CIFRIS23 - First National Conference

An event organized by De Cifris

"CONSOB headoffice", Via Giovanni Battista Martini, 3 - 00198 Rome (Italy)
December 14th, 15th 2023

PROGRAM

All events take place at CONSOB headoffice, Via Giovanni Battista Martini, 3 - 00198 Rome (Italy).



Locandina Istituzionale
Proceedings

14 December (morning) - Institutional Session

8:30-10:00Registration

Servizio televisivo: SPECIALE CLASS CNBC


10:00-10:30Welcome address - Video
Speakers : Paolo Savona (CONSOB's President) and Massimiliano Sala (De Cifris' President)

10:30-11:30Institutional Round Table - Video
Moderator: Francesca Medda (CONSOB)
Confirmed speakers:
  • Paolo Aceto, Generale, Arma dei Carabinieri
  • Pietro Bianchi, Generale, Guardia di Finanza
  • Andrea Billet, Direttore Servizio, Agenzia per la Cybersicurezza Nazionale
  • Ivano Gabrielli, Direttore Polizia Postale, Ministero degli Interni

11:30-12:00Coffee break

12:00-12:30Invited Talk
Massimo Giulietti (University of Perugia - Italy) - Slide
"Cryptography and its applications in the Italian scenario"

12:30-13:00De Cifris Partners
Antonino Giovanni ALÌ (De Componendis Cifris) - Abstract In questa sessione viene presentata l’Associazione De Componendis Cifris e gli obiettivi che essa si prefigge, tra cui l’uso della crittografia a servizio del nostro paese tramite la collaborazione dell’Associazione con le istituzioni e il settore privato nel tentativo di promuovere lo studio e la ricerca del settore crittografico in Italia. In particolare ascolteremo le due aziende affiliate a De Cifris: Telsy e BVTech.
"La visione di De Cifris per le partnership con le aziende leader"

Vincenzo MAFRICA (Direttore Business Unit di BVTECH) - Slide - Abstract In questa sessione viene presentata BVTech, un’azienda che da vent’anni si occupa di garantire la sicurezza dei dati e delle informazioni tramite la collaborazione con aziende ed istituzioni, con un approccio dedito ad anticipare i cambiamenti delle telecomunicazioni. Inoltre, viene presentata Privatewave, un prodotto made in Italy che si pone come soluzione per una comunicazione sicura. Si basa sull’uso di protocolli standard di cifratura e sull’utilizzo di componenti software open source capaci di proteggere il contenuto delle conversazioni telefoniche in tutte le sue forme.
"La crittografia nelle comunicazioni sicure: l’esperienza BV TECH"

Guglielmo MORGARI (Research Manager di TELSY) - Abstract In questa sessione viene presentata Tesly, un’azienda presente sul territorio dal 1971. Viene sottolineata l’importanza per Tesly dell’indipendenza tecnologica, le cui competenze consentono ai singoli Stati di trovare il giusto equilibrio tra sicurezza, economicità, funzionalità e così via. La tecnologia risulta inoltre utile a indirizzare i Paesi verso valori e aspettative sociali peculiari di ciascuno, a fronte di ciò Tesly riconosce l’importanza di DeCifris nel contesto nazionale come punto di coordinamento delle diverse competenze.
"Il ruolo strategico della crittografia nel conseguimento della sovranità tecnologica nazionale"

13:00-14:30Lunch

14 December (afternoon) - Scientific Session

14:30-16:30Mini-session: Number theory and cryptography - Video

Invited Talk - Antoine Joux (CISPA - Germany), winner of the Goedel price - Slide
"MPC in the head for isomorphisms and group action" - Abstract In this talk, we give a tutorial about MPC-in-the-head for signature schemes and illustrate it by designing identification protocols and signature schemes from group actions. We discuss the security of the proposed identification schemes and rely on the Fiat-Shamir transformation to turn them into signatures. We also stress that an essential ingredient for the efficiency of such signature schemes is the use of Puncturable-PRFs.

Wissam Ghantous, Federico Pintore and Mattia Veroni - Slide
"Efficiency of SIDH-based signatures (yes, SIDH)"

Massimiliano Sala and Daniele Taufer - Slide
"The group structure of elliptic curves over Z/NZ"

16:30-17:00Coffee break

17:00-19:00Mini-session: Between theory and practice
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder and Javier Varela - Slide
"FPGA And Software Acceleration of Multi-Scalar Multiplication: CycloneMSM"

Márton Erdélyi, Pál Hegedüs, Sándor Kiss and Gábor Nagy - Slide
"On Linear Codes with Random Multiplier Vectors and the Maximum Trace Dimension Property"

Marco Timpanella - Slide
"On a generalization of the Deligne-Lustzig curve of Suzuki type and application to AG codes"

Kyosuke Yamashita and Keisuke Hara - Slide
"On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes"

21:00Social Dinner
Location: Le Meridien Visconti Rome

15 December (morning) - Workshop Session

Main Hall


9:00-11:00Workshop - Video

Synthetic Data, Cyber Security and Finance
Organizer : Francesca Medda

Invited speakers from : European Commission, Banca D'Italia, CONSOB, University of Oxford

  • Alice Guedel and Andrea Pagano
  • Mariarosaria Taddeo
  • Marco Benedetti and Andrea Coletta
  • Francesca Medda

11:00-11:30Coffee break

11:30-13:30Workshop - Video

CBDCs, Digital Currencies and Assets Tokenization: opportunities and risks - Abstract CBDCs promise large-scale efficiency but also pose significant challenges, including potential centralization and control unprecedented in the financial sector. This workshop aims to foster a rich dialogue on the opportunities and risks associated with CBDCs, digital currencies, and tokenization of assets focusing on both national and international perspectives.
Organizers : Andrea Bracciali, Davide Carboni

Invited speaker from : CONSOB
Open discussion with panelists:

  • Gianfranco Trovatore - Slide
  • Vincenzo Vespri and Filippo Zatti - Slide
  • Guneet Kaur - Slide
  • Daniel Broby - Slide
  • Andrea Bracciali, Geoff Goodell and Giorgio Gasparri - Slide

Information and call for papers can be found here.


Room A


9:00-11:00Workshop - Video

Recent Advances in Post-Quantum Cryptography - Abstract Post-quantum cryptography, the study of cryptosystems capable of withstanding both classical and quantum attacks, is a timely area of research, as proven by the standardization effort led by NIST. Recently the focus has been on digital signature schemes, which are the subject of the latest NIST competition.
This workshop will provide an overview of the state of the art in post-quantum cryptography with a focus on cutting-edge methods for designing and implementing post-quantum signature schemes.

Organizers : Marco Baldi, Giulio Codogni, Roberto La Scala, Alessio Meneghetti, Gerardo Pelosi, Federico Pintore

Invited speaker : Luca De Feo

  • Luca De Feo - Slide
    "SQIsign, the new herald of isogeny based crypto"
  • Krijn Reijnder - Slide
    "MCE and MEDS: From Group Actions to Signatures"
  • Paolo Santini - Slide
    "Signatures from Five-Pass Zero-Knowledge Protocols and the Curious Case of CROSS"
  • Alessandro Barenghi - Slide
    "No one should learn from these errors: surveying fault attack resistance of post quantum cryptosystems"

11:00-11:30Coffee break

11:30-13:30Workshop - Video

Topics in Applied Cryptography - Abstract This workshop is dedicated to cryptography with a specific application, scenario and/or technology in mind, including performance evaluation, libraries and implementation issues, hardware and IoT, attacks and vulnerabilities, and requirements for unusual application scenarios. Topics of interest include privacy enhancing cryptography, homomorphic encryption, secure multi-party computation, quantum key distribution, and quantum-safe cryptography. [Call for Papers]
Organizers : Silvio Ranise, Alessandro Tomasi, D’Intino Andrea, Roio Denis

Invited speaker : Marco Baldi

  • Marco Baldi - Slide
    "Royal Rumbles in Cryptography: the NIST PQC Competition"
  • Stefano Berlato, Alessandro Colombo, Roberto Carbone and Silvio Ranise - Slide
    "Cryptographic Enforcement of Attribute-based Access Control Policies"
  • Stefano Berlato, Roberto Carbone and Silvio Ranise - Slide
    "OpenABE Bindings for Kotlin"
  • Chiara Spadafora, Michele Battagliola, Giuseppe D'Alconzo and Andrea Gangemi - Slide
    "Multiparty Class Group Encryption and Applications to E-Voting"
  • Chiara Spadafora, Riccardo Longo and Francesco Antonio Marino - Slide
    "Vote App: Verifiable and Coercion-Resistant I-Voting"
  • Andrea D'Intino and Denis Roio - Slide
    "Rapid implementation and deployment of cryptographic flows"

Room B


9:00-11:00Workshop - Video

Privacy-preserving Machine Learning Workshop - Abstract Privacy-preserving machine learning is a vital field as organizations and individuals strive to leverage machine learning while safeguarding sensitive data. The workshop addresses a growing demand for privacy enhancing techniques. It offers an up-to-date overview of the key concepts, methods, and tools.
With a keynote on Fully Homomorphic Encryption (FHE) by Andrei Stoian from Zama Concrete-ML and contributions from various experts focusing on topics such as Differential Privacy, Federated Learning, FHE, Secure Multi-Party Computation, and Trusted Execution Environment.

Organizers : Marco Pedicini, Michela Iezzi

Invited speaker : Andrei Stoian

  • Andrei Stoian - Slide
    "Privacy-preserving Machine Learning Workshop"
  • Valerio Maggio - Slide
    "PPML, Machine learning on data you cannot see"

Information and call for papers can be found here.


11:00-11:30Coffee break

11:30-13:30Workshop - Video

New trends in Group-Based Cryptography - Abstract Group theory, particularly non-abelian groups, provides a wealth of challenges for cryptography, introducing a novel dimension to this field.
The objective of this workshop is to offer an up-to-date overview of the current state of group-based cryptography and to present recent developments. More precisely, the workshop will focus on computational group theory, suitable platform groups, and potential intersections between them.

Organizers : Norberto Gavioli, Carmine Monetta, Marialaura Noce

Invited speaker : Delaram Kahrobaei

  • Delaram Kahrobaei - Slide
    "A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem and SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures"
  • Riccardo Aragona - Slide
    "Some results on the groups generated by round functions"
  • Ramon Flores - Slide
    "Groups and cryptography"
  • Antonio Tortora
    "A “smart” application of homomorphic encryption"
  • Martina Vigorito - Slide
    "A method to cryptanalyze (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups"

13:30-14:30Lunch

15 December (afternoon) - Scientific Session

14:30-16:30Mini-session: Boolean functions and symmetric cryptography - Video
Invited Talk - Svetla Petkova-Nikova (Katholieke Universiteit Leuven- Belgium) - Research Manager - Slide
"Threshold Implementations: Securing Implementations of Symmetric-Key Algorithms" - Abstract With the increase in portable devices performing cryptographic computations, physical attacks are becoming easy to execute. One of the most common physical attacks is Side-Channel Analysis (SCA), extremely dangerous due to its non-invasive nature. Threshold Implementations (TI) was proposed as the first countermeasure to provide provable security in masked hardware implementations.
In this lecture we will first introduce the method and give examples of HW implementations using Threshold Implementations. Then we will present the most recent developments in the theory and practice of Threshold Implementations and will demonstrate Tis providing various trade-offs and achieving efficiency and security of HW implementations.

Marco Calderini, Roberto Civino, Riccardo Invernizzi - Slide
"Differential experiments using parallel alternative operations"

Marine Minier, Loïc Rouquette and Christine Solnon - Slide
"Automatic Boomerang Attacks Search on Rijndael"

16:30-17:00Coffee break

17:00-18:30Mini-session: Cloud encryption

Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa - Slide
"Searchable Encryption with randomized ciphertext and randomized keyword search"

Sigurd Eskeland - Slide
"Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection"

Marco Cianfriglia, Elia Onofri, Marco Pedicini - Slide
"mR_LWE-CP-ABE: a revocable CP-ABE for Post-Quantum Cryptography"