Program

9-Aug

17:00h-20:00h

Registration (till 5:30PM) and Reception (from 5:30 PM) at the Harmon

10-Aug

8:45-9:00

Welcome

9:00-10:00

Invited Talk - Prof. Amit Sahai - Information Theoretic Techniques underlying Secure Obfuscation

10:00-11:00

Invited Talk - Prof. Sanjam Garg - Obfuscation without the Vulnerabilities of Multilinear Maps

11:00-11:30

Coffee Break

11:30-11:50

Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai and Rui Xu

 Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters

11:50-12:10

Giulia Traverso, Denise Demirel and Johannes Buchmann

Dynamic and Verifiable Hierarchical Secret Sharing

12:10-12:30

Mehrdad Nojoumian and Douglas Stinson

Dealer-Free Threshold Changeability in Secret Sharing Schemes

12:30-14:00

Lunch

14:00-14:20

Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner and Michael St. Jules

Computational Security of Quantum Encryption

14:20-14:40

Gisbert Janssen and Holger Boche

Distillation of secret key from a class of compound memoryless quantum sources

14:40-15:00

Anne Broadbent and Evelyn Wainewright

Efficient Simulation for Quantum Message Authentication

15:00-15:20

Yfke Dulek, Christian Schaffner and Florian Speelman

Quantum homomorphic encryption for polynomial-sized circuits

15:00-15:30

Coffee Break

15:30-15:50

Roberto De Prisco, Paolo D'Arco and Yvo Desmedt

Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography

15:50-16:10

Koray Karabina and Angela Robinson

Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes

17:00 - 19:00 Informal Dinner at the Swiss 

11-Aug

9:30-10:30

Invited Talk - Prof. Stefano Tessaro - New Techniques for Information-theoretic Indistinguishability

10:30-11:00

Coffee Break

11:00-11:20

Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg and Anand Sarwate

 A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures

11:20-11:40

Hachiro Fujita

 On the Secrecy Capacity of Wiretap Channels with Side Information at the Transmitter

11:40-12:00

Hachiro Fujita

 Writing a Secret Message on the Dirty Paper Known to an Adversary

12:00-12:20

Vladimir Portela Parente and Jeroen van de Graaf.

A Practical Fuzzy Extractor for Continuous Features

12:20-14:00

Lunch

14:00-15:00

Invited Talk - Dr. Martin Roettler - Tools for quantum and reversible circuit compilation and applications to quantum cryptanalysis

15:00-15:20

Gabriele Spini and Serge Fehr

Cheater Detection in SPDZ Multiparty Computation

15:20-15:40

Samuel Ranellucci, Alain Tapp and Rasmus Zacharias

Efficient Generic Zero-knowledge Proofs from Commitments (Extended abstract)

15:40-16:10

Coffee Break

16:10-16:30

Fuchun Lin, Reihaneh Safavi-Naini and Pengwei Wang

Detection of Algebraic Manipulation over a Leaky Storage

16:30-16:50

Kenji Yasunaga

Error-Correcting Codes against Chosen-Codeword Attacks

20:00-22:30  Conference Banquet 

12-Aug

10:00-10:20

Yohei Watanabe, Goichiro Hanaoka and Junji Shikata

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness

10:20-10:40

Shahab Asoodeh, Fady Alajaji and Tamas Linder

Almost Perfect Privacy in Additive Gaussian Privacy Filters

10:40-11:00

Maciej Skórski

A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage

 

Comments