« search calendars

« DIMACS Workshop on Outsourcing Computation Securely

DIMACS Workshop on Outsourcing Computation Securely

July 06, 2017 - July 07, 2017

Location:

DIMACS Center

Rutgers University

CoRE Building

96 Frelinghuysen Road

Piscataway, NJ 08854

Click here for map.

Organizer(s):

Marina Blanton, University at Buffalo

Guy Rothblum, Weizmann Institute of Science

Michael Walfish, New York University (NYU)

In modern computing, sensitive computations are routinely outsourced to remote providers. This paradigm comes with tremendous promise. For example, weak individuals and devices can be empowered by access to vast computation resources, fine-grained data about individuals can be tracked and analyzed to improve services and quality of life, and small organizations and individuals can benefit from pricing that economies of scale provide. Applications span the commercial, government, and military domains. However, with this promise also comes risk. An untrusted provider might knowingly (or unwittingly) corrupt a computation. Outsourcing a sensitive computation might result in breaches of privacy. Security considerations such as these prevent enterprises and individuals from outsourcing their computations and reaping the full benefits of cloud computing.

These topical concerns touch on core foundational problems in theory and cryptography. They also present fascinating challenges for security and systems research. This workshop will bring together these diverse communities to explore the state of the art research developments from theoretical cryptography and complexity theory, as well as state-of-the-art systems and security research, to facilitate a mutually-beneficial exchange between theory and practice, and to propel research on secure outsourcing and proofs of correct computation toward greater impact.

The topics of this interdisciplinary workshop will span security concerns for outsourced computations. A particular focus will be applications of probabilistic proofs, such as verifiable computing (wherein a client can verify the correctness of an untrusted computation without re-executing it).

 

Most talks will be by invitation. If you would like to contribute a talk, please send a title and short abstract to [email protected] by June 9, 2017 for consideration. Attendance at the workshop is open to all interested participants (subject to space limitations). Please register if you would like to attend this workshop.

Registration for this event is closed.