RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/DIAMANT Seminar on Mathematical Cryptology
Date: | September 26 |
Location: | CWI, Room M281 |
Schedule: | |
10:00-10:50 | Edlyn Teske (CWI \amp; U Waterloo): Elliptic curves of low embedding degree Abstract: This talk summarizes the currently known results, and discusses some
sample techniques, for generating elliptic curves that are suitable for
implementing cryptographic protocols based on bilinear pairings.
|
10:50-11:40 | Ronald Cramer (CWI & Leiden University): Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computation over Small Fields |
11:40-11:50 | Coffee |
11:50-12:40 | Enav Weinreb (Ben Gurion, Israel): Linear Secret Sharing Schemes over Different Fields are Incomparable Abstract: Monotone span programs are a linear-algebraic model of computation.
They are equivalent to linear secret sharing schemes and have
various applications in cryptography and complexity. A fundamental question
is how the choice of the field in which the algebraic operations are performed
effects the power of the span program. In this work we prove that the power of
monotone span programs over finite fields of different characteristics is
incomparable; we show a super-polynomial separation between any two fields with different
characteristics, answering an open problem of Pudlak and Sgall 1998.
Using this result we prove a super-polynomial lower bound for monotone
span programs for a function in uniform-NC^2 (and therefore in
P), answering an open problem of Babai, Wigderson, and Gal 1999.
(All previous super-polynomial lower bounds for monotone
span programs were for functions not known to be in P.)
Finally, we show that quasi-linear secret sharing schemes,
a generalization of linear secret sharing schemes introduced
in Beimel and Ishai 2001, are stronger than linear secret sharing schemes.
In particular, this proves, without any assumptions, that non-linear
secret sharing schemes are more efficient than linear secret sharing schemes.
|
0.05577s