RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar
Date:June 28
Location:NIKHEF, Room H220
Schedule: 
14:00-14:30David Cash (Georgia Institute of Technology, Atlanta):
Non-Malleable Hash Functions
Abstract: There is currently a significant gap between the design goals for hash functions and actual properties needed by cryptographers, the formal methods community, and information security practitioners. This is best illustrated by the widespread adoption of the Random Oracle Model, a heuristic methodology for analyzing protocols that assumes that a hash function is an ideal random function.
In this work we take a step towards rectifying this situation by introducing the notion of non-malleable hash functions. Briefly stated, non-malleability guarantees that, given the hash H(m) of some message m, an adversary should not be able to produce the hash H(m*) for some m* that is meaningfully related to m. Non-Malleability has proven to be a crucial property of primitives like encryption, commitments, and zero-knowledge proofs, but its application to hash functions has not been treated formally. Interestingly, the typical properties of hash functions, like public verifiability and length compression, prevent us from directly translating the definition of non-malleability from other contexts.
In this talk we will give some motivating examples for the study of non-malleability, and we will describe some attempts at defining non-malleable hash functions on the way to developing a meaningful, achievable definition. Finally we will give a proof-of-concept construction for our definition and discuss its application to message authentication codes.
This is joint work with Alexandra Boldyreva, Marc Fischlin, and Bogdan Warinschi.
14:30-15:00Adam O'Neill (Georgia Institute of Technology, Atlanta):
Deterministic and Efficiently Searchable Encryption
Abstract: We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We obtain as a consequence database encryption methods that permit fast (ie. sub-linear, and in fact logarithmic, time) search while provably providing privacy that is as strong as possible subject to this fast search constraint. One of our constructs, called RSA-DOAEP, has the added feature of being length preserving, so that it is the first example of a public-key cipher. We generalize this to obtain a notion of efficiently-searchable encryption schemes which permit more flexible privacy to search-time trade-offs via a technique called bucketization. Our results answer much-asked questions in the database community and provide foundations for work done there.
Joint work with Mihir Bellare (UCSD) and Alexandra Boldyreva (Georgia Tech)
0.11414s