« search calendars

« DIMACS/MACS Workshop on Usable, Efficient, and Formally Verified Secure Computation

DIMACS/MACS Workshop on Usable, Efficient, and Formally Verified Secure Computation

March 14, 2019 - March 15, 2019

Location:

Barrister's Hall - first floor

Boston University Law School

765 Commonwealth Avenue

Boston, MA 02215

Organizer(s):

Ran Canetti, Boston University

abhi shelat, Northeastern University

Alley Stoughton, Boston University

Mayank Varia, Boston University

Rebecca Wright, Rutgers University and Barnard College

Groundbreaking results from the 1980s showed the surprising result that any function can be securely computed by a group of participants in a distributed fashion such that each party learns its intended output and nothing more. These celebrated results were viewed as theoretical proofs of concept. Starting with the FairPlay system, however, a series of theoretical and practical advances in the field have supported the idea that secure computation can perhaps be as practical and ubiquitous as public key cryptography. Some of these advances involve new cryptographic techniques such as building secure computation from fully homomorphic encryption, oblivious RAM, and reusable rather than use-once garbled circuits.

Another source of insight comes from the programming languages community, which has recently begun to contribute techniques from language design, formal methods, compiler optimizations, and security analyses to the problem of improving the efficiency, flexibility, and usability of secure computation protocols. For example, some of the results described above provide compiler-based optimizations for circuit-based approaches, a full ANSI-C compiler for secure two-party computation has recently been implemented, and some research has begun to take a programming-language approach to secure computation, applying both analysis and optimization.

Despite this recent progress, implementations of secure computation protocols remain difficult to use and do not have the flavor and full expressivity and optimizability of modern programming language methods and compilers. Adapting more advanced techniques from programming language research requires care to ensure that they do not negatively impact the security of the protocol. Similarly, it can be confusing for decision makers as well as end users to understand the implications of choosing one secure computation system over another. While some progress has been made on this front, more remains to be done.

This workshop will bring together cryptographers, programming language experts, and systems researchers to address advances in overcoming practical barriers to using secure computation, including questions of programming architectures, programming abstractions, modularity for programmability and plug-and-play usage, and efficiency for general secure computation.

Email the workshop organizers: [email protected].

This workshop is a collaboration with the Modular Approach to Cloud Security project (MACS), an NSF Frontier project based at Boston University, and will be hosted by that project. The Modular Approach to Cloud Security project is funded by NSF Frontier grant CNS-1414119. Additional support provided by NSF Award #1801564.

 

Thursday, March 14, 2019

8:30 AM - 9:00 AM

Breakfast

9:00 AM - 9:05 AM

Welcome

9:05 AM - 9:35 AM
9:35 AM - 10:15 AM
10:15 AM - 10:45 AM

Break

10:45 AM - 11:30 AM
11:30 AM - 12:00 PM
12:00 PM - 12:30 PM

Secure Multi-party Computation on Big Data with Conclave

Malte Schwarzkopf, Massachusetts Institute of Technology

12:30 PM - 1:30 PM

Lunch

1:30 PM - 2:00 PM
2:00 PM - 2:30 PM
2:30 PM - 3:00 PM
3:00 PM - 3:30 PM

Break

3:30 PM - 4:00 PM

Covert Security with Public Verifiability: Faster, Leaner, and Simpler

Vlad Kolesnikov, Georgia Institute of Technology

4:00 PM - 4:30 PM
4:30 PM - 5:15 PM
 

Friday, March 15, 2019

8:30 AM - 9:00 AM

Breakfast

9:00 AM - 9:45 AM
9:45 AM - 10:15 AM

LevioSA: Lightweight Secure Arithmetic Computation

Muthu Venkitasubramaniam, University of Rochester

10:15 AM - 10:45 AM

Break

10:45 AM - 11:15 AM

A Universal MPC Machine

Dragos Rotaru, KU Leuven and University of Bristol

11:15 AM - 11:45 AM
11:45 AM - 12:15 PM
12:15 PM - 1:30 PM

Lunch

1:30 PM - 2:00 PM

Cryptography for #MeToo

Benjamin Kuykendall, Princeton University

2:00 PM - 2:30 PM

Secure Computation in the Tor Network

Aaron Johnson, United States Naval Research Laboratory (NRL)

2:30 PM - 3:00 PM

Privacy Preserving Route Recommendation

Rawane Issa, Boston University

3:00 PM - 3:15 PM

Break

3:15 PM - 4:15 PM

Panel - The Future of Formally Verified Secure Computing

Amal Ahmed, Northeastern University

Ran Canetti, Boston University

abhi shelat, Northeastern University

Alley Stoughton, Boston University

 

Workshop registration is open to all interested participants (subject to space limitations). The workshop will include both invited and contributed talks.  If you would like to submit a description of talk for consideration as a contributed talk, please send a one-page abstract to the workshop organizers at [email protected] by February 8, 2019.  We will make decisions by February 15, 2019.

Full video playlist

Location and Directions: The workshop is being held at Barrister's Hall, Boston University Law School, first floor, 765 Commonwealth Avenue, Boston, MA 02215.

For directions, see http://www.bu.edu/hps-scied/old-pages/directions/directions-to-barristers-hall

List of Hotels near Barrister's Hall

Boston University’s wireless network is available for use by guests visiting the University. Go here for information on accessing the BU Guest wireless network.

Registration for this event is closed.