RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/Intercity Seminar
Date: | June 7 |
Location: | CWI, Room L016 |
Schedule: | |
11:45-12:45 | Ten Chinburg (U Pennsylvania): Taking on new capacities Abstract: Capacity theory originated in
the study of how electrical charges distribute
themselves in order to to minimize energy. In this
talk I will give an overview of connections
between this subject and number theory.
|
14:00-14:45 | Juan Garay (AT&T Labs -- Research): Resource-based Corruption in Secure Computation Abstract: The notion of computing in the presence of an adversary which controls
or gets access to parts of the system is at the heart of modern
cryptography. In such a setting, however, the "corruption" of a
party has been viewed as a simple, uniform and atomic operation, where
the adversary decides to get control over a party and this party
immediately gets corrupted. In this work, motivated by the fact that
different parties may require different resources to get corrupted, we
put forth the notion of *resource-based corruptions*, where the
adversary must invest some resources in order to do so.
If the adversary has full information about the system configuration then resource-based corruptions would provide no fundamental difference from the standard corruption model. However, in a resource "anonymous" setting, in the sense that such configuration is hidden from the adversary, much is to be gained in terms of efficiency and security. We showcase the power of such "hidden diversity" in the context of the popular paradigm known as "secure multiparty computation" (MPC) with resource-based corruptions, and prove that it can effectively be used to circumvent known impossibility results. For example, if OPT is the corruption budget that violates the completeness of MPC (the case when half or more of the players are corrupted), we show that if hidden diversity is available, the completeness of MPC can be made to hold against an adversary with as much as a B*OPT budget, for any constant B > 1. Regarding efficiency gains, we show that hidden diversity can be used to force the corruption threshold to drop from 1/2 to 1/3, in turn allowing the use of much more efficient (information-theoretic) MPC protocols. We achieve the above through a series of technical contributions, including: 1) The formulation of the notion of *inversion effort preserving* (IEP) functions which is a type of direct-sum property, and the property of *hardness indistinguishability*. While hardness indistinguishability enables the dissociation of parties' identities and the resources needed to corrupt them, IEP enables the discretization of adversarial work into corruption "tokens," leading to 2) the abstraction of the corruption game as a combinatorial problem and its analysis. This is joint work with David Johnson (AT&T Labs), Aggelos Kiayias (U. of Athens) and Moti Yung (Google). |
15:00-15:45 | Iwan Duursma (U Illinois -- Urbana-Champaign): From abstract curves to efficient secret sharing Abstract: The three families of Deligne-Lusztig curves arise in connection with
representations of the algebraic groups 2A2 (unitary group), 2B2 (Suzuki
group) and 2G2 (Ree group). From their abstract definition it is clear
that in principle the curves are suitable for constructing long
error-correcting codes or secret sharing schemes with many participants.
We describe the following results from the April 2013 thesis of Abdulla
Eid: A smooth model for the Ree curve, the determination of the
Weierstrass semigroup at a rational point, and its application to
curve-based secret sharing.
|
16:00-16:45 | Chaoping Xing (Nanyang Technological University): On torsion limit of algebraic curves over finite fields Abstract: The Ihara limit (or -constant) has been a central problem of study in the asymptotic theory of global function fields (or equivalently, algebraic curves over finite fields). It addresses global function fields with many rational points and so far, most applications of this theory do not require additional properties. Motivated by recent applications, we require global function fields with the additional property that their zero class divisor groups contain at most a small number of torsion points. We capture this by the torsion limit, a new asymptotic quantity for global function fields.
It seems that it is even harder to determine values of this new quantity than the Ihara constant. In this talk, we survey some recent progress on this topic.
(This is a joint work with Ignacio Cascudo and Ronald Cramer) |
0.05136s