Cryptography and Information Security (CIS) Seminar

Renen Perlman: Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Friday, August 26, 2016 - 10:30am to 12:00pm

Abstract: A fully homomorphic encryption scheme (FHE) allows one to convert an encryption of a message into an encryption of some arbitrary function of that message, without compromising the secrecy of the encrypted message.

Amit Sahai: State of the iO: where we stand in the quest for secure obfuscation
Friday, July 15, 2016 - 10:30am to 12:00pm
Ron Rivest: Symmetric Encryption via Keyrings and ECC
Friday, July 15, 2016 - 1:00pm to 2:30pm
We present a new scheme for implementing a "fuzzy vault", wherein
a message can be encrypted using a biometric (a set of features) or
a set of keywords (a keyring) as a symmetric encryption key.  The
Dakshita Khurana: Two-Message Non-Malleable Commitments
Friday, June 24, 2016 - 10:30am to 12:00pm

Abstract:  We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions.

Kobbi Nissim: Accessing Data while Preserving Privacy
Friday, May 20, 2016 - 10:30am to 12:00pm

Abstract:  We initiate a formal study of the privacy-efficiency tradeoff of secure database systems. Such systems allow storing data on a remote server and accessing it efficiently while maintaining the privacy of the stored data.

Joel Alwen: Data-Independent Memory Hard Functions
Tuesday, May 17, 2016 - 4:00pm to 5:00pm


Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks
Friday, May 6, 2016 - 10:30am to 12:00pm


Ron Rothblum: Spooky Encryption and its Application
Friday, May 13, 2016 - 10:30am to 12:00pm
Abstract:  Consider a setting where inputs x_1,...,x_n are encrypted under
independent public keys. Given the ciphertexts c_i =
Enc(pk_i,x_i), Alice outputs ciphertexts c'_1,...,c'_n that
Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices
Friday, April 15, 2016 - 10:30am to 12:00pm
Can secret information be extracted from PCs and mobile devices by measuring their physical properties from the outside? What would it take to extract whole keys from such fast and complex devices? We present myriad ways to do so, including:
Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts
Thursday, April 7, 2016 - 3:00pm to 4:00pm

Abstract:  Thanks to their anonymity (pseudonymity) and lack of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities, some of them regrettably criminal.


Subscribe to Cryptography and Information Security (CIS) Seminar