RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar
Date: | July 15 |
Location: | CWI, Room L120 |
Schedule: | |
14:00-14:45 | Mihir Bellare (UC San Diego): Pseudorandom Functions and Permutations Secure Against Related-Key Attack Abstract: A related-key attack on a blockcipher allows the attacker to
obtain input-output examples not just under the target key but under
keys related to it. These types of attacks are very popular in
cryptanalysis and the recent attacks on AES are of this form. This
talk surveys theoretical work that has attempted to precisely define
the attack model, consider which attacks are meaningful and provably
achieve security against as wide a class of attacks as possible. The
talk is based on [Bellare-Kohno Eurocrypt 2003] and [Bellare-Cash
Crypto 2010].
|
15:00-15:45 | Michel Abdalla (ENS Paris): Smooth Projective Hashing: Generalizations and Applications Abstract: The notion of smooth projective hash functions was proposed by
Cramer and Shoup and can be seen as special type of zero-knowledge proof
system for a language. Though originally used as a means to
build efficient chosen-ciphertext secure public-key encryption
schemes, some variations of the Cramer-Shoup smooth projective hash
functions also found applications in several other contexts, such as
password-based authenticated key exchange and oblivious transfer. In this
talk, I will review the original concept of smooth projective hash
functions along with its security properties and examples of
instantiations. Next, I will discuss some generalizations along with their
applications. In particular, I will discuss show how smooth
projective hash functions can be used to provide efficient solutions to
well-known cryptographic problems, such as password-based
authenticated key exchange and public-key certification. Finally, I will
conclude this talk by providing some future research directions and open
problems.
|
16:00-16:45 | David Cash (US San Diego): Cryptographic Agility and its Relation to Circular Encryption Abstract: This is joint work with Tolga Acar, Mira Belenkiy, and Mihir Bellare.
We initiate a provable-security treatment of cryptographic agility. A
primitive (for example PRFs, authenticated encryption schemes or
digital signatures) is agile when multiple, individually secure
schemes can securely share the same key. We provide a surprising
connection between two seemingly unrelated but challenging questions. The
first, new to this paper, is whether wPRFs (weak-PRFs) are agile. The
second, already posed several times in the literature, is whether every
secure (IND-R) encryption scheme is secure when encrypting
cycles. We resolve the second question in the negative and thereby the
first as well. We go on to provide a comprehensive treatment of
agility, with definitions for various different primitives. We explain the
practical motivations for agility. We provide foundational results that
show to what extent it is achievable and practical constructions to
achieve it to the best extent possible. On the theoretical side our work
uncovers new notions and relations and settles stated open
questions, and on the practical side it serves to guide developers.
|
0.04214s