Tancrede Lepoint: Using the Rényi Divergence Rather than the Statistical Distance in Lattice Crypto Friday, November 4, 2016 - 10:30am to 12:00pm Abstract: |
|
Zahra Jafargholi: Adaptive Security of Yao's Garbled Circuits Friday, August 5, 2016 - 10:30am to 12:00pm Abstract: |
|
Renen Perlman: Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts Friday, August 26, 2016 - 10:30am to 12:00pm Abstract: A fully homomorphic encryption scheme (FHE) allows one to convert an encryption of a message into an encryption of some arbitrary function of that message, without compromising the secrecy of the encrypted message. |
|
Amit Sahai: State of the iO: where we stand in the quest for secure obfuscation Friday, July 15, 2016 - 10:30am to 12:00pm Abstract:
|
|
Ron Rivest: Symmetric Encryption via Keyrings and ECC Friday, July 15, 2016 - 1:00pm to 2:30pm Abstract:
We present a new scheme for implementing a "fuzzy vault", wherein
a message can be encrypted using a biometric (a set of features) or
a set of keywords (a keyring) as a symmetric encryption key. The |
|
Dakshita Khurana: Two-Message Non-Malleable Commitments Friday, June 24, 2016 - 10:30am to 12:00pm Abstract: We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions. |
|
Kobbi Nissim: Accessing Data while Preserving Privacy Friday, May 20, 2016 - 10:30am to 12:00pm Abstract: We initiate a formal study of the privacy-efficiency tradeoff of secure database systems. Such systems allow storing data on a remote server and accessing it efficiently while maintaining the privacy of the stored data. |
|
Joel Alwen: Data-Independent Memory Hard Functions Tuesday, May 17, 2016 - 4:00pm to 5:00pm Abstract: |
|
Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks Friday, May 6, 2016 - 10:30am to 12:00pm Abstract: |
|
Ron Rothblum: Spooky Encryption and its Application Friday, May 13, 2016 - 10:30am to 12:00pm Abstract: Consider a setting where inputs x_1,...,x_n are encrypted under
independent public keys. Given the ciphertexts c_i =
Enc(pk_i,x_i), Alice outputs ciphertexts c'_1,...,c'_n that |