RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Special RISC seminar on Cryptography Applied
Date:October 2
Location:CWI, Room M279
Schedule: 
13:00-13:45Ivan Damgård (Aarhus):
Multi-Party Computation Goes Live
Abstract: We report on the first large-scale and practical application of multiparty computation, which took place in January 2008. Details are given on the background and motivation for the application, as well as on the actual system that was employed. We end with some thoughts on the future potential of multiparty computation in practice.
14:00-14:45Tomas Toft (CWI & TU/e):
Solving linear programming problems using MPC -- theory vs practice
Abstract: There are many real-world situations, where there is much to be gained by having access to a trusted third party. Yet typically this is either expensive or even not possible at all. Multiparty computation (MPC) eliminate this dilemma by providing a virtual trusted third party, who performs the desired computation. Practical MPC is still in its infancy, yet has been shown feasible in real life. One interesting problem is that of solving linear programming (LP) problems. Such problems occurs naturally, e.g. in economics, which gives rise to a large number of motivating examples. A relatively simple yet feasible solution to this problem is presented. The secure computation has been implemented and solves (small) problem instances in a reasonable amount of time. This implementation provides a starting point for a discussion of the differences between theory and practice.
15:00-15:45Jan Camenisch (IBM Zurich):
Crypto in Practice: Private Authentication
Abstract: Our privacy is put at risk as more and more of our daily transactions are done electronically and they all require one to reveal personal information without being able to control what for this data is used by whom. This is even made worse storing and mining data becomes ever easier. In this talk we will discuss how technology can help users to regain and retain control over their personal data. In particular, we will see how one can authenticate without identify oneself. We will conclude with a discussion of open problems.
16:00-16:45Ivan Damgård (Aarhus):
Theory and Practice of Personal Digital Signatures
Abstract: We take a step towards a more realistic modeling of personal digital signatures, where the human user, his mobile equipment, his PC and a server where he may have an account, are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. We then propose a protocol for issuing digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and is also mobile in that it allows usage of any PC that can communicate properly. Finally, we report on the results of a prototype implementation of our solution. Joint work with Gert Mikkelsen
0.05719s