DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation

June 8 - 10, 2016
MIT Media Lab - Massachusetts Institute of Technology

Organizers:
Ran Canetti, Boston University, canetti at bu.edu
Mariana Raykova, Yale University
Elaine Shi, Cornell University
Mayank Varia, Boston University, varia at bu.edu
Presented under the auspices of the DIMACS Special Focus on Cryptography as part of the DIMACS/Simons Collaboration in Cryptography and the Modular Approach to Cloud Security (bu.edu/macs) funded by NSF Frontier grant CNS-1414119.

Workshop Program:

Wednesday, June 8, 2016

 8:15 -  8:45  Breakfast (provided)

 8:45 -  9:00  Welcome and overview
               Ran Canetti, Boston University and TAU

 9:00 - 10:00  Intel's Software Guard Extensions Technology and the Memory Encryption Engine
               Shay Gueron, University of Haifa, and Intel Corporation

10:00 - 10:30  The Ascend Secure Processor
               Chris Fletcher, MIT

10:30 - 11:00  Break
               
11:00 - 11:30  HOP: Hardware makes Obfuscation Practical
               Kartik Nayak, UMD

11:30 - 12:15  Panel: The role of trusted hardware in secure computing
               Panelists: Shay Gueron, Srini Devadas, MIT  & Elaine Shi, Cornell
               Moderator: Mariana Raykova, Yale University

12:15 -  2:00  Lunch (provided)
 
 2:00 -  3:30  Practical Dynamic Composition of Operators in Secure Computation: VoIP and SQL
               David Archer, Galois

               Deploying Secure Computing for Real-world Applications
               Dan Bogdanov, Cybernetica

               Secure Computation of MIPS Machine Code
               Dov Gordon, George Mason University
      
 3:30 -  4:00  Break

 4:00 -  5:30  Analysis and Design of Blockchains              
               Rafael Pass, Cornell University
              
               TaoStore: Overcoming Asynchronicity in Oblivious Data Storage
               Stefano Tessaro, UCSB 
    
               New Results on Secure Outsourced Database Storage
               Adam O'Neill, Georgetown University
          
  5:30         Reception (At R & D commons) 


Thursday, June 9, 2016

 8:30 -  9:00  Breakfast (provided) 

 9:00 - 10:30  Adaptively Secure Garbled Circuits from One-Way Functions
               Zahra Jafargholi, NEU

               Cryptography for Parallel RAM from Indistinguishability Obfuscation
               Kai-min Chung, Academia Sinica 
         
               Adaptive Succinct Garbled RAM or How To Delegate Your Database
               Yilei Chen, Boston University
         
10:30 - 11:00  Break

11:00 - 12:00  Constrained PRFs for Unconstrained Inputs
               Apoorvaa Deshpande, Brown University

               Indistinguishability Obfuscation from Constant Degree Graded Encodings
               Rachel Lin, UCSB

               RAM-friendly Two-round Adaptively-secure Multiparty Computation
               Oxana Poburinnaya, Boston University

12:30 -  2:00  Lunch

 2:00 -  3:30  Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocation
               Gilad Asharov, IBM 

               Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation
               Samee Zahur, University of Virginia

               Further Improvements in Oblivious RAM for MPC for 3 Parties with Honest Majority
               Stanislaw Jarecki, UC Irvine              
               
 3:30 -  4:00  Break

 4:00 -  5:30  The Oblivious Machine - or: How to Put the C into MPC
               Marcel Keller, U Bristol 

               Secure Linear Regression on Vertically Partitioned Datasets
               Mariana Raykova, Yale University
    
               Secure Stable and Perfect Matchings
               Abhi Shelat, NEU
    
Friday, June 10, 2016

 8:30 -  9:00  Breakfast (provided) 

 9:00 - 10:00  Verifiable ASICs: Trustworthy Chips with Untrusted Components
               Riad S. Wahby, Stanford University
    
               Non-Interactive RAM Delegation from any PIR
               Justin Holmgren, MIT
    
10:00 - 10:30  Break

10:30 - 12:00  The Exact Round Complexity of Secure Computation
               Antigoni Polychroniadou, Aarhus 

               Making Password Checking Systems Better
               Thomas Ristenpart, Cornell University
 
               Stronger Public Key Encryption System Withstanding RAM Scraper Like Attacks
               Pandu Rangan, IIT Madras (Visiting Faculty at NEU) 

12:00          Lunch (provided)



Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on June 2, 2016.