RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar
Date:July 3
Location:CWI, Room M280
Schedule: 
14:00-14:45Ueli Maurer (ETH Zurich, Switzerland):
Abstract Models of Computation and Complexity Lower Bounds
Abstract: Computational security proofs in cryptography, without unproven intractability assumptions, exist today only if one restricts the computational model. For example, one can prove a lower bound on the complexity of computing discrete logarithms in a cyclic group if one considers only generic algorithms which can not exploit the properties of the representation of the group elements. A simple abstract model of computation is proposed which allows to capture such reasonable restrictions on the power of algorithms. Several instantiations of the model and the corresponding lower bounds are discussed, including different flavors of generic algorithms in groups.
15:00-15:45Ronald de Wolf (CWI Amsterdam):
Exponential Separations for One-way Quantum Communication Complexity, With Applications to Cryptography
Abstract: We give an exponential separation between one-way quantum and classical communication protocols for a partial Boolean function, which is a variant of the Boolean Hidden Matching Problem of Bar-Yossef et al. Earlier such an exponential separation was known only for a relational version of the Hidden Matching Problem. Our proof uses the Fourier coefficients inequality of Kahn, Kalai, and Linial. We also give a number of applications of this separation. In particular, in the setting of privacy amplification, we show that there exist strong extractors that yield a classically secure key, but that are insecure against a quantum adversary; and in the bounded-storage model of cryptography we give an example of a scheme that is secure against adversaries with a certain amount of classical storage, but that is completely insecure against adversaries with a similar (or even much smaller) amount of *quantum* storage. This is joint work with Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, Ran Raz, in STOC 2007.
16:00-16:45Serge Fehr (CWI Amsterdam):
A New Technique for Randomness Extraction in the Presence of a Quantum Attacker
Abstract: Randomness extraction is of fundamental importance for information-theoretic cryptography. It allows to transform a raw key about which an attacker has some limited knowledge into a fully secure random key, on which the attacker has essentially no information. We show a new randomness-extraction technique which works also in case where the attacker has quantum information on the raw key. Randomness extraction is done by xor'ing a so-called δ-biased mask to the raw key. Up to date, only very few techniques are known to work against a quantum attacker, much in contrast to the classical (non-quantum) setting, which is much better understood and for which a vast amount of different techniques for randomness extraction are known. We show an application of the new technique to private error-correction.
This is joint work with Christian Schaffner.
0.05023s