RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/DIAMANT Seminar on Mathematical Cryptology
Date:September 26
Location:CWI, Room M281
Schedule: 
10:00-10:50Edlyn Teske (CWI \amp; U Waterloo):
Elliptic curves of low embedding degree
Abstract: This talk summarizes the currently known results, and discusses some sample techniques, for generating elliptic curves that are suitable for implementing cryptographic protocols based on bilinear pairings.
10:50-11:40Ronald Cramer (CWI & Leiden University):
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computation over Small Fields
11:40-11:50Coffee
11:50-12:40Enav Weinreb (Ben Gurion, Israel):
Linear Secret Sharing Schemes over Different Fields are Incomparable
Abstract: Monotone span programs are a linear-algebraic model of computation. They are equivalent to linear secret sharing schemes and have various applications in cryptography and complexity. A fundamental question is how the choice of the field in which the algebraic operations are performed effects the power of the span program. In this work we prove that the power of monotone span programs over finite fields of different characteristics is incomparable; we show a super-polynomial separation between any two fields with different characteristics, answering an open problem of Pudlak and Sgall 1998. Using this result we prove a super-polynomial lower bound for monotone span programs for a function in uniform-NC^2 (and therefore in P), answering an open problem of Babai, Wigderson, and Gal 1999. (All previous super-polynomial lower bounds for monotone span programs were for functions not known to be in P.) Finally, we show that quasi-linear secret sharing schemes, a generalization of linear secret sharing schemes introduced in Beimel and Ishai 2001, are stronger than linear secret sharing schemes. In particular, this proves, without any assumptions, that non-linear secret sharing schemes are more efficient than linear secret sharing schemes.
0.05577s