|
Renen Perlman: Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts Friday, August 26, 2016 - 10:30am to 12:00pm Abstract: A fully homomorphic encryption scheme (FHE) allows one to convert an encryption of a message into an encryption of some arbitrary function of that message, without compromising the secrecy of the encrypted message. |
![]() |
Amit Sahai: State of the iO: where we stand in the quest for secure obfuscation Friday, July 15, 2016 - 10:30am to 12:00pm Abstract:
|
![]() |
Ron Rivest: Symmetric Encryption via Keyrings and ECC Friday, July 15, 2016 - 1:00pm to 2:30pm Abstract:
We present a new scheme for implementing a "fuzzy vault", wherein
a message can be encrypted using a biometric (a set of features) or
a set of keywords (a keyring) as a symmetric encryption key. The |
![]() |
Dakshita Khurana: Two-Message Non-Malleable Commitments Friday, June 24, 2016 - 10:30am to 12:00pm Abstract: We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions. |
![]() |
Kobbi Nissim: Accessing Data while Preserving Privacy Friday, May 20, 2016 - 10:30am to 12:00pm Abstract: We initiate a formal study of the privacy-efficiency tradeoff of secure database systems. Such systems allow storing data on a remote server and accessing it efficiently while maintaining the privacy of the stored data. |
![]() |
Joel Alwen: Data-Independent Memory Hard Functions Tuesday, May 17, 2016 - 4:00pm to 5:00pm Abstract: |
![]() |
Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks Friday, May 6, 2016 - 10:30am to 12:00pm Abstract: |
![]() |
Ron Rothblum: Spooky Encryption and its Application Friday, May 13, 2016 - 10:30am to 12:00pm Abstract: Consider a setting where inputs x_1,...,x_n are encrypted under
independent public keys. Given the ciphertexts c_i =
Enc(pk_i,x_i), Alice outputs ciphertexts c'_1,...,c'_n that |
![]() |
Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices Friday, April 15, 2016 - 10:30am to 12:00pm Abstract:
Can secret information be extracted from PCs and mobile devices by measuring their physical properties from the outside? What would it take to extract whole keys from such fast and complex devices? We present myriad ways to do so, including: |
![]() |
Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts Thursday, April 7, 2016 - 3:00pm to 4:00pm Abstract: Thanks to their anonymity (pseudonymity) and lack of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities, some of them regrettably criminal. |