CIFRIS24 - an event by De Cifris

Venue: Banca d'Italia, Centro D. Menichella, Largo Guido Carli 1, Frascati (Roma)
Social dinner: September 25th, Satiricus, Via dei Corridori 58, Roma
September 25th, 26th, 27th 2024


27th - Main Hall

FCiR24 IFCiR24 IIReAdPQC24

27th - Room A

TAC24 ITAC24 II

27th - Room B

NTC24QCifris24

27th - Room C

SymCrypt24CodeMath24

27th - Room D

CPSID24CifrisCloud24
Pulsante pre-proceedings

CIFRIS24 Preproceedings Draft

DE CIFRIS KOINE vol.5


PROGRAM

September 25th

September 25th (morning) - Institutional Session
Centro D. Menichella, Largo Guido Carli 1, Frascati (Rome)

All talks in the institutional session are held in Italian
10:00
10:30
Registration
10:30
11:00
Welcome address
in Italian
  • Alessandra Perrazzelli, Vicedirettrice Generale (Banca d'Italia)
  • Massimiliano Sala, Presidente (De Componendis Cifris)
11:00
11:30
Institutional round table
in Italian
Moderator:
  • Luigi Bellomarini, Capo della Divisione Ricerca sulle Tecnologie Avanzate (Banca d'Italia)
Speakers:
  • Marco Mattiucci, Direttore della Direzione di Telematica C.G. (Arma dei Carabinieri)
  • Luca G. Cioffi, Capo Ufficio Analisi (Guardia di Finanza)
  • Andrea Billet, Direttore Servizio Certificazione e Vigilanza (ACN)
  • Santo Mirabelli, Direttore 5a Divisione Tecnica del Servizio Polizia Postale (Ministero degli Interni)
11:30
12:00
Coffee break
12:00
12:30
Invited Talk
in Italian
  • La De Cifris e la crittografia italiana
  • Barbara Masucci, University of Salerno (Italy)
12:30
13:00
De Cifris Partners
in Italian
13:00
14:00
Lunch
September 25th (afternoon) - Scientific Session
Centro D. Menichella, Largo Guido Carli 1, Frascati (Rome)
14:00
15:20
Mini-session: Boolean functions
The focus of this mini-session is the precise design of symmetric cryptosystems, in order to have them provably secure. Boolean functions represent a key ingredient in the cryptosystem design. This mini-session will start with a keynote by Prof. Emeritus Claude Carlet, considered by many the world expert on Boolean functions.

  1. Claude Carlet, University of Paris VIII and LAGA (France)
    Invited talk: Quadratic-like balanced functions and permutations
    Abstract The so-called (n,m)-functions have very nice properties when quadratic, which for instance ease the study of their almost perfect nonlinearity. But quadratic functions are weak against some other attacks. It is then important to study strict superclasses sharing some of these properties. In particular, when the block ciphers have a structure of substitution-permutation network (SPN), the substitution boxes must be permutations (m=n).
    It is then essential to study superclasses of quadratic functions within the class of balanced functions. We shall introduce and study such a superclass, that of "quadratic-like balanced functions" ("permutations" when m=n).
  2. Augustine Musukwa, University of Trento (Italy)
    On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
    Abstract The big APN problem is one of the most important challenges in the theory of Boolean functions, i.e. finding a new APN permutation in even dimension. Among this class of functions, those with the lowest possible degree are cubic. Yet, none has been found so far. In this paper, we introduce new parameters for Boolean functions and for vectorial Boolean functions, mostly derived from the behavior of their second-order derivatives. These parameters are particularly relevant for small-degree functions. They allow studying bent, semi-bent and APN functions of degrees two and three. In particular, they allow tackling the big APN problem for cubic permutations.
15:20
15:40
Coffee break
15:40
17:00
Mini-session: Protocols and Zero-Knowledge
This mini-session focusses on the analysis and design of cryptographic protocols. Zero-knowledge proofs are a fundamental tool in the design of many of them, and have a wide range of applications. This mini-session will start with a keynote by Daniele Venturi, Full Professor at La Sapienza, Rome.

  1. Daniele Venturi, University of Roma La Sapienza (Italy)
    Invited talk: 20 Years of Leakage-Resilient Cryptography
    Abstract Cryptographic schemes are usually analyzed under the assumption that the underlying secrets are fully hidden from the adversary. Unfortunately, history has taught us that many (otherwise provably secure) cryptosystems can be spectacularly broken by exploiting physical phenomena (the so-called side-channel attacks) resulting in partial information leakage about the underlying secret keys.
    Leakage-resilient cryptography aims at closing the above gap by designing cryptosystems with provable guarantees even in the presence of attackers running different forms of side-channel attacks. This talk surveys the most important techniques behind leakage-resilient cryptography, since its introduction in the seminal works by Ishai, Sahai and Wagner (CRYPTO 2003) and Micali and Reyzin (TCC 2004).
  2. Delaram Kahrobaei, City University of New York (USA)
    Ludovic Perret, Sorbonne University & LIP6 (France)
    Martina Vigorito, University of Salerno (Italy)
    Security Analysis of ZKPoK based on MQ problem in the Multi-Instance Setting
    Abstract We will investigate the Multivariate Quadratic (MQ) problem, a well-known post-quantum hard problem, and introduce a new variant called the Differential Multivariate Quadratic Homogeneous (DiffMQH) problem. We present a polynomial-time algorithm that solves the DiffMQH problem by reducing it to finding collisions in a quadratic system. Our analysis demonstrates that while the MQ problem is challenging, the DiffMQH problem is significantly easier to solve, suggesting that this approach may not be secure for practical cryptographic applications.
September 25th (evening) - Social Event
Location: Satiricus, Via dei Corridori 58, Roma
20:30 Social Dinner

More information

September 26th

September 26th (morning) - Scientific Session
Centro D. Menichella, Largo Guido Carli 1, Frascati (Rome)
10:00
11:40
Mini-session: Post-Quantum Cryptography
The focus of this mini-session are recent results on the design of ciphers that may resist attacks performed with quantum computers. Indeed, the quantum threat is among the most feared in modern cryptography. This mini-session will start with a keynote by Prof. Simona Samardjiska, a young brilliant expert in this controversial field.

  1. Simona Samardjiska, Radboud University (Netherlands)
    Invited talk: Algorithms for solving the matrix code equivalence problem
    Abstract In the past few years, there has been an increased interest in hard equivalence problems, especially with NIST's announcement of a fourth round for new designs of digital signatures. On a high level, such a problem can be defined as follows: Given two algebraic objects, find - if any - an equivalence that maps one object into the other. Several instantiations have been considered for cryptographic purposes, for example - Isomorphism of polynomials (Pattarin '96), Code equivalence (Biasse et al. '20), Matrix Code equivalence (Chou et al. '22), Alternating trilinear form equivalence (Tang et al.'22), Lattice isomorphism (Ducas & van Woerden '22). All of these problems are believed to be hard even for quantum adversaries. Conveniently, they can generically be used to build a Sigma protocol and further a post-quantum secure signature using the Fiat-Shamir transform.
    In this talk I will make a broad overview of algorithms for solving the matrix code equivalence problem and how they can be applied to related problems. In particular, I will focus on algebraic and graph-based algorithms which are currently the state-of-the-art for solving the problem. I will further argue that clever combination of the two technics often leads to the best, and sometimes surprising results.
  2. Antonio J. Di Scala and Carlo Sanna, Polytechnic University of Turin (Italy)
    Smaller public-keys for MinRank-based schemes
    Abstract In this talk, we will explore the MinRank problem, a well-established problem in linear algebra with significant relevance for post-quantum cryptography. We will focus on the search version of MinRank, which involves finding a non-trivial linear combination of given matrices whose rank is below a specified threshold. MinRank is particularly attractive for cryptographic applications due to its foundation in linear algebra, its NP-completeness, and the absence of efficient quantum algorithms that can solve it.
    We will introduce a new key-generation algorithm for MinRank-based cryptographic schemes, which we call KeyGen3. This algorithm significantly reduces the size of the public key compared to existing methods, achieving a compression of about 50% relative to the current best approach, KeyGen2. Additionally, we will provide a rigorous proof that the security of KeyGen3 is closely related to that of KeyGen1, with a negligible security loss. Our results demonstrate that KeyGen3 offers a highly efficient and secure method for public key compression in MinRank-based cryptography.
  3. Delaram Kahrobaei, City University of New York (USA)
    Carmine Monetta, Maria Tota and Martina Vigorito University of Salerno (Italy)
    Ludovic Perret, Sorbonne University & LIP6 (France)
    Investigation of Metabelian Platform Groups for Protocols Based on the (Simultaneous) Conjugacy Search Problem
    Abstract We will cover advancements in the field of group-based cryptography, particularly focusing on the cryptanalysis of protocols using metabelian groups as the platform. Building on previous work, we will generalize the Field-Based Attack (FBA) to demonstrate how both the Conjugacy Search Problem (CSP) and Simultaneous Conjugacy Search Problem (SCSP) can be cryptanalyzed for certain classes of metabelian groups of the form G=M⋉NG=M⋉N, where both MM and NN are abelian. These groups naturally arise in linear algebra and ring theory.
    Specifically, we will present two main results: a polynomial-time algorithm that breaks the Commutator Key-Exchange Protocol (AAG) and the non-commutative Diffie-Hellman Key-Exchange Protocol (Ko-Lee) for groups of this form. These results indicate that while metabelian groups have been proposed as secure platforms for these protocols, certain families must be avoided due to their vulnerability to efficient cryptanalysis.
11:40
12:00
Coffee break
12:00
13:00
Mini-session: Public-key cryptography
In this session we discuss security and performance of (classical) public-key cryptography, which includes the most widely adopted cryptographic protocols in the Internet.

  1. Giordano Santilli, Agenzia per la Cybersicurezza Nazionale (Italy)
    Daniele Taufer, KU Leuven (Belgium)
    First-degree prime ideals of composite extensions
    Abstract We will present our findings on first-degree prime ideals within composite extensions of number fields. Building on the known methods for biquadratic fields, we generalize the approach to composite fields of any degree, showing that first-degree prime ideals can be effectively computed from norms in their minimal subfields. We demonstrate that this method preserves the divisibility of principal ideals, with only rare exceptions. These results provide a novel framework with significant implications for computational algebra, particularly in the context of large extensions constructed from smaller fields.
  2. Marco Macchetti and Nils Amiet, Kudelski Group (Switzerland)
    A Novel Related Nonce Attack for ECDSA
    Abstract We will introduce a novel cryptanalytic attack on the Elliptic Curve Digital Signature Algorithm (ECDSA) that exploits complex polynomial relationships among nonces. Unlike previous attacks that focused on linear relationships or simple biases in nonce generation, our approach addresses cases where nonces are related through higher-degree algebraic equations, such as those generated by quadratic or cubic congruential generators. We demonstrate how this attack can retrieve the private key from a small set of signatures, broadening the scope of vulnerabilities in ECDSA, including widely used implementations like secp256k1.
  3. Dmitrii Koshelev, University of Lleida (Spain)
    Application of Mordell-Weil lattices with large kissing numbers to acceleration of multiscalar multiplication on elliptic curves
    Abstract In this presentation, we explore the use of Mordell–Weil (MW) lattices to accelerate multi-scalar multiplication (MSM) on elliptic curves, specifically for curves with a j-invariant of 0. MSM is a crucial yet computationally expensive operation in elliptic curve cryptography. By leveraging MW lattices with large kissing numbers—indicative of high efficiency in evaluating points—we can significantly enhance the performance of MSM. The focus is on utilizing these lattices to optimize the generation of auxiliary points, particularly on j = 0 curves, where their structure provides optimal conditions for reducing computational overhead in cryptographic operations.
13:00
14:00
Lunch
September 26th (afternoon) - Scientific Session
Centro D. Menichella, Largo Guido Carli 1, Frascati (Rome)
14:00
15:40
Mini-session: Theoretical cryptography
The security of cryptosystems heavily depends on their mathematical foundations. In this mini-session we start with a keynote by Prof. Gregor Leander, managing editor of the journal IACR Transaction of Symmetric Cryptography, and then we present two advanced schemes that provide security even when computations are performed in a hostile environment.

  1. Gregor Leander, Ruhr-University Bochum (Germany)
    Invited talk: Low Latency Designs: Primitives and Beyond
    Abstract In this talk I will explain the different cryptographic primitives that have been developed in the area of symmetric cryptography that allow encryption with a very small latency. Applications are in particular memory encryption or cache-randomization.
  2. Maria Ferrara, Paolo Santonastaso, Antonio Tortora and Ferdinando Zullo, University of Campania (Italy)
    Polynomial functional encryption schemes
    Abstract In this talk, motivated by the construction of practically efficient functional encryption scheme supporting more than linear functionalities, we describe a new functional encryption scheme whose functionalities are polynomials. Such scheme is an extension of a known quadratic encryption scheme.
  3. Massimo Giulietti, Paolo Martinelli and Marco Timpanella, University of Perugia (Italy)
    Modern Techniques in Somewhat Homomorphic Encryption Schemes
    Abstract This paper emphasizes the transition from classic SWHE schemes to modern approaches utilizing lattice-based problems, such as Learning With Errors (LWE). LWE, introduced by Regev, is central to both SWHE and FHE due to its security reductions to hard lattice problems, which are conjectured to be resistant to quantum attacks. This makes LWE-based schemes particularly attractive for constructing secure and efficient homomorphic encryption systems.
15:40
16:00
Coffee break
16:00
16:40
Mini-session: Applied Cryptography
The focus of this session is to show the importance of practical implementations of cryptography, while at the same time showing the deep link between theory and practice in this research field.

  1. Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci and Matteo Nardelli, Bank of Italy (Italy)
    Annalisa Cimatti and Marco Pedicini, Roma Tre University (Italy)
    Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee
    Abstract We will present Dynamic-FROST (D-FROST), an innovative extension of the FROST threshold signature scheme, which allows for dynamic changes in the committee and threshold without altering the group public key. By integrating FROST with CHURP, a Dynamic Proactive Secret Sharing scheme, D-FROST enables flexible committee adjustments and proactive share updates. This approach ensures continued security and confidentiality while avoiding the need for a central dealer or repeated key generation. We demonstrate how D-FROST maintains EUF-CMA security and provides a practical solution for evolving decentralized systems and blockchain applications.
  2. Fadi Barbara and Enrico Guglielmino, Polytechnic University of Turin (Italy)
    Nadir Murru, University of Trento (Italy)
    Claudio Schifanella, University of Turin (Italy)
    BTLE: Atomic Swaps with Time-Lock Puzzles
    Abstract In this talk, we introduce Broadcast Time-Lock Exchange (BTLE), a novel approach to cross-chain communication leveraging time-lock puzzles. Our method builds upon Rivest’s time-lock puzzle concept and extends it to a broadcast setting, enabling decentralized exchanges among multiple participants without requiring prior acquaintance. We propose a decentralized matching algorithm and a new type of time-lock puzzle based on Pell conics, which can be transformed into a Verifiable Delay Function. Our solution includes a comparative analysis with existing methods, an implementation of both the matching algorithm and exchange protocol, and a security proof in the hybrid ideal/real world simulation. This work aims to enhance cross-chain transactions in dynamic and decentralized environments.

September 27th

September 27th (morning) - Workshop Session
Centro D. Menichella, Largo Guido Carli 1, Frascati (Rome)

MAIN HALL

10:00
11:20
FCiR - Financial Cryptography in Rome 2024, session I

Joint workshop of Banca d'Italia and De Cifris on novel financial applications of cryptography.

Invited speakers: Carsten Maple, University of Warwick (UK), and Christian Rechberger, Graz University of Technology (Austria)

Show all details
11:20
11:40
Coffee break
11:40
13:00
FCiR - Financial Cryptography in Rome 2024, session II

Joint workshop of Banca d'Italia and De Cifris on novel financial applications of cryptography.

Show all details
13:00
14:00
Lunch

ROOM A

10:00
11:20
TAC - Topics in Applied Cryptography 2024, session I

Specific applications, scenarios and technologies: performance, hardware, IoT, attacks, vulnerabilities, unusual applications, etc.

Invited speaker: Filippo Valsorda, full-time independent open source maintainer (USA).

Show all details Website
11:20
11:40
Coffee break
11:40
13:00
TAC - Topics in Applied Cryptography 2024, session II

Specific applications, scenarios and technologies: performance, hardware, IoT, attacks, vulnerabilities, unusual applications, etc.

Show all details Website
13:00
14:00
Lunch

ROOM B

10:00
11:20
NTC - Number Theory for Cryptography 2024

Exploring the connections between number theory and cryptography, with a focus on the most challenging topics.

Invited speaker: Federico Pintore, University of Trento (Italy)

Show all details
11:20
11:40
Coffee break
11:40
13:00
QCifris - Quantum Cifris 2024

Advances in quantum technologies and applications in cryptography from the perspective of Physics.

Show all details
13:00
14:00
Lunch

ROOM C

10:00
11:20
SymCrypt - Symmetric Cryptography and Boolean Functions 2024

Topics in symmetric cryptography with a focus on properties, classification, and construction of Boolean Functions.

Invited speaker: Sihem Mesnager, University of Paris VIII (France)

Show all details
11:20
11:40
Coffee break
11:40
13:00
CodeMath - Coding Theory and Discrete Mathematics 2024

Networking and discussion event on: Algebraic Foundations and Advanced Topics of Coding theory, relations with Cryptography and Finite Geometry, trends, challenges.

Invited speaker: Gilles Zémor, Institut de Mathématiques de Bordeaux (France)

Show all details
13:00
14:00
Lunch

ROOM D

10:00
11:20
CPSID - Cryptography, Protocols and Security in Digital Identity 2024

We will explore the two main standards, EUDI-ARF and W3C-DID/W3C-VC, their cryptography, protocols, threat models and mitigations, but also emerging cryptographic schemes.

Show all details
11:20
11:40
Coffee break
11:40
13:00
CifrisCloud - Cryptography for the Cloud 2024

Explore the latest advancements in privacy enhancing techniques specifically designed for cloud computing.

Invited speaker: Martina Palmucci, NTT Data (Italy)

Show all details
13:00
14:00
Lunch
September 27th (afternoon) - Workshop Session

MAIN HALL

14:00
16:30
ReAdPQC24 - Recent Advances in Post-Quantum Cryptography 2024

An overview of the state of the art in PQ cryptography, the NIST competition, and cutting-edge methods for design and implementation of post-quantum signatures.

Invited speaker: Thibauld Feneuil, CryptoExperts (France)

Show all details