Saturday, January 10, 2015, Athens
|9:30 - 10:00||Registration-Opening|
|10:00 - 10:40||Reliable Broadcast with respect to Topology Knowledge
George Panagiotakos, National Technical University of Athens
Abstract: Reliable Broadcast is a fundamental problem of communication networks. We study this problem in incomplete networks against a Byzantine adversary and with respect to player’s topology knowledge. We examine the problem under the locally bounded adversary model of Koo (2004) and the general adversary model of Hirt and Maurer (1997) and explore the tradeoff between the level of topology knowledge and the solvability of the problem. We refine the local pair-cut technique of Pelc and Peleg (2005) in order to obtain impossibility results for every level of topology knowledge and any type of corruption dis- tribution. On the positive side we devise protocols that match the obtained bounds and thus, exactly characterize the classes of graphs in which Reliable Broadcast is possible. Among others, we show that Koo’s Certified Propagation Algorithm (CPA) is unique against locally bounded adversaries in ad hoc networks, that is, it can tolerate as many local corruptions as any other non-faulty algorithm; this settles an open question posed by Pelc and Peleg. We also provide an adaptation of CPA against general adversaries and show its uniqueness. To the best of our knowledge this is the first optimal algorithm for Reliable Broadcast in generic topology ad hoc networks against general adversaries.
|10:40 - 10:55||Break|
|10:55 - 11:35||Privacy and Security in Aggregation Protocols
Iraklis Leontiadis, Eurecom Institute
Abstract: Due to the widespread deployment of ubiquitous devices, end users are burgeoning service providers with massive amount of data. This proliferation of information has enabled new paradigms in data collection and processing. However this new paradigm acts as a double-edged sword: on the one hand the collection of information empowers service providers to compute useful aggregate statistics, but on the other hand serious privacy and security concerns are undermined. In this presentation we will focus on privacy and security issues in computations performed by untrusted aggregators on highly sensitive data whereby the untrusted aggregators learn the result of the computation. We will first review current state of the art work for privacy preserving computations in the multi-user setting and we will describe a novel solution that tackles for dynamic populations with a more powerful threat model. Moreover we will extend the aforementioned scenario in order to address security issues with respect to the verifiability of computations by first showing why existing solutions in verifiable computations do not fit in our scenario and then by presenting our technique.
|11:35 - 11:45||Break|
|11:45 - 12:35||Digital Currencies, Provable Security and the rise of Cryptoanarchy
Aggelos Kiayias, National and Kapodistrian University of Athens
In this talk we describe a formal security model for bitcoin and other related “cryptocurrencies" that utilize a blockchain data structure. We describe two properties, called common prefix and chain quality and we provide a cryptographic analysis of the core of the bitcoin protocol (that we term the bitcoin backbone) with respect to those properties. We then provide various directions and applications that enable the realization of functionalities in a highly decentralized - anarchic - fashion. Importantly we argue how coordination and consensus can be reached in a scalable fashion without the help of a higher authority.
|12:35 - 14:05||Lunch Break|
|14:05 - 14:45||Timed-Release & Event-Release Encryption
Konstantinos Chalkias, Security R&D, Erybo Inc
Event-Release Encryption (ERE) is dealing with the problem of sending a message so that recipients can only decrypt it if a specific event occurs. In the same sense, Timed-Release Encryption (TRE) studies the problem of “sending information into the future”, i.e., encrypting a message so that it cannot be decrypted by anyone, including the designated recipients, until a time instant in the future. The aforementioned problems are considered closely related; TRE is in fact a special case of ERE, where a specific time instant has the role of an occurred event. The literature offers a variety of mechanisms that provide such functionality. Some of them rely on performing immense non-parallelizable computations, called Time-Lock Puzzles. However, for practical reasons, the majority of proposals make use of third parties synchronizing users and decryption keys. In this talk a set of practical ERE and TRE solutions will be presented. More specifically, we will focus on a practical threshold ERE system based on bilinear pairings over elliptic curve groups and we will also describe a set of real-life applications related to ERE or TRE, such as secure e-lottery, e-contests and blind auctions.
|14:45 - 14:55||Break|
|14:55 - 15:35||Verifiable Queries on Outsourced Datasets: Cryptographic Tools and Constructions for Specific Functions
Dimitris Papadopoulos, Boston University
Joint work with Stavros Papadopoulos from Intel & MIT and Nikos Triandopoulos from RSA Laboratories & Boston University.
Abstract: Outsourcing of data and computation has emerged as common practice for enterprises and individuals, in particular in the context of cloud computing. One security concern that arises in this context is that of integrity-of-computation; how can parties querying the outsourced data be certain for the correctness of the results they receive, even in the presence of a malicious distributing server. In this talk I will go over cryptographic tools that provide secure constructions in a particular model of delegation, that can accommodate various classes of functions. As an example, I will present in detail our recent result for the case of multi-dimensional range queries that appeared in ACM CCS'14.
|15:35 - 16:15||Indistinguishable Arguments of Work or Knowledge
Bingsheng Zhang, National and Kapodistrian University of Athens
Abstract: We introduce a new class of protocols where a prover wants to convince a verifier that either she has performed work or that she possesses knowledge of a witness to a public statement. We call this primitive an argument of work or knowledge (AWorK). In an AWorK, the prover and the verifier agree on a public relation and a class of cryptographic puzzles. At the end of the protocol, the verifier that accepts, will be convinced that the prover either knows the witness or she has invested sufficient computational effort required for solving a puzzle without being able to distinguish which of the two has taken place. We formalize AWorK protocols in terms of their three basic properties, completeness, f -soundness and indistinguishability (where f is a function that determines the tightness of the proof of work as- pect) and we provide a three move protocol that instantiates our definition. Our AWorK protocol employs cryptographic puzzles that adhere to certain uniformity conditions that may be of indepen- dent interest. We instantiate our puzzles in the random oracle (RO) model as well as in the standard model via discrete-logarithm problems over generic groups. We then present applications of AWorK protocols: (i) we first show that any AWorK proto- col implies concurrent quasi-polynomial simulatable arguments of knowledge; by applying this re- sult to our construction we obtain an efficient straight-line concurrent three-move O(λpoly(log λ))- simulatable argument of knowledge, improving the round complexity of the previously known four- move protocol of Pass from Eurocrypt 2003, (ii) we present an anonymous credential system where users may choose to prove their identity or alternatively perform work in order to receive service. The system provides a novel way of tiering users in anonymous credential systems in two classes, those that prefer to be perfectly anonymous (but have to perform work) and those that have regular subscriptions (and hence possess credentials that enable them to avoid work).
|16:15 - 16:30||Break|
|16:30 - 17:10||Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Antigoni Polychroniadou, Aarhus University
Joint work with Sanjam Garg.
Abstract: Adaptively secure Multi-Party Computation (MPC) first studied by Canetti, Feige, Goldreich, and Naor in 1996, is a fundamental notion in cryptography. Adaptive security is particularly hard to achieve in settings where arbitrary number of parties can be corrupted and honest parties are not trusted to properly erase their internal state. We did not know how to realize constant round protocols for this task even if we were to restrict ourselves to semi-honest adversaries and to the simpler two-party setting. Specifically the round complexity of known protocols grows with the depth of the circuit the parties are trying to compute. In this work, using indistinguishability obfuscation, we construct a UC two-round Multi-Party computation protocol secure against any adaptive, active adversary corrupting an arbitrary number of parties.
Προβολή μεγαλύτερου χάρτη
You can arrive at the Central Library by various ways:
By puclic transport:The easiest way is by taking the Blue Metro line and getting off at the "ΚΑΤΕΧΑΚΗ" station. Then take the bus 242, get off at stop "ΘΥΡΩΡΕΙΟ" and walk 5 minutes towards the Central Library.
Another option is to take the bus 140 from the "ΚΑΤΕΧΑΚΗ" metro station and get off at stop "ΠΟΛΥΤΕΧΝΕΙΟΥΠΟΛΗ". Then get into the campus and walk 10 minutes towards the Central Library.
By car:You can use this google map to get directions from Alimou-Katechaki Avenue.
|First Name||Last Name||Affiliation|
|Ilias||Antonopoulos||Undergraduate student, Department of Mathematics, UoA|
|Charalampos||Asimakopoulos||National Technical University of Athens|
|Georgia||Avarikioti||National Technical Univercity of Athens|
|Dimitris||Bakas||University of Athens|
|Aikaterini||Baousi||Undergraduate student in Applied Mathematics (ntua)|
|Marianna||Dragasi||works as an IT integrator|
|Myrto||Galenianou||University of Athens|
|Panagiotis||Georgakopoulos||National Technical University of Athens|
|Dimitris||Karakostas||National Technical University of Athens|
|Stefanos||Koffas||National Technical University of Athens|
|Vasiliki||Kontoura||National Technical University of Athens|
|Eleni||Kouvela||Department of Mathematics of the NTUA (student)|
|Dimitris||Megremis||University of Athens|
|Nikolaos||Melissinos||department of mathematics of the ntua (student)|
|Athanassios||Moschos||University of Patras, Greece|
|Vasileios-Orestis||Papadigenopoulos||National Technical University of Athens|
|Helena||Partalidou||University of Athens|
|Konstantinos||Patsourakos||University Of Athens, Department of Informatics and Telecommunications|
|Stavros||Petsalakis||University of Athens, Department of|
|Stavros||Pieros||Invited by Mr. Zachos|
|Panagiotis||Rizomiliotis||University of the Aegean|
|Dimitris||Sakavalas||National Technical University of Athens|
|Katerina||Samari||National and Kapodistrian University of Athens|
|Stavros||Skapetis||postgrad student (Technoeconomic systems )|
|Maria Ioanna||Spyrakou||university of Athens, student of mathematics|
|Ioannis||Stais||National and Kapodistrian University of Athens|
|Peli||Teloni||National and Kapodistrian University of Athens|
|George||Triantafillou||Postgraduate Student in University Piraeus (Digital Systems Security program)|
|Dimitrios||Tsaktsiras||Graduate student on IT Security|
|Isidoros||Tziotis||University of Athens|
|Georgia||Vagia||Applied Mathematics and Natural Sciences|
|Georgios||Vountourakis||University of Athens|