DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation
June 8 - 10, 2016
MIT Media Lab - Massachusetts Institute of Technology
- Organizers:
- Ran Canetti, Boston University, canetti at bu.edu
- Mariana Raykova, Yale University
- Elaine Shi, Cornell University
- Mayank Varia, Boston University, varia at bu.edu
Presented under the auspices of the
DIMACS Special
Focus on Cryptography as part of
the DIMACS/Simons
Collaboration in Cryptography and the Modular Approach to Cloud
Security (bu.edu/macs) funded by NSF Frontier grant CNS-1414119.
Workshop Program:
Wednesday, June 8, 2016
8:15 - 8:45 Breakfast (provided)
8:45 - 9:00 Welcome and overview
Ran Canetti, Boston University and TAU
9:00 - 10:00 Intel's Software Guard Extensions Technology and the Memory Encryption Engine
Shay Gueron, University of Haifa, and Intel Corporation
10:00 - 10:30 The Ascend Secure Processor
Chris Fletcher, MIT
10:30 - 11:00 Break
11:00 - 11:30 HOP: Hardware makes Obfuscation Practical
Kartik Nayak, UMD
11:30 - 12:15 Panel: The role of trusted hardware in secure computing
Panelists: Shay Gueron, Srini Devadas, MIT & Elaine Shi, Cornell
Moderator: Mariana Raykova, Yale University
12:15 - 2:00 Lunch (provided)
2:00 - 3:30 Practical Dynamic Composition of Operators in Secure Computation: VoIP and SQL
David Archer, Galois
Deploying Secure Computing for Real-world Applications
Dan Bogdanov, Cybernetica
Secure Computation of MIPS Machine Code
Dov Gordon, George Mason University
3:30 - 4:00 Break
4:00 - 5:30 Analysis and Design of Blockchains
Rafael Pass, Cornell University
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage
Stefano Tessaro, UCSB
New Results on Secure Outsourced Database Storage
Adam O'Neill, Georgetown University
5:30 Reception (At R & D commons)
Thursday, June 9, 2016
8:30 - 9:00 Breakfast (provided)
9:00 - 10:30 Adaptively Secure Garbled Circuits from One-Way Functions
Zahra Jafargholi, NEU
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Kai-min Chung, Academia Sinica
Adaptive Succinct Garbled RAM or How To Delegate Your Database
Yilei Chen, Boston University
10:30 - 11:00 Break
11:00 - 12:00 Constrained PRFs for Unconstrained Inputs
Apoorvaa Deshpande, Brown University
Indistinguishability Obfuscation from Constant Degree Graded Encodings
Rachel Lin, UCSB
RAM-friendly Two-round Adaptively-secure Multiparty Computation
Oxana Poburinnaya, Boston University
12:30 - 2:00 Lunch
2:00 - 3:30 Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocation
Gilad Asharov, IBM
Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation
Samee Zahur, University of Virginia
Further Improvements in Oblivious RAM for MPC for 3 Parties with Honest Majority
Stanislaw Jarecki, UC Irvine
3:30 - 4:00 Break
4:00 - 5:30 The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller, U Bristol
Secure Linear Regression on Vertically Partitioned Datasets
Mariana Raykova, Yale University
Secure Stable and Perfect Matchings
Abhi Shelat, NEU
Friday, June 10, 2016
8:30 - 9:00 Breakfast (provided)
9:00 - 10:00 Verifiable ASICs: Trustworthy Chips with Untrusted Components
Riad S. Wahby, Stanford University
Non-Interactive RAM Delegation from any PIR
Justin Holmgren, MIT
10:00 - 10:30 Break
10:30 - 12:00 The Exact Round Complexity of Secure Computation
Antigoni Polychroniadou, Aarhus
Making Password Checking Systems Better
Thomas Ristenpart, Cornell University
Stronger Public Key Encryption System Withstanding RAM Scraper Like Attacks
Pandu Rangan, IIT Madras (Visiting Faculty at NEU)
12:00 Lunch (provided)
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on June 2, 2016.