**CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS**

Seminar series coordinated by Vinod Vaikuntanathan and Yael Kalai.

The talks will be held at the Stata Center, G-882 (the Hewlett room) from 10:30-noon on Fridays.

If you are interested in giving a talk in this series, please contact Vinod or Yael. If you would like to be on the mailing list for this seminar series, please contact Megan Farmer: mfarmer (at sign) mit (dot) edu.

September 13, 2024: Crypto Day at MIT.

September 20, 2024: Lali Devadas (MIT): Batching Adaptively-Sound SNARGs for NP

September 27, 2024: Seyoon Ragavan (MIT): Indistinguishability Obfuscation from Bilinear Maps and LPN Variants

October 4, 2024: TOC student retreat: No seminar.

October 11, 2024: Alexander Poremba (MIT): Simple Constructions of Linear-Depth t-Designs and Pseudorandom Unitaries

October 18, 2024: No seminar

October 25, 2024: No seminar

November 1, 2024: Angelos Pelecanos (UC Berkeley): More Efficient Approximate $K$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities

November 8, 2024: Daniel Wichs (Northeastern): Error Detection and Correction in a Computationally Bounded World

November 15, 2024: Ron Rothblum (Technion)

November 22, 2024: 10.30:12pm Aayush Jain (CMU) / 1.00:2.30pm Quang Dao (CMU)

November 29, 2024: Thanksgiving: No seminar.

December 6, 2024: 10.30-12pm Kabir Tomer (UIUC)

1.00-2.30pm Jiahui Liu (MIT) : The Black-Box Simulation Barrier Persists in a Fully Quantum World

December 13, 2024: Henry Corrigan-Gibbs (MIT)

July 19, 2024: Maria Corte Real Santos (University College London): Post-quantum secure signature schemes from isogenies

August 16, 2024: Yevgeniy Dodis (New York University): Perpetual Encryption

__Spring 2024__

February 16, 2024: Luowen Qian (Boston University): Unconditionally secure quantum commitments with preprocessing

March 1, 2024: No seminar: Grad visit day

March 8, 2024: Charles River Crypto Day at Northeastern

March 29, 2024: Spring Break

April 5, 2024: Valerio Cini (NTT Research): Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable

May 17, 2024: Zhengzhong Jin (Northeastern University): Universal SNARGs for NP from Proofs of Completeness

September 15, 2023: Rachel Zhang (MIT), Binary Error-Correcting Codes with Minimal Noiseless Feedback.

September 22, 2023: No seminar // Student Holiday.

September 29, 2023: Hanshen Xiao (MIT), PAC Privacy: Automatic Privacy Measurement and Control of Data Processing

October 6, 2023: Oded Regev (NYU), `An Efficient Quantum Factoring Algorithm. `Joint with the theory reading group.

October 13, 2023: Alexis Korb (UCLA), Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Assumptions

October 20, 2023: Crypto Day at MIT. Aayush Jain (CMU), Ji Luo (University of Washington), Hoeteck Wee (NTT Research), Tina Zhang (MIT).

October 27, 2023: Daniel Wichs (Northeastern). Universal Amplification of KDM Security: From 1-Key to Multi-Key

November 3, 2023: Alexandra Henzinger (MIT) Private Web Search with Tiptoe

November 17, 2023: Jiahui Liu (MIT) Quantum Key Leasing for PKE and FHE with a Classical Lessor

November 24, 2023: Thanksgiving.

December 1, 2023: Cody Freitag (BU and Northeastern) Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance

December 8, 2023: Alex Lombardi (Princeton). SNARGs, Propositional Proofs, and Local Unsatisfiability

December 15, 2023: Jad Silbak: Explicit Codes for Poly-Size Circuits and Functions that are Hard to Sample on Low Entropy Distributions

July 21, 2023: Jonathan Bootle: Lattice-Based Succinct Arguments for NP

Feburuary 10, 2023: LaKyah Tyner: Nearly Optimal Property Preserving Hashing

March 10, 2023: Crypto day at BU (Noga Amit, Jiahui Liu, James Bartusek)

September 9, 2022: Cody Freitag: The Cost of Statistical Security in Interactive Proofs for Repeated Squaring

Septmber 30, 2022: Luowen Qian: On the computational hardness needed for quantum cryptography

October 21, 2022: Ji Luo: The Pseudorandom Oracle Model and Ideal Obfuscation

November 18, 2022: Spencer Peters: Revisiting Time-Space Tradeoffs for Function Inversion

December 2, 2022: Charles River Crypto Day, hosted by BU

December 9, 2022: Neekon Vafa: MacORAMa: Optimal Oblivious RAM with Integrity

Spring 2022

March 4, 2022: (**Special time - 10:30am to 12:00pm) **Anne Broadbent: Bob's sidekick (or how limiitations on tripartite quantum correlations are useful for cryptography)

March 11, 2022: Charles River Crypto Day (In Person) hosted by BU

March 18, 2022:Ron Rothblum:Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead

March 25, 2022: MIT Spring Break

August 19, 2022: Alexandru Gheorghiu: Proofs of Quantumness

Fall 2021

September 10, 2021: Hemanta Maji: Computational Hardness of Optimal Fair Computation

September 17, 2021: Ilan Komargodski: A Logarithmic Lower Bound for Oblivious RAM (for all parameters)

October 1, 2021: No Seminar, Eurocrypt Deadline

October 15, 2021: No Seminar.

October 22, 2021: Katerina Sotiraki: Sumcheck Arguments and their Applications

October 29, 2021: Qipeng Liu: Hidden Cosets and Applications to Unclonable Cryptography

November 5, 2021: Lior Rotem: **Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking **

November 19, 2021: Charles River Crypto Day hosted by MIT

November 26, 2021: Thanksgiving Break No Seminar

December 6, 2021 (Special Seminar): Merav Parter: A Graph Theoretic Approach for Resilient Distributed Algorithms

Spring 2021

February 5, 2021: Tina Zhang: Classical proofs of quantum knowledge

February 12, 2021: Charles River Crypto Day

February 19, 2021: Rafael Pass: On One-way Functions and Kolmogorov Complexity

February 26, 2021: Rachel Zhang: SNARGs for Bounded Depth Computations

March 5, 2021: Alex Lombardi: Fiat-Shamir via List-Recoverable Codes

March 19, 2021: Jiayu Zhang: Succinct Blind Quantum Computation Using a Random Oracle

March 26, 2021: Prabhanjan Ananth: Secure Software Leasing

April 2, 2021: Ron Rothblum: Local Proofs Approaching the Witness Length

April 23, 2021: Sophia Yakoubov: The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT

April 30, 2021** (Special Time of 9:30amET)**: Shuichi Hirahara: Average-Case Hardness of NP from Exponential Worst-Case Hardness Assumptions

May 7, 2021: No Seminar MIT Holiday

May 21, 2021: Fermi Ma: Post-Quantum Succinct Arguments

Fall 2020

October 23, 2020: Tianren Liu: Information-Theoretic 2-Round MPC without Round Collapsing

October 30, 2020: Daniel Wichs: Candidate Obfuscation via Oblivious LWE Sampling

November 20, 2020: Romain Gay: Indistinguishability Obfuscation from Circular Security

November 27, 2020: Thanksgiving Break

2 Part Seminar:

December 4, 2020 (1-2pm and 2:30 - 4pm): Aayush Jain, Huijia (Rachel) Lin and Amit Sahai: Indistinguishability Obfuscation from Well-Founded Assumptions

Summer 2020

July 30 & 31, 2020: Charles River Crypto Day

Spring 2020

There will be no CIS Seminar in spring 2020.

Fall 2019

October 4, 2019: Theory Student Retreat

October 11, 2019: 10:30-12:00, Rotem Tsabary: Fully Secure Attribute-Based Encryption for t-CNF from LWE

October 18, 2019: Christopher Peikert: Noninteractive Zero Knowledge for NP from Learning With Errors

November 1, 2019: Crypto Day at MSR

November 8, 2019: Rishab Goyal: Mixed Functional Encryption: A new stepping stone towards efficient tracing

November 15, 2019: Daniel Wichs: Extracting Randomness from Exractor-Dependent Sources

November 22, 2019: Ashutosh Kumar: Securing Secret Sharing Against Leakage and Tampering

November 29, 2019: Thanksgiving Vacation

December 13, 2019: Muthu Venkitasubramaniam: A Round-Collapse Theorem for Computational-Sound Protocols: or, TFNP is

December 18, 2019 (special date): Noah Golowich: On the Power of Multiple Anonymous Messages

Spring 2019

January 15, 2019: Ellete Boyle: Compression Vector OLE and More

February 8, 2019: Cancelled To Be Rescheduled - Nadia Heninger: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies

February 15, 2019: Alex Lombardi: Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE

February 22, 2019: Rio LaVigne: Adversarially Robust Property-Perserving Hash Functions

March 1, 2019: EECS Visit Day

March 8, 2019: Crypto Day at MIT

March 29, 2019: Spring Vacation

April 12, 2019: Yevgeniy Dodis (NYU): Seedless Fruit is the Sweetest: Random Number Generation, Revisited

May 3, 2019: Crypto Day at Northeastern

May 10, 2019: Willy Quach

May 31, 2019: Nadia Heninger: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies

July 26, 2019: Ran Gelles: Optimal Short-Circuit Resilient Formulas

Fall 2018

September 14, 2018: Eylon Yogev (Weizmann Institute):On Distributional Collision Resistant Hashing

September 21, 2018: Student Holiday

September 28, 2018: Aikaterini Sotiraki (MIT): PPP-Completeness with Connections to Cryptography

October 12, 2018: Xiao Wang (MIT): Covert Security with Public Verifiability: Simpler, Faster, and Leaner

October 19, 2018: Yevgeniy Dodis (NYU): Small-Box Cryptography

November 9, 2018:** (32-155): ** Oxana Poburinnaya (Boston University): Fully bi-deniable interactive encryption

November 16, 2018: Hoeteck Wee (ENS): Obfuscation from LWE: How Far Are We?

November 23, 2018: Thanksgiving Holiday

November 30, 2018: Amit Sahai (UCLA): Obfuscation without multilinear maps

December 7, 2018: MACS Meeting, No Seminar

December 14, 2018: Crypto Day at BU

Spring 2018

January 26, 2018: Xiao Wang (Maryland): Authenticated Garbling: Efficient Maliciously Secure Two-Party Computation and Global-Scale Secure Multiparty Computation

February 2, 2018: Saleet Klein (MIT): The Edited Truth

February 9, 2018: Yupeng Zhang (Maryland): Verifiable Databases and RAM Programs

February 16, 2018: Crypto Day at MIT, Hewlett G882

February 23, 2018: Mukul Kulkarni (Maryland): Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering

March 9, 2018: Hayim Shaul (MIT): Scalable Secure Computation of Moments with Application to k-Nearest Neighbors

March 16, 2018: Homomorphic Encryption Standardization Workshop at MIT (Kiva)

March 23, 2018: Jack Doerner (Northeastern): Scaling ORAM for Secure Computation

March 30, 2018: MIT Spring Break

April 6, 2018: FOCS deadline, no seminar.

April 20, 2018: Crypto Day at MS Research and Development Office

May 4, 2018: Graduating Bits, No Seminar

May 11, 2018: 10:30 - 12:00: Kevin Fu (University of Michigan): Physics of Cybersecurity: Sensors, Acoustics, Cuba

May 18, 2018:** (Double Header - Lunch Provided)**

September 15, 2017: Adi Akavia: Secure search in the cloud: homomorphic encryption meets coresets

September 22, 2017: Akshay Degwekar: From Laconic Zero Knowledge to Public Key Cryptography

September 29, 2017: Tianren Liu: Towards Breaking the Exponential Barrier for General Secret Sharing

October 6, 2017: Prabhanjan Ananth: A New Approach to Round-Optimal Secure Multiparty Computation

October 13, 2017: Sam Kim: Watermarking Cryptographic Functionalities from Standard Lattice Assumptions

October 27, 2017: Rafael Pass: Explorations into Algorithmic Fairness

November 9, 2017: CRYPTO DAY at BU.

November 17, 2017: Ran Cohen: Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols

December 1, 2017: Alex Lombardi: Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions

December 8, 2017: **DOUBLE FEATURE **(Lunch provided)

10:30-12, Hewlett, G882: Yilei Chen: Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption

1:00-2:30pm, G575: Peter Byerley Rindal: Fast and Secure Private Set Intersection

December 15, 2017: CRYPTO DAY AT NEU.

July 28, 2017: Amit Sahai: Why We Rewind

February 10, 2017: Prashant Nalini Vasudevan: Average-Case Fine-Grained Hardness, and what to do with it

February 17, 2017: Charles River Crypto Day (MSR)

February 24, 2017: Oxana Poburinnaya: Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model

March 3, 2017: No Seminar -- Grad Visit Day

March 10, 2017: Yilei Chen: Constraint-hiding constrained PRFs for NC1 from LWE

March 17, 2017: Itay Berman: Zero-Knowledge Proofs of Proximity

March 31, 2017: MIT Spring Break

April 7, 2017: Aloni Cohen: Cryptography with Updates

April 14, 2017: Nir Bitansky: Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs

April 28, 2017: Jonathan Ullman: Tight Lower Bounds for Differentially Private Selection

May 12, 2017: Charles River Crypto Day (BU)

June 16, 2017: Dakshita Khurana: How to Achieve Non-malleability in One or Two Rounds, or, A Knowledge Extraction Technique for Two Round Protocols

September 9, 2016: No Seminar (MACS PI Meeting)

September 23, 2016: No Seminar (Theory Student Retreat)

September 30, 2016: Akshay Degwekar (MIT): Structure vs Hardness Through the Pbfuscation Lens

October 14, 2016: Charles River Crypto Day (Nir Bitansky, Rachel Lin, Jing Chen, Elaine Shi and Jeremiah Blocki)

October 21, 2016: Ling Ren (MIT): Proof of Space from Stacked Expanders

October 28, 2016: Muthuramakrishnan Venkitasubramaniam: Compsoable Adaptive Secure Protocols without Setup under Polytime Assumptions

November 11, 2016: Albert Meyer's Retirement Celebration day of talks, Star D463

November 18, 2016: DOUBLE FEATURE (Lunch Provided)

10:30 - 12:00: Vassilis Zikas (RPI): Fair and Robust Multi-Party Computation using a Global Transaction Ledger

12:30 - 2:00: Joseph Bonneau (Stanford): Public randomness, blockchains and proofs-of-delay

November 25, 2016: MIT Holiday - Thanksgiving

December 9, 2016: Charles River Crypto Day (Mike Rosulek, Leo Reyzin, Dana Dachman-Soled and Gillat Kol)

July 15, 2016: SPECIAL - 2 Talks:

10:30am - 12:00pm - Amit Sahai: State of the iO: Where we stand in the quest for secure obfuscation

1:00pm - 2:30pm - Ron Rivest: Symmetric Encryption via Keyrings and ECC

August 5, 2016: Zahra Jafargholi: Adaptive Security of Yao's Garbled Circuits

February 5, 2016: Daniel Genkin: Efficient Multi-Party Computation: from Passive to Active Security using Additive-Attack Resilient Circuits

February 12, 2016: Elette Boyle: New Developments in Function Secret Sharing

February 19, 2016: Aloni Cohen: GGM is a Weakly One-Way Family of Functions

February 26, 2016: Crypto Day, MSR New England

March 11, 2016: Adam Sealfon: Network Oblivious Transfer

March 18, 2016: Jean-Jacques Quisquater: Quisquater: Is the Group Theory Fully Used for Cryptography

March 25, 2016: Spring Vacation

April 1, 2016: Mark Zhandry: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13

April 7, 2016 (Special date and time) Joint with DCI: Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts

April 8, 2016: Prashant Vasudevan: Fine-Grained Cryptography

April 15, 2016: Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices

April 22, 2016: Prabhanjan Ananth: Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security

April 29, 2016: Valerio Pastro: Essentially Optimal Robust Secret Sharing with Maximal Corruptions

May 6, 2016: Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks

May 13, 2016: Ron Rothblum: Spooky Encryption and its Application

May 17, 2016: (Special Date, Time and Location) - Joel Alwen: Data-Independent Memory Hard Functions

May 20, 2016: Kobbi Nissim: Accessing Data while Preserving Privacy

June 24, 2016: Dakshita Khurana: Two-Message Non-Malleable Commitments

September 11, 2015: Ranjit Kumaresan: Secure Computation with Minimul Interaction, Revisited

September 18, 2015: Silas Richelson: On the Hardness of Learning with Small Modulus

September 25, 2015: Noah Stephens-Davidowitz: Solving SVP (and CVP) in 2^n Time via Discrete Gaussian Sampling

October 2, 2015: NSF MACS PI Meeting

October 23, 2015: Charles River Cyrpto Day at MIT

October 30, 2015: Anne Broadbent: Quantum homomorphic encryption for circuits of low T-gate complexity

November 13, 2015: Fabrice Ben Hamouda: New Techniques for SPHFs and Efficient One-Round PAKE Protocols

November 20, 2015: Charanjit Jutla: Upending Stock Market Structure Using Secure Computation

November 27, 2015: No Seminer - Thanksgiving holiday

December 3, 2015: (Cancelled, to be rescheduled at a later date) Jean-Jacques Quisquater: The Presentations of Finite Symmetric and Alternate Groups as an Another Parallel Story

December 4, 2015: Yilei Chen: On the Correlation Intractability of Obfuscated Pseudorandom Functions

December 4, 2015: Charlie Savage et al: Power Wars: Surveillance, Drones, and Obama's Post-9/11 Presidency

December 11, 2015: Sanjam Garg: Avoiding Sub-Exponential Loss in Obfustopia

**Spring 2015**

January 23, 2015: Vanishree Rao: Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model

January 30, 2015: BU Hariri Center: Oblivious RAM Day

February 6, 2015: Raphael Bost: Machine Learning Classification over Encrypted Data

February 13, 2015: Silas Richelson: Topology-Hiding Computation

February 20, 2015: Charles River Crypto Day, MSR

March 6, 2015: Ben Fisch: Physical Zero Knowledge and Secure Computation

March 13, 2015: Ranjit Kumaresan: How to Use Bitcoin to Design Fair Protocols

March 27, 2015: Spring Vacation

April 10, 2015: Omer Paneth: On Obfuscation with Random Oracles

April 17, 2015: Charles River Crypto Day, Northeastern University

April 24, 2015: Sergey Gorbunov: Graph-Induced Multilinear Maps from Lattices

May 1, 2015: Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs

May 8, 2015: Mark Zhandry: Order-Revealing Encryption and the Hardness of Private Learning

May 15, 2015: Aloni Cohen: Publicly Verifiable Software Watermarking

__Summer/Fall 2014__

July 10, 2014: Manoj Prabhakaran: On the Communication Complexity of Secure Computation

July 11, 2014: Brent Waters: Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption

July 25, 2014: Elette Boyle: Large-Scale Secure Computation

September 3, 2014 (Special date and time): Boaz Barak: Sum of Squares Proofs and the Quest towards Optimal Algorithms

September 12, 2014: Mark Zhandry: Fully Secure Functional Encryption Without Obfuscation

September 19, 2014: No Classes

October 10, 2014: Sergey Gorbunov: New Advances in Functional Encryption

October 17, 2014: Nir Bitansky: On Virtual Grey Box Obfuscation for General Circuits

October 24, 2014: Charles River Crypto Day, MIT

October 30, 2014 (Special date and time): Nigel Smart: Breaking a real life signature scheme with only 20 signature queries

October 31, 2014: Zvika Brakerski: Obfuscating Circuits via Composite-Order Graded Encoding

November 7, 2014: Hoeteck Wee: Dual System Encryption via Predicate Encodings

November 14, 2014: Daniel Wichs: **On the Communication Complexity of Secure Function Evaluation with Long Output**

November 21, 2014: Joint CIS/TOC seminar: Antoine Joux

November 28, 2014: (Thanksgiving)

December 5, 2014: Crypto Day, BU

December 12, 2014: Benjamin Fuller: Strong Key Derivation from Noisy Sources

**2014**

January 24, 2014: Alessandra Scafuro, UCLA: Black-box non-black-box zero-knowledge via extendable Merkle tree

January 31, 2014: Shai Halevi, IBM: Candidate Multilinear Maps from Ideal Lattices

February 7, 2014: Pavel Hubacek, University of Aarhus: Rational Arguments: Single Round Delegation with Sublinear Verification

February 14, 2014: No talk scheduled

February 21, 2014: Gilad Asharov, Bar-Ilan University: Towards Characterizing Complete Fairness in Secure Two-Party Computation

February 28, 2014: Itay Berman, Tel Aviv University: Coin Flipping of Any Constant Bias Implies One-Way Functions

March 7, 2014: Graduate Student Talk in 32-G882 2:30-5pm

March 14, 2014: No Talk

March 21, 2014: Daniel Wichs, Garbling and Outsourcing RAM Computation

March 28, 2014: Spring Break! No seminar

April 4, 2014: Adam Smith, Penn State: Regularity of Lossy Exponentiation and Applications

April 11, 2014: No Talk

April 14, 2014: Cancelled: Special Seminar with Ross Anderson: EMV: Why Payment Systems Fail

April 18, 2014: David Xiao: Redrawing the boundaries of purchasing data from privacy-sensitive individuals

April 25, 2014: Mark Zhandry: How to Avoid Obfuscation using Witness PRFs

May 1, 2014: Special Seminar with Shafi Goldwasser: The Cryptographic Lens

May 2, 2014: Sergey Gorbunov: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

May 9, 2014: No Talk Scheduled

May 16, 2014: No Talk Scheduled

May 23, 2014: Moses Liskov: Modeling Diffie-Hellman Derivability for Automated Analysis

May 30, 2014: Alessandro Chiesa: TBA

June 6, 2014: Commencement: No Talk Scheduled

June 13, 2014: No Talk Scheduled

June 20, 2014: Theory Day

__2013__

December 6, 2013: Guy Rothblum: Speaker- Guy Rothblum, MSR Silicon Valley, MIT Alum

November 22, 2013: Alessandro Chiesa: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

November 8, 2013: Daniele Micciancio: An equational approach to secure multiparty computation

November 1, 2013: Kobbi Nissim: Private Approximations and Big Data

October 18, 2013: Adi Shamir: Dissection: A New Paradigm for Solving Bicomposite Search Problems

October 17, 2013: Amir Herzberg: SPECIAL SEMINAR! Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI

September 13, 2013: Moni Naor: Cryptography and Data Structures: A Match Made in Heaven

Historical CIS Seminar listing 2013-1995