RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar on Secure Multi-Party Computation and Code-Based Cryptography
Date: | December 7, 2017 |
Location: | CWI, Room L016 |
Schedule: | |
10:45 - 11:00 h | Welcome coffee |
11:00 - 12:00 h | Yuval Ishai (Technion, Israel, and UCLA, USA): Secure arithmetic computation with constant computational overhead Abstract: Motivated by the goal of efficient secure computations on
sensitive numerical data, we present a protocol for securely computing
arithmetic circuits that requires only a constant (amortized) number of
arithmetic operations per gate. Our protocol is based on new
cryptographic assumptions that can be viewed as natural arithmetic
analogues of well studied assumptions. Beyond the asymptotic result, a
key building block in our protocol can yield concrete efficiency
improvements for natural secure computation tasks.
Joint work with Benny Applebaum, Ivan Damgård, Michael Nielsen, and Lior
Zichron
|
12:00 - 14:00 h | Lunch (not organized) |
14:00 - 15:00 h | Marcel Keller (University of Bristol, UK): Overdrive: making SPDZ great again Abstract: SPDZ denotes a protocol for actively secure full-threshold
multiparty computation with a preprocessing phase that is based on
somewhat homomorphic encryption. At CCS '16, Keller et al. proposed
MASCOT, a replacement for the preprocessing phase based on oblivious
transfer together with an implementation that improved on previous SPDZ
implementations by two orders of magnitude. In this work, we revisit
preprocessing based on BGV and show it improves at least an order of
magnitude on MASCOT when combining ideas from SPDZ, MASCOT, and BeDOZa
(Bendlin et al, Eurocrypt '11). In particular, we found that for a low
number of parties, it is more efficient to use a semi-homomorphic
version of BGV (multiplicative depth zero).
|
15:00 - 15:30 h | Coffee break |
15:30 - 16:30 h | Gilles Zémor (University of Bordeaux, France): On code-based cryptography: making McEliece and Regev meet Abstract: In the McEliece encryption paradigm, decryption consists of
decoding by using a hidden code structure but security reductions to
decoding generic codes are not readily available. In contrast, Regev (or
Alekhnovich) inspired cryptosystems come with such reductions but do not
have hidden decoding algorithms available for decryption.
We discuss recent progress in code-based cryptography that arguably
allows one to profit from both approaches and brings both worlds closer.
|
0.01423s c