RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar
Date:July 15
Location:CWI, Room L120
Schedule: 
14:00-14:45Mihir Bellare (UC San Diego):
Pseudorandom Functions and Permutations Secure Against Related-Key Attack
Abstract: A related-key attack on a blockcipher allows the attacker to obtain input-output examples not just under the target key but under keys related to it. These types of attacks are very popular in cryptanalysis and the recent attacks on AES are of this form. This talk surveys theoretical work that has attempted to precisely define the attack model, consider which attacks are meaningful and provably achieve security against as wide a class of attacks as possible. The talk is based on [Bellare-Kohno Eurocrypt 2003] and [Bellare-Cash Crypto 2010].
15:00-15:45Michel Abdalla (ENS Paris):
Smooth Projective Hashing: Generalizations and Applications
Abstract: The notion of smooth projective hash functions was proposed by Cramer and Shoup and can be seen as special type of zero-knowledge proof system for a language. Though originally used as a means to build efficient chosen-ciphertext secure public-key encryption schemes, some variations of the Cramer-Shoup smooth projective hash functions also found applications in several other contexts, such as password-based authenticated key exchange and oblivious transfer. In this talk, I will review the original concept of smooth projective hash functions along with its security properties and examples of instantiations. Next, I will discuss some generalizations along with their applications. In particular, I will discuss show how smooth projective hash functions can be used to provide efficient solutions to well-known cryptographic problems, such as password-based authenticated key exchange and public-key certification. Finally, I will conclude this talk by providing some future research directions and open problems.
16:00-16:45David Cash (US San Diego):
Cryptographic Agility and its Relation to Circular Encryption
Abstract: This is joint work with Tolga Acar, Mira Belenkiy, and Mihir Bellare. We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, individually secure schemes can securely share the same key. We provide a surprising connection between two seemingly unrelated but challenging questions. The first, new to this paper, is whether wPRFs (weak-PRFs) are agile. The second, already posed several times in the literature, is whether every secure (IND-R) encryption scheme is secure when encrypting cycles. We resolve the second question in the negative and thereby the first as well. We go on to provide a comprehensive treatment of agility, with definitions for various different primitives. We explain the practical motivations for agility. We provide foundational results that show to what extent it is achievable and practical constructions to achieve it to the best extent possible. On the theoretical side our work uncovers new notions and relations and settles stated open questions, and on the practical side it serves to guide developers.
0.04214s