RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar on Secure Multi-Party Computation and Code-Based Cryptography
Date:December 7, 2017
Location:CWI, Room L016
Schedule: 
10:45 - 11:00 hWelcome coffee
11:00 - 12:00 h Yuval Ishai (Technion, Israel, and UCLA, USA):
Secure arithmetic computation with constant computational overhead
Abstract: Motivated by the goal of efficient secure computations on sensitive numerical data, we present a protocol for securely computing arithmetic circuits that requires only a constant (amortized) number of arithmetic operations per gate. Our protocol is based on new cryptographic assumptions that can be viewed as natural arithmetic analogues of well studied assumptions. Beyond the asymptotic result, a key building block in our protocol can yield concrete efficiency improvements for natural secure computation tasks. Joint work with Benny Applebaum, Ivan Damgård, Michael Nielsen, and Lior Zichron
12:00 - 14:00 hLunch (not organized)
14:00 - 15:00 hMarcel Keller (University of Bristol, UK):
Overdrive: making SPDZ great again
Abstract: SPDZ denotes a protocol for actively secure full-threshold multiparty computation with a preprocessing phase that is based on somewhat homomorphic encryption. At CCS '16, Keller et al. proposed MASCOT, a replacement for the preprocessing phase based on oblivious transfer together with an implementation that improved on previous SPDZ implementations by two orders of magnitude. In this work, we revisit preprocessing based on BGV and show it improves at least an order of magnitude on MASCOT when combining ideas from SPDZ, MASCOT, and BeDOZa (Bendlin et al, Eurocrypt '11). In particular, we found that for a low number of parties, it is more efficient to use a semi-homomorphic version of BGV (multiplicative depth zero).
15:00 - 15:30 hCoffee break
15:30 - 16:30 hGilles Zémor (University of Bordeaux, France):
On code-based cryptography: making McEliece and Regev meet
Abstract: In the McEliece encryption paradigm, decryption consists of decoding by using a hidden code structure but security reductions to decoding generic codes are not readily available. In contrast, Regev (or Alekhnovich) inspired cryptosystems come with such reductions but do not have hidden decoding algorithms available for decryption. We discuss recent progress in code-based cryptography that arguably allows one to profit from both approaches and brings both worlds closer.
0.01423s c