Topics in Applied Cryptography 2025

Co-located with the CIFRIS25 conference
Rome, Italy, September 11-12, 2025

Scope & Topics

Topics in Applied Cryptography 2025 (TAC2025) is a workshop dedicated to cryptography with a specific application, scenario and/or technology in mind, including performance evaluation, libraries and implementation issues, hardware and IoT, attacks and vulnerabilities, and requirements for unusual application scenarios; purely theoretical results are out of scope. Topics of interest include privacy enhancing cryptography, homomorphic encryption, secure multi-party computation, quantum key distribution, and quantum-safe cryptography.

Registration

To participate it is necessary to register on the conference page. The registration is free of charge.

Program

All times are in Central European Summer Time (CEST).

Friday 12th September 2025

Contributed Talks

QKD (Re)Initialization via PQC: An Industrial Security-Usability Trade-off

Francesco Stocco (Telsy)

10:00-10:20

Quantum Root-of-Trust: Post-Quantum Security for Industrial IoT

Lorenzo Naturale (Random Power s.r.l. & University of Insubria)

10:20-10:40

Verifiable Computation Outsourcing via Contracts over Blockchain Transactions

Carlo Brunetta (independent researcher)

10:40-11:00

Coffee Break

11:00-11:30

Invited Speaker

Transparent Verification in E-Voting

Abstract: the main challenge in secure e-voting is to allow voters to verify their cast vote while preserving strong privacy notions, especially preventing vote-buying and coercion. We will introduce the electronic voting schemes Selene and Hyperion which offer a very transparent form of verifiability allowing voters to find and check their plaintext vote directly in the tally result while preserving coercion-mitigation. We will introduce new, more general security definitions to capture the context of these schemes and prove their security. Finally, we will see how we can achieve both everlasting privacy and everlasting coercion-mitigation for Hyperion, as well as speculating on the post-quantum migration of the scheme.

Peter Rønne (University of Luxembourg)

11:30-12:15

Contributed Talks

A Review of Post-Quantum e-Voting

Laura Mattiuz (Center for Cybersecurity, FBK)

12:15-12:40

Exploring blind signatures under FHE by combining GBFV and HAWK

Lorenzo Rovida (University of Milano-Bicocca, DISCo)

12:40-13:00

Call for Submissions

The call for submissions is now closed.

Organizers

  • Chair Riccardo Longo, Fondazione Bruno Kessler (rlongo@fbk.eu).

  • Organizing Committee:

    • Stefano Berlato, Fondazione Bruno Kessler (sberlato@fbk.eu);
    • Veronica Cristiano, Telsy (veronica.cristiano@telsy.it);
    • Marco Pedicini, Roma Tre University - Department of Mathematics and Physics (marco.pedicini@uniroma3.it);
    • Silvio Ranise, University of Trento - Department of Mathematics and Fondazione Bruno Kessler (ranise@fbk.eu);
    • Chiara Spadafora, University of Trento - Department of Mathematics (chiara.spadafora@unitn.it);
    • Alessandro Tomasi, Fondazione Bruno Kessler (altomasi@fbk.eu).

Acknowledgements

The workshop is developed within the SEcurity and RIghts in the CyberSpace (SERICS) foundation framework (https://serics.eu/). The Foundation’s main purpose is scientific and technological research and, in this perspective, it is established to be the implementing entity of the extended Partnership “SERICS - Security and Rights in CyberSpace” financed following the participation in the Public Notice “for the presentation of Proposals for the creation of “Partnerships extended to universities research centers, companies for the funding of basic research projects” - as part of the National Recovery and Resilience Plan, Mission 4 “Education and Research” - Component 2 “From Research to Enterprise” - Investment 1. 3, funded by the European Union - NextGenerationEU - Notice No. 341 of 15.3.2022.

Related Projects