RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Special RISC Seminar on Practical Secure Computation
Date: | November 19 |
Location: | CWI, Room L016 |
Schedule: | |
10:30-11:15 | Robbert de Haan (CWI): Secure Recommendation Systems Abstract: A recommendation system involves a large number of users that each
initially provide a list of ratings or preferences. During the lifetime
of the system users are both able to update their provided list and to
request an up-to-date personalized list of recommendations based on the
most similar users in the system. In this talk I will present some
technical details of ongoing work on secure recommendation systems,
where none of the data provided by the users should leak beyond what is
exposed by the provided recommendations.
|
11:30-12:15 | Ulrich Rührmair (TU München): Cryptographic Protocols based on Physical Unclonable Functions and Related Structures Abstract: Physical Unclonable Functions (PUFs) are an emerging, alternative approach in cryptography and security. While their initial use was mainly as a novel key storage element, recent work has discovered their potential as a general cryptographic primitive, comparable to the bounded storage model, quantum cryptography, or noise-based cryptography. In this talk, we undertake a journey through the area, describing PUF-based protocols for identification, key exchange and oblivious transfer. We then move on to two new concepts, which improve and generalize PUFs in certain aspects: So-called SIMPL systems, which are a public key variant of PUFs; and so-termed Virtual Proofs of Reality (VPs), which aim at proving physical statements via remote communication. For future hardware implementations of these two concepts, quantum technology could be a very interesting candidate.
|
13:45-14:30 | Marten van Dijk (MIT/CSAIL): Ascend: Architecture for Secure Computation on ENcrypted Data Abstract: This presentation considers encrypted computation where the user
specifies encrypted inputs to an untrusted program, and the server computes
on those encrypted inputs. To this end we propose a secure processor
architecture, called Ascend, that guarantees privacy of data when arbitrary
programs use the data running in a cloud-like environment (e.g., an
untrusted server running an untrusted software stack).
The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns. We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads. |
0.04699s