PQCrypto 2024
The 15th International Conference on Post-Quantum Cryptography
PQCrypto 2024
June 12-14, 2024
Mathematical Institute, University of Oxford (UK)
Introduction
The aim of PQCrypto is to serve as a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers.
After fourteen successful PQCrypto conferences (2006 in Leuven, 2008 in Cincinnati, 2010 in Darmstadt, 2011 in Taipei, 2013 in Limoges, 2014 in Waterloo, 2016 in Fukuoka, 2017 in Utrecht, 2018 in Fort Lauderdale, 2019 in Chongqing, 2020 in Paris (online), 2021 in Daejeon (hybrid), 2022 (online), in Maryland 2023), we are looking forward to PQCrypto 2024.
The conference will take place at the University of Oxford, Mathematical Institute. The dates are June 12–14, 2024.
We are on twitter as @PQCryptoConf for updates.
Affiliated Event - newtpqc
PQCrypto 2024 will be preceded by a 2-day workshop, The New Trends in Post-Quantum Cryptography workshop, or newtpqc. It will take place at the Mathematical Institute, University of Oxford (UK) on Monday 10 June and Tuesday 11 June 2024.
The goal of the workshop is to discuss the most recent and exciting trends of post-quantum cryptography. Ten world-class researchers will give keynote talks on cutting-edge topics that will play an important part in post-quantum cryptography in the years to come.
Further information can be found in the newtpqc website.
Important dates
- Initial submission deadline: January 19, 2024
- Final submission deadline: January 26, 2024
- Notification of acceptance: March 15, 2024
- Final version due: March 29, 2024
- Early registration deadline: May 12, 2024
- Affiliated event: Monday-Tuesday, June 10-11, 2024
- Conference: Wednesday-Friday, June 12-14, 2024.
Conference Program
Wednesday 12 June 2024
09:15 | Transforms and Proofs (Chair: Delaram Kahrobaei) |
Kathrin Hövelmanns and Christian Majenz Explicitly rejecting Fujisaki-Okamoto transforms and worst-case correctness - completing the picture [Video] [Slides] | |
Kamil Doruk Gür, Jonathan Katz and Tjerand Silde Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption [Video] [Slides] | |
Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck and Maximiliane Weishäupl Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures [Video] [Slides] | |
Yao Cheng, Xianhui Lu, Ziyi Li and Bao Li Revisiting Anonymity in Post-Quantum Public Key Encryption [Video] [Slides] | |
11:00 | Invited Talk 1 (Chair: Daniel Smith-Tone) |
Nadia Heninger On Incentives and Cryptanalysis [Video] [Slides] | |
14:00 | Multivariate Cryptography 1 (Chair: Ludovic Perret) |
Pierre Pébereau One vector to rule them all: Key recovery from one vector in UOV schemes [Video] [Slides] | |
Peigen Li and Jintai Ding Cryptanalysis of the SNOVA signature scheme [Video] [Slides] | |
Hiroki Furue and Momonari Kudo Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings [Video] [Slides] | |
15:30 | Lattices 1 (Chair: Thomas Prest) |
Henry Bambury and Phong Nguyen Improved Provable Reduction of NTRU and Hypercubic Lattices [Video] [Slides] | |
Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen and Jinwei Zheng Compact Encryption based on Module-NTRU problems [Video] [Slides] | |
Leizhang Wang Analyzing Pump and jump BKZ algorithm using dynamical systems [Video] [Slides] |
Thursday 13 June 2024
09:15 | Group Actions (Chair: Delaram Kahrobaei) |
Jonas Meers and Doreen Riepel CCA Secure Updatable Encryption from Non-Mappable Group Actions [Video] [Slides] | |
Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez and Mukul Kulkarni Properties of Lattice Isomorphism as a Cryptographic Group Action [Slides] | |
Markus Bläser, Zhili Chen, Dung Duong, Antoine Joux, Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo and Gang Tang On digital signatures based on group actions: QROM security and ring signatures [Video] [Slides] | |
Antonin Leroux and Maxime Roméas Updatable Encryption from Group Actions [Video] [Slides] | |
11:00 | Invited talk 1 (Chair: Markku-Juhani O. Saarinen) |
Sabrina Kunzweiler Recent developments in isogeny-based cryptography [Video] [Slides] | |
14:00 | Lattices 2 (Chair: Rainer Steinwandt) |
Corentin Jeudy, Adeline Roux-Langlois and Olivier Sanders Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets [Video] [Slides] | |
Toi Tomita and Junji Shikata Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE [Video] [Slides] | |
Zhen Liu, Vishakha, Jintai Ding, Chi Cheng and Yanbin Pan An Improved Practical Key Mismatch Attack Against NTRU [Video] [Slides] | |
15:30 | Multivariate Cryptography 2 (Chair: Tung Chou) |
Thomas Aulbach, Simona Samardjiska and Monika Trimoska Practical key-recovery attack on MQ-Sign and more [Video] [Slides] | |
Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong and Jintai Ding Practical and Theoretical Cryptanalysis of VOX [Video] [Slides] | |
Pierre Varjabedian, Benoit-Michel Cogliati, Gilles Macario-Rat and Jacques Patarin State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations? [Video] [Slides] |
Friday 14 June 2024
09:15 | Attacks (Chair: Liqun Chen) |
Martin Ekerå and Joel Gärtner Extending Regev’s factoring algorithm to compute discrete logarithms [Video] [Slides] | |
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret and Siamak F. Shahandashti A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem [Video] [Slides] | |
Tomoki Moriya, Hiroshi Onuki, Maozhi Xu and Guoqing Zhou Adaptive attacks against FESTA without input validation or constant-time implementation [Video] [Slides] | |
Jeonghwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim and Seokhie Hong Fault attack on SQISign [Video] [Slides] | |
11:00 | Invited talk 3 (Chair: Federico Pintore) |
N.N. (NCSC Technical Director for Cryptography) Post-Quantum Cryptography in UK Government [Slides] | |
14:00 | Applications and Protocols (Chair: Tjerand Silde) |
Loïc Ferreira and Johan Pascal Post-Quantum Secure ZRTP [Video] [Slides] | |
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton and Yalan Wang A New Hash-based Enhanced Privacy ID Signature Scheme [Video] [Slides] | |
14:40 | Code-Based Cryptography (Chair: Tjerand Silde) |
Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit and Adrien Vinçotte Blockwise Rank Syndrome Learning problem and its applications to cryptography [Video] [Slides] | |
Tung Chou, Ruben Niederhagen, Lars Ran and Simona Samardjiska Reducing Signature Size of Matrix-code-based Signature Schemes [Video] [Slides] |
Invited Speakers
- Nadia Heninger (University of California, San Diego, US)
- Sabrina Kunzweiler (Inria Bordeaux, France)
- A Speaker from NCSC, UK
Conference Registration
Registration is required for both in-person and virtual participation. Virtual participation will allow viewing of the talks, but not discussion with the speaker or the audience.
Early registration ends on May 12, 2024.
If you require a letter of invitation from the conference organizers, please register for the conference, pay the registration fee, and then email the general chairs to request a letter.
To register to the conference PQCrypto 2024 or to the conference PQCrypto 2024 and the affiliated event newtpqc click here.
For virtual participation, register here.
To register to the affiliated event newtpqc only, visit its website or click here.
Hotel Rooms
We have been offered discounted rates at two nearby hotels. If you would like to access these discounted rates, please contact the representatives as per below.
Leonardo Royal Hotel Oxford - please contact Sales Executive, Lee Wood (lee_wood@leonardohotels.com), with event reference - PQCrypto24
Rasa Sayang House - please contact Reservations Manager, Daniel Kiss (@email), with event reference - PQCrypto24
Further (non-discounted) options include - but are not limited to - the following hotels at all budget levels: Easy Hotel Oxford, Premier Inn, Botley Oxford, Malmaison Hotel Oxford, Old Parsonage Hotel.
We encourage attendees to check popular websites such as booking.com and hotels.com for accommodation. There is a choice of Airbnb in Oxford (some suggestions can be found here), while the following is a link to the university rooms website: http://www.universityrooms.com/en/city/oxford/home.
Summertown, Jericho, Cowley road, Iffley road, Abingdon road are areas of Oxford within a walking distance from the Mathematical Institute and enjoy many restaurants and groceries. Headington could also be an option, but a bus or a bike is needed to get to the Mathematical Institute in less than an hour.
Venue
PQCrypto 2024 and newtpqc will take place at the Mathematical Institute of the University of Oxford (UK), whose address is:
Mathematical Institute
Radcliffe Observatory,
Andrew Wiles Building,
Woodstock Rd,
Oxford OX2 6GG
Travel
- London Heathrow; the Oxford Bus Company Airline service coach goes directly from here to Oxford.
- London Gatwick; the Oxford Bus Company Airline service coach goes directly from here to Oxford.
- London Stansted; there are infrequent direct coaches or more frequent links via a coach to Heathrow or London.
- Luton; you may need to take a coach to Heathrow or London to join one of the other services.
- Birmingham International Airport; there are frequent trains from here to Oxford (see Rail Timetable Information).
Rail - See Rail Timetable Information for details of trains to Oxford and to purchase train tickets.
Coach - Tickets can usually be purchased on the linked travel company websites.
- From London, take the Oxford Tube coach to Oxford.
- See the National Express website for details of coaches from other major cities.
Local Bus Timetables
Local Taxi Firms
- Electronic Yellow Pages listings - Taxis and Private Hire Vehicles in Oxford
Student Financial Aid
We can give a discount off the student registration fee, for a limited number of students. We also have a small amount of travel funding, for students who have papers that were accepted to the conference.
If you are interested in this, please ask a professor who knows you to send an email to the general chairs, with the subject line "PQCrypto 2024 student discount," explaining why you need financial assistance, and why attending the conference in-person would be beneficial for you and/or other attendees at the conference.
Call for Papers
Call for papers in pdf format.
Original research papers on all technical aspects of cryptographic research related to post-quantum cryptography are solicited. Topics of interest include (but are not restricted to):
- Cryptanalysis of post-quantum systems, and quantum cryptanalysis.
- Cryptosystems that have the potential to be safe against quantum computers such as: code-based, hash-based, isogeny-based, lattice-based, and multivariate constructions.
- Implementations of, and side-channel attacks on post-quantum cryptosystems.
- Security models for the post-quantum era.
Instructions to authors
Accepted papers will be published in Springer's LNCS series. Submissions must be anonymous. Submissions must not exceed 30 pages, including appendices and excluding references, and must be in a single-column format in 10pt fonts using the default llncs class without adjustments. The submission should begin with a title, a short abstract, and a list of key words. Its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Reviewers are not required to read appendices; submissions are expected to be intelligible and complete without them. Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Submissions ignoring these guidelines may be rejected without further consideration.
If the submission is accepted, the length of the final version is at most 35 pages including both references and appendices, in the llncs class format.
Paper Submission Page
Conference Springer Proceedings
https://link.springer.com/book/10.1007/978-3-031-62743-9 and https://link.springer.com/book/10.1007/978-3-031-62746-0
General chairs
- Ali El Kaafarani (PQShield and University of Oxford)
- Federico Pintore (University of Trento)
Program chairs
- Markku-Juhani O. Saarinen (Tampere University and PQShield)
- Daniel Smith-Tone (University of Louisville and NIST)
Program Committee
- Magali Bardet (University of Rouen Normandie)
- Daniel J. Bernstein (UIC, RUB, and Academica Sinica)
- Ward Beullens (IBM)
- Olivier Blazy (École Polytechnique)
- Katharina Boudgoust (Aarhus University)
- Daniel Cabarcas (UNAL-Sede Medellín)
- Ryann Cartor (Clemson University)
- Sanjit Chatterjee (Indian Institute of Science)
- Anupam Chattopadhyay (Nanyang Technological University)
- Chen-Mou Cheng (BTQ Technologies Corp)
- Jung Hee Cheon (Seoul National University)
- Thomas Decru (Université Libre de Bruxelles)
- Martin Ekerå (KTH and Swedish NCSA)
- Thibauld Feneuil (CryptoExperts)
- Scott Fluhrer (Cisco Systems)
- Philippe Gaborit (University of Limoges)
- Tommaso Gagliardoni (Kudelski Security)
- Qian Guo (Lund University)
- Michael Hamburg (Rambus)
- David Jao (University of Waterloo)
- Thomas Johansson (Lund University)
- Shuichi Katsumata (PQShield and AIST)
- John Kelsey (NIST and KU Leuven)
- Jon-Lark Kim (Sogang University, Korea)
- Elena Kirshanova (TII)
- Dustin Moody (NIST)
- Ray Perlner (NIST)
- Edoardo Persichetti (FAU and Sapienza University)
- Thomas Poppelmann (Infineon)
- Thomas Prest (PQShield)
- Angela Robinson (NIST)
- Mélissa Rossi (ANSSI)
- Palash Sarkar (Indian Statistical Institute)
- Nicolas Sendrier (INRIA)
- Benjamin Smith (INRIA)
- Damien Stehlé (ENS Lyon)
- Rainer Steinwandt (UAH)
- Tsuyoshi Takagi (The University of Tokyo)
- Atsushi Takayasu (The University of Tokyo)
- Jean-Pierre Tillich (INRIA)
- Yu Yu (Shanghai Jiao Tong University)
- Yang Yu (Tsinghua University)
- Aaram Yun (Ewha Womans University)
- Rina Zeitoun (IDEMIA)