
Xiaoyun Wang
Meiqin Wang
Wenling Wu
David Wu
Shota Yamada
Takashi Yamakawa
Jiang Zhang
- Award Papers
- Best Paper Award
Full Quantum Equivalence of Group Action DLog and CDH, and More,
Hart Montgomery, Mark Zhandry,
bibinfo, video - Best Paper by Early Career Researcher Award
Cryptographic Primitives with Hinting Property,
Sikhar Patranabis, Navid Alamati,
bibinfo, video - Runner up Best Paper
SwiftEC: Shallue--van de Woestijne Indifferentiable Function to Elliptic Curves,
Francisco Rodríguez-Henríquez, Mehdi Tibouchi, Jorge Chavez-Saab,
bibinfo, video
- Best Paper Award
- Functional and Witness Encryption
- Multi-Client Functional Encryption with Fine-Grained Access Control,
David Pointcheval, Duong Hieu Phan, Ky Nguyen,
bibinfo, video - Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH,
Katsuyuki Takashima, Pratish Datta, Tapas Pal,
bibinfo, video - Collusion-Resistant Functional Encryption for RAMs,
Kai-Min Chung, Prabhanjan Ananth, Xiong Fan, Luowen Qian,
bibinfo - Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity,
Yi Deng, Xinxuan Zhang,
bibinfo, video
- Multi-Client Functional Encryption with Fine-Grained Access Control,
- Symmetric Key Cryptanalysis 1
- Algebraic Meet-in-the-Middle Attack on LowMC,
Willi Meier, Santanu Sarkar, Takanori Isobe, Fukang Liu, Gaoli Wang,
bibinfo, video - Latin Dances Reloaded: Improved Cryptanalysis against Salsa and ChaCha, and the proposal of Forró,
Murilo Coutinho Silva, Iago Passos, Juan Grados, Fábio de Mendonça, Rafael Timóteo, Fábio Borges,
bibinfo, video - Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256,
Xiaoyun Wang, Xiaoyang Dong, An Wang, Lingyue Qin, Jialiang Hua,
bibinfo, video - Enhancing Differential-Neural Cryptanalysis,
Jian Guo, Meicheng Liu, Zhenzhen Bao, Yi Tu, Li Ma,
bibinfo, video
- Algebraic Meet-in-the-Middle Attack on LowMC,
- Multiparty Computation 1
- Random Sources in Private Computation,
Adi Rosén, Geoffroy Couteau,
bibinfo, video - Non-Interactive Secure Computation of Inner-Product from LPN and LWE,
Geoffroy Couteau, Maryam Zarezadeh,
bibinfo, video - Efficient Adaptively-Secure Byzantine Agreement for Long Messages,
Kartik Nayak, Julian Loss, Chen-Da Liu-Zhang, Amey Bhangale,
bibinfo, video
- Random Sources in Private Computation,
- Real World Protocols
- Key-schedule Security for the TLS 1.3 Standard,
Markulf Kohlweiss, Cédric Fournet, Chris Brzuska, Antoine Delignat-Lavaud, Konrad Kohbrok, Christoph Egger,
bibinfo, video - YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model,
Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring,
bibinfo, video - State Machine Replication under Changing Network Conditions,
Jonathan Katz, Julian Loss, Erica Blum, Andreea Alexandru,
bibinfo, video
- Key-schedule Security for the TLS 1.3 Standard,
- Blockchains & Cryptocurrencies
- Non-interactive Mimblewimble transactions, revisited,
Georg Fuchsbauer, Michele Orrù,
bibinfo, video - Practical Provably Secure Flooding for Blockchains,
Christian Matt, Ueli Maurer, Chen-Da Liu-Zhang, Guilherme Rito, Søren Eller Thomsen,
bibinfo, video - SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients,
Peter Gaži, Georg Fuchsbauer, Hamza Abusalah, Karen Klein,
bibinfo, video
- Non-interactive Mimblewimble transactions, revisited,
- Isogeny Based Cryptography
- A New Isogeny Representation and Applications to Cryptography,
Antonin Leroux,
bibinfo, video - Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM,
Eike Kiltz, Doreen Riepel, Dominik Hartmann, Sabrina Kunzweiler, Julien Duman, Jonas Lehmann,
bibinfo, video - Horizontal racewalking using radical isogenies,
Frederik Vercauteren, Wouter Castryck, Thomas Decru, Marc Houben,
bibinfo, video - Threshold Linearly Homomorphic Encryption on Z/2^kZ,
Fabien Laguillaumie, Guilhem Castagnos, Ida Tucker,
bibinfo, video
- A New Isogeny Representation and Applications to Cryptography,
- Homomorphic Encryption
- Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping,
Daniele Micciancio, Yuriy Polyakov, Zeyu Li,
bibinfo, video - EvalRound Algorithm in CKKS Bootstrapping,
Charles Momin, Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim,
bibinfo, video - FINAL: Faster FHE instantiated with NTRU and LWE,
Nigel P. Smart, Ilia Iliashenko, Charlotte Bonte, Hilder Vitor Lima Pereira, Jeongeun Park,
bibinfo, video
- Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping,
- Proofs and SNARKs
- Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup,
Ning Wang, Sid Chi-Kin Chau,
bibinfo, video - Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation,
Abhi Shelat, Yashvanth Kondi,
bibinfo, video - Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK,
Helger Lipmaa, Janno Siim, Michał Zając,
bibinfo, video - SIDH Proof of Knowledge,
Steven D. Galbraith, Luca De Feo, Lukas Zobernig, Samuel Dobson,
bibinfo, video
- Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup,
- Non Interactive Zero Knowledge
- Unconditionally Secure NIZK in the Fine-Grained Setting,
Jiaxin Pan, Yuyu Wang,
bibinfo, video - Triply Adaptive UC NIZK,
Ran Canetti, Xiao Wang, Pratik Sarkar,
bibinfo, video - Efficient NIZKs from LWE via Polynomial Reconstruction and 'MPC in the Head',
Amit Sahai, Riddhi Ghosal, Paul Lou,
bibinfo, video
- Unconditionally Secure NIZK in the Fine-Grained Setting,
- Symmetric Cryptography 1
- Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security,
Ferdinand Sibleyras, Yaobin Shen,
bibinfo, video - Jammin' on the deck,
Joan Daemen, Gilles Van Assche, Seth Hoffert, Ronny Van Keer, Norica Băcuieți,
bibinfo, video - A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs,
Kan Yasuda, Takanori Isobe, Yosuke Todo, Akinori Hosoyamada,
bibinfo, video
- Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security,
- Practical Cryptography 1
- New Algorithms and Analyses for Sum-Preserving Encryption,
Scott Yilek, Sarah Miracle,
bibinfo, video - Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-,
Pierrick Méaux, François-Xavier Standaert, Clément Hoffmann, Orel Cosseron,
bibinfo, video - Revisiting Related-Key Boomerang attacks on AES using computer-aided tool,
Pierre-Alain Fouque, Patrick Derbez, Marie Euler, Phuong Hoa Nguyen,
bibinfo, video
- New Algorithms and Analyses for Sum-Preserving Encryption,
- Advanced Encryption 1
- Traceable Receipt-Free Encryption,
Olivier Pereira, Thomas Peters, Henri Devillez,
bibinfo - Efficient Searchable Symmetric Encryption for Join Queries,
Charanjit S. Jutla, Sikhar Patranabis,
bibinfo, video - Witness Encryption and Null-IO from Evasive LWE,
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs,
bibinfo
- Traceable Receipt-Free Encryption,
- Zero Knowledge
- Short-lived zero-knowledge proofs and signatures,
Joseph Bonneau, Jeremy Clark, Arasu Arun,
bibinfo, video - Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency,
Yevgeniy Dodis, Esha Ghosh, Antonio Marcedone, Brian Chen, Eli Goldin, Balachandar Kesavan, Merry Ember Mou,
bibinfo, video - DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF,
Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng, Gongxian Zeng,
bibinfo, video
- Short-lived zero-knowledge proofs and signatures,
- Symmetric Cryptography 2
- Security of Truncated Permutation Without Initial Value,
Bart Mennink, Lorenzo Grassi,
bibinfo, video - Multi-User Security of the Sum of Truncated Random Permutations,
Jooyoung Lee, Wonseok Choi, Yeongmin Lee, Hwigyeom Kim,
bibinfo, video - Puncturable Key Wrapping and Its Applications,
Kenneth G. Paterson, Felix Günther, Matilda Backendal,
bibinfo, video
- Security of Truncated Permutation Without Initial Value,
- Invited Talk 1
-
https://iacr.org/cryptodb/data/paper.php?pubkey=34074>Evolution of Cryptanalysis: Security Updates on SHA-3 and AES Hashing
by Jian Guo - Multiparty Computation 2
- Concurrently Composable Non-Interactive Secure Computation,
Rafael Pass, Andrew Morgan,
bibinfo, video - Attaining GOD Beyond Honest Majority With Friends and Foes,
Arpita Patra, Nishat Koti, Aditya Hegde, Varsha Bhat Kukkala, Shravani Patil, Protik Paul,
bibinfo, video - Towards Practical Topology-Hiding Computation,
Shuaishuai Li,
bibinfo, video
- Concurrently Composable Non-Interactive Secure Computation,
- Symmetric Key Cryptanalysis 2
- Towards Tight Security Bounds for OMAC, XCBC and TMAC,
Mridul Nandi, Ashwin Jha, Soumya Chattopadhyay,
bibinfo, video - A Modular Approach to the Security Analysis of Two-Permutation Constructions,
Yu Long Chen,
bibinfo, video - Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery,
Lei Hu, Jian Weng, Jingyuan Zhao, Qianqian Yang, Ling Song, Danping Shi, Neng Zhang,
bibinfo, video
- Towards Tight Security Bounds for OMAC, XCBC and TMAC,
- Quantum Algorithms
- Nostradamus goes Quantum,
Marc Fischlin, Barbara Jiabao Benedikt, Moritz Huppert,
bibinfo, video - Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits,
Siwei Sun, Zhenyu Huang,
bibinfo, video - Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3,
Jian Guo, Ling Song, Guozhen Liu, Yi Tu,
bibinfo, video
- Nostradamus goes Quantum,
- Zero Knowledge
- Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection,
Damien Vergnaud, Matthieu Rivain, Thibauld Feneuil, Jules Maire,
bibinfo, video - Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier,
Jae Hong Seo, Sungwook Kim, Hyeonbum Lee,
bibinfo, video - Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers,
Xiao Wang, Kang Yang,
bibinfo, video
- Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection,
- Lattice Algorithms and Cryptanalysis
- Log-S-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP,
Thuc D. Nguyen, Adeline Roux-Langlois, Olivier Bernard, Andrea Lesavourey,
bibinfo - On Module Unique-SVP and NTRU,
Damien Stehlé, Alice Pellet-Mary, Joël Felderhoff,
bibinfo, video - A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW,
Yu Yu, Hanlin Liu,
bibinfo, video - Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange,
Huaxiong Wang, Lei Hu, Jun Xu, Santanu Sarkar,
bibinfo, video
- Log-S-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP,
- Advanced Encryption 2
- Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes,
Jiaxin Pan, Runzhi Zeng,
bibinfo, video - Identity-Based Matchmaking Encryption from Standard Assumptions,
Jian Weng, Jie Chen, Yu Li, Jinming Wen,
bibinfo, video - Anonymous Public Key Encryption under Corruptions,
Junzuo Lai, Jian Weng, Zhengan Huang, Shuai Han, Lin Lyu,
bibinfo, video - Memory-Tight Multi-Challenge Security of Public-Key Encryption,
Joseph Jaeger, Akshaya Kumar,
bibinfo, video
- Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes,
- Signatures
- On Rejection Sampling in Lyubashevsky's Signature Scheme,
Damien Stehlé, Omar Fawzi, Alain Passelègue, Julien Devevey,
bibinfo, video - Recovering the tight security proof of SPHINCS+,
Andreas Hülsing, Mikhail Kudinov,
bibinfo, video - Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple,
Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden,
bibinfo, video - BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications,
Vadim Lyubashevsky, Ngoc Khanh Nguyen,
bibinfo, video
- On Rejection Sampling in Lyubashevsky's Signature Scheme,
- Commitments
- GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility,
Hong-Sheng Zhou, Kui Ren, Bingsheng Zhang, Zhelei Zhou,
bibinfo, video - Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures,
Dario Catalano, Dario Fiore, Ida Tucker,
bibinfo, video - Linear-map Vector Commitments and their Practical Applications,
Anca Nitulescu, Carla Ràfols, Matteo Campanelli, Alexandros Zacharakis, Arantxa Zapico,
bibinfo, video - PointProofs, Revisited,
Benoît Libert, Alain Passelègue, Mahshid Riahinia,
bibinfo
- GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility,
- Theory 1
- Universal Ring Signatures in the Standard Model,
Nico Döttling, Pedro Branco, Stella Wohnig,
bibinfo, video - The Abe-Okamoto Partially Blind Signature Scheme Revisited,
Julia Kastner, Julian Loss, Jiayu Xu,
bibinfo, video - An Analysis of the Algebraic Group Model,
Jonathan Katz, Hong-Sheng Zhou, Cong Zhang,
bibinfo, video - Instantiability of Classical Random-Oracle-Model Encryption Transforms,
Adam O'Neill, Angela Murphy, Mohammad Zaheri,
bibinfo
- Universal Ring Signatures in the Standard Model,
- Cryptanalysis
- Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning,
Antonio Flórez Gutiérrez,
bibinfo, video - Statistical Decoding 2.0: Reducing Decoding to LPN,
Jean-Pierre Tillich, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Kevin Carrier,
bibinfo, video - A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding,
Yu Yu, Joop van de Pol, François-Xavier Standaert, Yuanyuan Zhou,
bibinfo, video - Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies,
Bart Preneel, Meiqin Wang, Kai Hu, Jiahui He,
bibinfo, video
- Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning,
- Practical Cryptography 2
- Authenticated Encryption with Key Identification,
Thomas Ristenpart, Paul Grubbs, Julia Len,
bibinfo, video - Privacy-Preserving Authenticated Key Exchange in the Standard Model,
Shengli Liu, Dawu Gu, Shuai Han, You Lyu,
bibinfo, video - On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC,
Jingsong Cui, Meiqin Wang, Puwen Wei, Kai Hu,
bibinfo, video
- Authenticated Encryption with Key Identification,
- Invited Talk 2
- Quantum Cryptography
- Practical Cryptography 3
- On Secure Ratcheting with Immediate Decryption,
Bertram Poettering, Jeroen Pijnenburg,
bibinfo - Strongly Anonymous Ratcheted Key Exchange,
Benjamin Dowling, Paul Rösler, Eduard Hauck, Doreen Riepel,
bibinfo - Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committees,
Jesper Buus Nielsen, Bernardo David, Matteo Campanelli, Anders Konring, Hamidreza Khoshakhlagh,
bibinfo, video
- On Secure Ratcheting with Immediate Decryption,
- Theory 2
- Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model,
Feng-Hao Liu, Benjamin Fuller, Daniel Apon, Peter Hall, Chloe Cachet,
bibinfo, video - Continuously Non-Malleable Codes against Bounded-Depth Tampering,
Sebastian Faust, Daniele Venturi, Gianluca Brian, Elena Micheli,
bibinfo, video - Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform,
Andreas Hülsing, Christian Majenz, Kathrin Hövelmanns,
bibinfo, video
- Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model,