RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Special RISC Seminar on the occasion of Robbert de Haan's PhD defense
Date: | March 11 |
Location: | Snellius Building (Mathematical Institute), Leiden University |
Schedule: | |
11:00-11:45 | Carles Padró (UPC Barcelona): Ideal (and non-ideal) secret sharing schemes and matroids (survey) Abstract: The connection between secret sharing and matroid theory is known since
the early 90s. In this talk we survey the results on this topic with
special emphasis on the most recent ones. In particular, we discuss some
recent results that have been obtained by applying, for the first time in
secret sharing, the so-called non-Shannon information inequalities.
|
12:00-12:30 | David Freeman (CWI and Leiden): Signing a linear subspace: Signatures for network coding Abstract: Network coding offers increased throughput and improved robustness to
random faults in completely decentralized networks. Since it does not
require centralized control, network coding has been suggested
for routing packets in ad-hoc networks, for content distribution in
peer-to-peer file systems, and for improving the efficiency of
large-scale data dissemination over the Internet.
In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route. For this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes. After reviewing the basics of network coding, we will describe a secure, efficient signature scheme that can be used in conjunction with network coding to prevent malicious modification of data. Our scheme can be viewed as signing linear subspaces in the sense that a signature $\sigma$ on a subspace $V$ authenticates exactly those vectors in $V$. This research is joint work with Dan Boneh (Stanford), Jonathan Katz (Maryland), and Brent Waters (Austin). |
12:30-13:00 | Alp Bassa (CWI and Leiden): Asymptotically Good Self-Dual Codes from Towers of Function Fields Abstract: It has been known for a long time that the class of self-dual codes over a
finite field is asymptotically good and that it attains the
Gilbert-Varshamov bound. Stichtenoth showed that over fields with
quadratic cardinality self-dual codes even attain the Tsfasman-Vladut-Zink
bound. In this talk I will explain this construction and show how one can
obtain an analogous result for self-dual codes over cubic finite fields
using some well-known facts about quadratic forms and a new tower of
function fields.
|
The defense will take place in the Academie-Gebouw | |
15:00-16:00 | Robbert de Haan's PhD defense |
0.04886s