Cryptography and Information Security (CIS) Seminar

Tancrede Lepoint: Using the Rényi Divergence Rather than the Statistical Distance in Lattice Crypto
Friday, November 4, 2016 - 10:30am to 12:00pm

Abstract: 

Zahra Jafargholi: Adaptive Security of Yao's Garbled Circuits
Friday, August 5, 2016 - 10:30am to 12:00pm
Abstract: 
Renen Perlman: Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Friday, August 26, 2016 - 10:30am to 12:00pm

Abstract: A fully homomorphic encryption scheme (FHE) allows one to convert an encryption of a message into an encryption of some arbitrary function of that message, without compromising the secrecy of the encrypted message.

Amit Sahai: State of the iO: where we stand in the quest for secure obfuscation
Friday, July 15, 2016 - 10:30am to 12:00pm
Abstract:
 
Ron Rivest: Symmetric Encryption via Keyrings and ECC
Friday, July 15, 2016 - 1:00pm to 2:30pm
Abstract:
 
We present a new scheme for implementing a "fuzzy vault", wherein
a message can be encrypted using a biometric (a set of features) or
a set of keywords (a keyring) as a symmetric encryption key.  The
Dakshita Khurana: Two-Message Non-Malleable Commitments
Friday, June 24, 2016 - 10:30am to 12:00pm

Abstract:  We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions.

Kobbi Nissim: Accessing Data while Preserving Privacy
Friday, May 20, 2016 - 10:30am to 12:00pm

Abstract:  We initiate a formal study of the privacy-efficiency tradeoff of secure database systems. Such systems allow storing data on a remote server and accessing it efficiently while maintaining the privacy of the stored data.

Joel Alwen: Data-Independent Memory Hard Functions
Tuesday, May 17, 2016 - 4:00pm to 5:00pm

Abstract:

Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks
Friday, May 6, 2016 - 10:30am to 12:00pm

Abstract: 

Ron Rothblum: Spooky Encryption and its Application
Friday, May 13, 2016 - 10:30am to 12:00pm
Abstract:  Consider a setting where inputs x_1,...,x_n are encrypted under
independent public keys. Given the ciphertexts c_i =
Enc(pk_i,x_i), Alice outputs ciphertexts c'_1,...,c'_n that

Pages

Subscribe to Cryptography and Information Security (CIS) Seminar