Invited speakers

Krijn Reijnders

COSIC, KU Leuven, Belgium

From Curves To Codes
(and back again)

Violetta Weger

Technical University of Munich, Germany

How hard is code equivalence really?

Yi-Fu Lai

Shanghai Jiao Tong University, China

Wombat: Post-Quantum Blind Signature from Standard Group Action Assumptions and More

Lorenz Panny

Technical University of Munich, Germany

Commutative group actions from isogenies



Krijn Reijnders, From Curves To Codes (and back again)

In this talk, we’ll explore constructions of cryptographic group actions, with a particular focus on code equivalence. We define cryptographic group actions and code equivalence on a high-level, and analyse some of the (advanced) protocols built using code equivalence as a building block. We then take inspiration from isogeny-based cryptography, by comparing existing constructions from both fields. Their intersection leads to interesting questions on the potential of non-commutative cryptographic group actions.


Violetta Weger, How hard is code equivalence really?

Many isomorphism problems can be naturally formulated as group actions, yet their computational complexity has been puzzling mathematicians for decades. The graph isomorphism problem is the most prominent example, it was given its own complexity class and was long believed to be hard until the breakthrough result of Babai showed that it can be solved in quasi-polynomial time. In this talk, we turn to a closely related problem: code equivalence. Given two linear codes, can we recover the hidden monomial transformation mapping one to the other? Despite its simple formulation, the true complexity of this problem remains wide open. Beyond its theoretical interest, code equivalence has recently gained attention through its role in post-quantum cryptography, where it underlies the security of the signature scheme LESS. In this talk, we survey its different variants, discuss connections to graph isomorphism and other related problems, and present an overview of known solvers and their cost, together with several directions that might finally determine how hard code equivalence really is.


Yi-Fu Lai, Wombat: Post-Quantum Blind Signature from Standard Group Action Assumptions and More

TBA


Lorenz Panny, Commutative group actions from isogenies

In this introductory presentation I will summarize the concepts underlying isogeny-based commutative group actions, such as CSIDH and its more recent cousins (qt-)PEGASIS, with a non-isogeny-expert audience in mind. If time permits, I will also sketch some of the roadblocks surrounding Kuperberg's algorithm that render a precise and reliable quantum security analysis for those schemes relatively difficult (in comparison to other constructions).


Schedule

The program is currently being finalized.

The workshop will start on the evening of Tuesday, 5th of May and continue through the morning of Friday the 8th, leaving Friday afternoon free to travel to Rome for the Eurocrypt affiliated events.

An excursion will be organized on the afternoon of Thursday, May 7th.

Please check back later for the detailed schedule.