https://sp2024.ieee-security.org/program.html
MAY 20-23, 2024
- SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
Jelle Vos (Delft University of Technology), Mauro Conti (University of Padua), Zekeriya Erkin (Delft University of Technology)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a079/1RjEaO9q2ZO
- GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Xingyu Xie (Tsinghua University; RealAI), Yifei Li (Tsinghua University), Wei Zhang (Tsinghua University), Tuowei Wang (Tsinghua University), Shizhen Xu (RealAI), Jun Zhu (Tsinghua University; RealAI), Yifan Song (Tsinghua University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a131/1Ub23P5FxFC
- Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater
Andreas Brüggemann (Technical University of Darmstadt, Germany), Oliver Schick (Technical University of Darmstadt, Germany), Thomas Schneider (Technical University of Darmstadt, Germany), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Hossein Yalame (Technical University of Darmstadt, Germany)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a164/1Ub24EZ8L2U
- Scalable Mixed-Mode MPC
Radhika (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a106/1Ub23erqzra
- Asterisk: Super-fast MPC with a Friend
Banashri Karmakar (Indian Institute of Science, Bangalore), Nishat Koti (Indian Institute of Science, Bangalore), Arpita Patra (Indian Institute of Science, Bangalore), Sikhar Patranabis (IBM Research - India), Protik Paul (Indian Institute of Science, Bangalore), Divya Ravi (Aarhus University), Sikhar Patranabis (IBM Research India)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a128/1Ub23LgEu3K
- Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
Wenhao Zhang (Northwestern University), Xiaojie Guo (Nankai University, State Key Laboratory of Cryptology), Kang Yang (State Key Laboratory of Cryptology), Ruiyu Zhu (No Affiliation), Yu Yu (Shanghai Jiao Tong University, Shanghai Qi Zhi Institute), Xiao Wang (Northwestern University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a192/1WPcYkyTGH6
- MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
Weihao Bai (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Long Chen (Institute of Software, Chinese Academy of Sciences), Qianwen Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Zhenfeng Zhang (Institute of Software, Chinese Academy of Sciences)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a157/1Ub24hrQXle
- Orca: FSS-based Secure Training and Inference with GPUs
Neha Jawalkar (Indian Institute of Science), Kanav Gupta (Microsoft Research), Arkaprava Basu (Indian Institute of Science), Nishanth Chandran (Microsoft Research), Divya Gupta (Microsoft Research), Rahul Sharma (Microsoft Research)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a063/1RjEaAAmAAE
- Certifying Zero-Knowledge Circuits with Refinement Types
Junrui Liu (University of California, Santa Barbara), Ian Kretz (The University of Texas at Austin), Hanzhi Liu (University of California, Santa Barbara / Veridise Inc.), Bryan Tan (Veridise Inc.), Jonathan Wang (Axiom), Yi Sun (Axiom), Luke Pearson (Polychain Capital), Anders Miltner (Simon Fraser University), Işıl Dillig (The University of Texas at Austin / Veridise Inc.), Yu Feng (University of California, Santa Barbara / Veridise Inc.)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a078/1RjEaNkBQIg
- Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs. Post-Quantum ZK-SNARKs on a Browser
Carmit Hazay (Ligero Inc.), Muthuramakrishnan Venkitasubramaniam (Ligero Inc.), Ruihan Wang (Ligero Inc.)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a086/1RjEaU3iZEY
- Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
Tianyi Liu (University of Illinois Urbana-Champaign), Tiancheng Xie (UC Berkeley), Jiaheng Zhang (UC Berkeley), Dawn Song (UC Berkeley), Yupeng Zhang (University of Illinois Urbana-Champaign), Tianyi Liu (Texas A&M University), Yupeng Zhang (Texas A&M University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a035/1RjEaaM09eU
- Scalable Verification of Zero-Knowledge Protocols
Miguel Isabel (Universidad Complutense de Madrid), Clara Rodràguez-Nàºñez (Universidad Complutense de Madrid), Albert Rubio (Universidad Complutense de Madrid)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a133/1Ub23QzVaWA
- Efficient Zero-Knowledge Arguments For Paillier Cryptosystem
Borui Gong (The Hong Kong Polytechnic University), Wang Fat Lau (The Hong Kong Polytechnic University), Man Ho Au (The Hong Kong Polytechnic University), Rupeng Yang (University of Wollongong), Haiyang Xue (The Hong Kong Polytechnic University), Lichun Li (Ant Group)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a093/1Ub231Cm86s
- SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More
Nan Wang (Australian National University and CSIRO's Data61), Sid Chi-Kin Chau (Australian National University and CSIRO's Data61), DongXi Liu (CSIRO's Data61), Nan Wang (Australian National University), Sid Chi-Kin Chau (Australian National University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a054/1RjEatoqLfi
- hinTS: Threshold Signatures with Silent Setup
Sanjam Garg (UC Berkeley and NTT Research), Abhishek Jain (JHU and NTT Research), Pratyay Mukherjee (Supra Research), Rohit Sinha (Swirlds Labs), Mingyuan Wang (UC Berkeley), Yinuo Zhang (UC Berkeley)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a057/1RjEavMBn8Y
- Threshold ECDSA in Three Rounds
Jack Doerner (Technion), Yashvanth Kondi (Aarhus University), abhi shelat (Northeastern University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a174/1V5U7ejLG6I
- Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs
Mayank Rathee (UC Berkeley), Yuwen Zhang (UC Berkeley), Henry Corrigan-Gibbs (MIT), Raluca Ada Popa (UC Berkeley)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a194/1WPcYm20VrO
- Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference
Sarabjeet Singh (University of Utah), Shreyas Singh (University of Utah), Sumanth Gudaparthi (University of Utah), Xiong Fan (Rutgers University), Rajeev Balasubramonian (University of Utah)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a107/1Ub23ff6ncs
- Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption
Xiaoguo LI (School of Computing and Information Systems, Singapore Management University, Singapore), Guomin Yang (School of Computing and Information Systems, Singapore Management University, Singapore), Tao Xiang (College of Computer Science, Chongqing University), Shengmin Xu (College of Computer and Cyber Security, Fujian Normal University), Bowen Zhao (Guangzhou Institute of Technology, Xidian University), HweeHwa Pang (School of Computing and Information Systems, Singapore Management University, Singapore), Robert H. Deng (School of Computing and Information Systems, Singapore Management University, Singapore)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a100/1Ub237QXNgk
- SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Jean Paul Degabriele (Technology Innovation Institute), Jan Gilcher (ETH Zurich), Jérôme Govinden (Technical University of Darmstadt), Kenneth G. Paterson (ETH Zurich)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a132/1Ub23PQMXgk
- Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length
Jianning Zhang (College of Computer Science & Cyber Science, Nankai University), Ming Su (College of Computer Science & Cyber Science, Nankai University), Xiaoguang Liu (College of Computer Science & Cyber Science, Nankai University), Gang Wang (College of Computer Science & Cyber Science, Nankai University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a067/1RjEaDExPJS
- CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
Simon Jeanteur (TU Wien), Laura Kovács (TU Wien), Matteo Maffei (TU Wien), Michael Rawson (TU Wien)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a259/1WPcZjyX3MI
- BULKOR: Enabling Bulk Loading for Path ORAM
Xiang Li (Tsinghua University), Yunqian Luo (Tsinghua University), Mingyu Gao (Tsinghua University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a103/1Ub23aTrrDa
- Distributed & Scalable Oblivious Sorting and Shuffling
Nicholas Ngai (University of California, Berkeley), Ioannis Demertzis (University of California, Santa Cruz), Javad Ghareh Chamani (Hong Kong University of Science and Technology), Dimitrios Papadopoulos (The Hong Kong University of Science and Technology)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a153/1Ub24bi4tos
- PIANO: Extremely Simple, Single-Server PIR with Sublinear Server Computation
Mingxun Zhou (Carnegie Mellon University), Andrew Park (Carnegie Mellon University), Elaine Shi (Carnegie Mellon University), Wenting Zheng (Carnegie Mellon University
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a055/1RjEaufvKzm
- PIRANA: Faster Multi-query PIR via Constant-weight Codes
Jian Liu (Zhejiang University), Jingyu Li (Zhejiang University), Di Wu (Zhejiang University), Kui Ren (Zhejiang University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a039/1RjEae1OWIM
- Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage
Andrew Park (Carnegie Mellon University), Trevor Leong (Carnegie Mellon University), Francisco Maturana (Carnegie Mellon University), Wenting Zheng (Carnegie Mellon University), Rashmi Vinayak (Carnegie Mellon University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a168/1Ub24IZvLRm
- More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR
Tiantian Gong (Purdue University), Ryan Henry (University of Calgary), Alexandros Psomas (Purdue University), Aniket Kate (Purdue University / Supra Research)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a095/1Ub233fGVxu
- Group Oblivious Message Retrieval
Zeyu Liu (Yale University), Eran Tromer (Boston University), Yunhao Wang (Columbia University)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a115/1Ub23ocBmKI
- PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Daniel Schadt (Karlsruhe Institute of Technology), Christoph Coijanovic (Karlsruhe Institute of Technology), Christiane Weis (NEC Labs Europe), Thorsten Strufe (Karlsruhe Institute of Technology)
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a044/1RjEaiu0Ehy