RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Special RISC Seminar on Practical Secure Computation
Date:November 19
Location:CWI, Room L016
Schedule: 
10:30-11:15Robbert de Haan (CWI):
Secure Recommendation Systems
Abstract: A recommendation system involves a large number of users that each initially provide a list of ratings or preferences. During the lifetime of the system users are both able to update their provided list and to request an up-to-date personalized list of recommendations based on the most similar users in the system. In this talk I will present some technical details of ongoing work on secure recommendation systems, where none of the data provided by the users should leak beyond what is exposed by the provided recommendations.
11:30-12:15Ulrich Rührmair (TU München):
Cryptographic Protocols based on Physical Unclonable Functions and Related Structures
Abstract: Physical Unclonable Functions (PUFs) are an emerging, alternative approach in cryptography and security. While their initial use was mainly as a novel key storage element, recent work has discovered their potential as a general cryptographic primitive, comparable to the bounded storage model, quantum cryptography, or noise-based cryptography. In this talk, we undertake a journey through the area, describing PUF-based protocols for identification, key exchange and oblivious transfer. We then move on to two new concepts, which improve and generalize PUFs in certain aspects: So-called SIMPL systems, which are a public key variant of PUFs; and so-termed Virtual Proofs of Reality (VPs), which aim at proving physical statements via remote communication. For future hardware implementations of these two concepts, quantum technology could be a very interesting candidate.
13:45-14:30Marten van Dijk (MIT/CSAIL):
Ascend: Architecture for Secure Computation on ENcrypted Data
Abstract: This presentation considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server running an untrusted software stack).
The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns.
We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads.
0.04699s