August 5, 2016 August 6, 2016

Cloud Cryptography

Location: Microsoft Research, Redmond

Thursday, August 5

9:00 – 9:30Welcome and opening remarks

9:30 – 10:50 |  VideoPoint Obfuscation and Friends, Ran CanettiOutsourcing Computation, Craig Gentry

10:50 – 11:10Coffee break

11:10 – 12:30 | VideoWriting on Wind and Water: Enforcing File Robustness in the Cloud, Ari JuelsEfficient Verification of Outsourced Data and Computations, Charalampos(Babis) Papamanthou

12:30 – 2:00Lunch

2:00 – 4:00 |  VideoPredicate Encryption, Emily ShenStructured Encryption and Controlled Disclosure, Seny KamaraCloud Cryptography: A new era for cryptographic research, Giuseppe Atteniese

4:00 – 4:20Coffee break

4:20 – 5:40 |  VideoCloudy, Without a Chance of Data Loss – Implementation, Kevin BowersDynamic Symmetric Searchable Encryption, Tom Roeder

6:00 – 7:30Reception

7:30 – ? Rump session

Friday, August 6

10:00 – 12:00Sharing Sensitive Information with Privacy, Gene TsudikComputing with Multivariate Polynomials and Application to Multi-Party Secure Set Intersection, Mariana RaykovaZero Knowledge Sets: Short Commitments and Proofs for Large Sets, Melissa Chase

12:00 – 1:30Lunch

1:30 – 3:30 |  VideoVirtual Machine Reset Vulnerabilities and Hedged Cryptography, Tom RistenpartSubspace LWE, Krzysztof PietrzakCryptography Against Continuous Memory Attacks, Yevgeniy Dodis

3:30 – 3:50Coffee break

3:50 – 5:50 |  VideoRerandomizable Yao Circuits and i-Hop Homomorphic Encryption, Vinod VaikuntanathanBi-Deniable Encryption, Chris PeikertWe Have The Technology, Now Where Next?, David Molnar

5:50 – 6:00Closing remarks