Breaking a real life signature scheme with only 20 signature queries Thursday, October 30, 2014 - 4:00pm to 5:30pm Abstract: I will discuss recent joint work with Uni. Adelaide on |
|
Obfuscating Circuits via Composite-Order Graded Encoding Friday, October 31, 2014 - 10:30am to 12:00pm Abstract:
|
|
On the Communication Complexity of Secure Function Evaluation with Long Output Friday, November 14, 2014 - 10:30am to 12:00pm Abstract: We study the communication complexity of secure function evaluation (SFE). |
|
Dual System Encryption via Predicate Encodings Friday, November 7, 2014 - 10:30am to 12:00pm Abstract: In this talk, I will present the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in addition, satisfies a novel notion of reusability. Using this notion, we obtain a unifying framework for adaptively-secure |
|
Strong Key Derivation from Noisy Sources Friday, December 12, 2014 - 10:30am to 12:00pm Abstract: A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substan |
|
Sergey Gorbunov: New Advances in Fuctional Encryption Friday, October 10, 2014 - 10:30am to 12:00pm Abstract: Functional encryption is an emerging vision for public-key cryptography offering fine-grained mechanism for computing on encrypted data. Unfortunately, currently all of the more powerful constructions of functional encryption are built from non |