Asiacrypt 2025 (Melbourne, Australia), by Xiaohui Ding
This past December, I was honoured to attend Asiacrypt 2025 in Melbourne, Australia. As one of the three flagship conferences organized by the International Association for Cryptologic Research (IACR), the event serves as a top venue for peer-reviewing and showcasing the most significant advancements in the field of cryptography. The 2025 program featured a rigorous selection of papers, with a notable emphasis on lattice-based cryptography, symmetric encryption, advanced cryptography, etc. Beyond theoretical perspective, the conference also highlighted various practical applications, including secure messaging and real-world implementations.
After a 21-hour
journey, I landed in Melbourne. I’ve always felt a
deep connection to this city because I completed my master's at Monash
University - also one of the event organizers, yet I had never actually been to
Australia. Due to the pandemic, my studies were entirely remote. It took three
years after my graduation, but I finally made it here. Our paper ‘Policy
Compliant Secure Messaging’, co-authored with Joël,
Sanjam, and Yiannis, was accepted by Asiacrypt’25, and I was going to present
it.
The preparation
was quite intense; I spent my flight finalizing the
slides and practiced the presentation until late the night before our session
on Tuesday afternoon. Our paper introduces a security notion called
Policy-Compliant Secure Messaging (PCSM), which allows for the auditing of
encrypted messages against specific policies while maintaining the privacy of
non-violating users. I didn’t present every detail of our security proof under
the Universal Composability (UC) framework, as the sheer volume of
technicalities would have made it impossible to conclude the talk on time.
Instead, I focused on the security properties required by the PCSM notion and
all associated functionalities. I also presented three protocols in our paper
that comply with the PCSM notion. After the presentation, the host asked a
question regarding the efficiency of our construction. I answered that our
hash-based H-POCO protocol can be considered a promising, efficient solution
because it benefits significantly from the well-established Apple PSI. However,
further work remains to be done, and we also aim to conduct a systematic
analysis of the trade-off between security and efficiency.
The session on
Secure Messaging & Key Exchange featured several other compelling talks
that caught my attention. The presentation immediately preceding mine focused
on message franking, a technique we also referenced in our paper. While message
franking is a report-based methodology, our approach is designed to be more
proactive while still preserving end-to-end encryption (E2EE) privacy. This
highlights a common theme in secure messaging: varying scenarios and system
assumptions often necessitate different technical solutions. Notably, this
paper expanded the concept of message franking to transcript franking, which
allows a sequence of messages to be reported in their correct order. It’s an
excellent paper that will likely inspire my next project.
After concluding
my talk, I had the chance to catch up with my former Master's supervisors. It
was wonderful to finally see them in person after so much time. We had a great
conversation covering my experiences living in the UK, my time at Royal
Holloway, and my current research on end-to-end content moderation. I also had
the pleasure of meeting their current students. Interestingly, I had already
met one of them and became friends in the UK last year, which made the
reconnection even more special. The communication was excellent, and we had a
very productive exchange of ideas. Discussing my future plans and potential
directions for my work with the whole group was incredibly rewarding, and it
was great to share how much I’ve grown since my master's studies.
There are also
other interesting talks that I can talk nonstop. I also like the one that
explores the practical challenges and lessons learned from using EasyCrypt to
formally verify the security of the CryptoBox public-key encryption scheme in
my session. My very good academic friend gave a talk on lattice-based
multi-message multi-recipient KEM/PKE with malicious security. The work was of
excellent quality, and I learned a lot from the well-prepared slides. There was
a talk demonstrating that the standard non-adaptive 'One-Way to Hiding' lemma
is surprisingly powerful enough to recover several complex adaptive
reprogramming results in the Quantum Random Oracle Model (QROM), which related
to what I used to study, and I found it quite interesting.
The conference also has a rump session. This is where the
formal atmosphere of academic peer review gives way to a high-energy
"talent show" for the crypto community. It’s a venue for
lightning-fast updates on brand-new results discovered too late for the main
program, alongside satirical skits, musical parodies, and inside jokes. With
most talks strictly limited to just a few minutes, it’s a chaotic and
entertaining evening that proves even the world's leading cryptographers can
make jokes and have a bit of fun.
Overall, Asiacrypt 2025 in Melbourne was an unforgettable
experience for me. I learned so much from all the talks and caught up on the
latest progress in new research areas I’ve been following. But more than the
papers, it was the people that made it special - sharing ideas and laughing
with friends and experts felt great. Plus, getting to enjoy the beautiful
Melbourne and the vibe of the Southern Hemisphere was the perfect bonus. I
headed home with a lot of good memories and new knowledge. Thanks for the great
time, Melbourne!
Comments
Post a Comment