Skip to main content
Search
Utility navigation
Calendar
Contact
Login
MAKE A GIFT
Main navigation
Home
Programs & Events
Research Programs
Workshops & Symposia
Public Lectures
Research Pods
Internal Program Activities
Algorithms, Society, and the Law
People
Scientific Leadership
Staff
Current Long-Term Visitors
Research Fellows
Postdoctoral Researchers
Scientific Advisory Board
Governance Board
Industry Advisory Council
Affiliated Faculty
Science Communicators in Residence
Law and Society Fellows
Participate
Apply to Participate
Plan Your Visit
Accessibility
Location & Directions
Postdoctoral Research Fellowships
Law and Society Fellowships
Science Communicator in Residence Program
Circles
Breakthroughs Workshops and Goldwasser Exploratory Workshops
Support
Annual Fund
All Funders
Institutional Partnerships
News & Videos
News
Videos
About
Image
Securing Computation
Program
Cryptography
Location
Calvin Lab Auditorium
Date
Monday, June 8
–
Friday, June 12, 2015
Back to calendar
Breadcrumb
Home
Workshop & Symposia
Schedule
Secondary tabs
The Workshop
Schedule
Videos
Click on the titles of individual talks for abstract, slides and archived video.
All events take place in the Calvin Lab Auditorium.
Monday, June 8, 2015
9
–
9:20 a.m.
Coffee and Check-In
9:20
–
9:30 a.m.
Opening Remarks
9:30
–
10:30 a.m.
Obfuscation: Past, Present, and Possible Futures
Amit Sahai (UCLA)
Video
10:30
–
11 a.m.
Break
11 a.m.
–
12 p.m.
New Developments in Multilinear Maps: Zeroizing Attacks, Defenses, and Post-Zeroizing Obfuscation
Eric Miles, UCLA
,
Mehdi Tibouchi, NTT Secure Platform Laboratories
Video
12
–
12:30 p.m.
Discussion
12:30
–
2:15 p.m.
Lunch
2:15
–
2:40 p.m.
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Brent Waters, UT Austin
Video
2:45
–
3:15 p.m.
Obfuscation with Constant Multiplicative Size Overhead
Prabhanjan Ananth (UC Santa Barbara)
Video
3:15
–
3:45 p.m.
Break
3:45
–
4:10 p.m.
Cryptocurrencies and Smart Contracts
Elaine Shi (Carnegie Mellon University)
Video
4:15
–
4:40 p.m.
Sequential Composition of Rational Proofs
Rosario Gennaro, City University of New York
Video
4:45
–
5:10 p.m.
Rethinking Secure Computation - A Greedy Approach
Muthuramakrishnan Venkitasubramaniam, University of Rochester
Video
Tuesday, June 9, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
10:30 a.m.
A Brief History of Practical Garbled Circuit Optimizations
Mike Rosulek, Oregon State University
Video
10:30
–
11 a.m.
Break
11
–
11:25 a.m.
Fast Garbling of Circuits Under Standard Assumptions
Yehuda Lindell, Bar-Ilan University
Video
11:30
–
11:55 a.m.
A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Thomas Schneider, Technische Universität Darmstadt
Video
12
–
12:15 p.m.
Discussion
12:15
–
2 p.m.
Lunch
2
–
2:25 p.m.
Lower Bounds for Information-Theoretic MPC
I
,
van Damgård, Aarhus University
Video
2:30
–
2:55 p.m.
Capacity Inversion and MPC over Elastic Noisy Channels
Hemanta Maji, UCLA
Video
3
–
3:30 p.m.
Break
3:30
–
3:55 p.m.
Upending Stock Market Structure Using Secure Computation
Charanjit Jutla (IBM Research)
Video
4
–
4:25 p.m.
Practical Private DB Querying
Vlad Kolesnikov, Bell Labs
,
Tal Malkin (Columbia University)
Video
4:30
–
5:30 p.m.
Reception
Wednesday, June 10, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
9:55 a.m.
A Wishlist for Verifiable Computation: An Applied CS Perspective
Mike Walfish (New York University)
Video
10
–
10:25 a.m.
SNARKs and their Practical Applications
Eran Tromer (Tel Aviv University)
Video
10:30
–
11 a.m.
Break
11
–
11:25 a.m.
How to use Bitcoin to Enhance Secure Computation
Ranjit Kumaresan, Massachusetts Institute of Technology
Video
11:30
–
11:55 a.m.
Provably Secure Blockchain Protocols and Applications to Secure Computation
Aggelos Kiayias (National and Kapodistrian University of Athens)
Video
12
–
1:45 p.m.
Lunch
1:45
–
2 p.m.
The Simplest Oblivious Transfer Protocol
Claudio Orlandi, Aarhus University
Video
2
–
2:30 p.m.
The Whole is Greater than the Sum of its Parts: Linear Garbling and Applications
Valerio Pastro (Columbia University)
Video
2:30
–
3:30 p.m.
Discussion on Practical Advanced Crypto: Bottlenecks and the Future (moderated by Yehuda Lindell)
3:30
–
4 p.m.
Break
4
–
4:25 p.m.
Contention in Cryptography: Obfuscation, Leakage, UCE and the AI-DHI Assumptions
Stefano Tessaro (University of Washington)
Video
4:30
–
4:55 p.m.
How to Construct Indistinguishability Obfuscation from Compact Functional Encryption
Abhishek Jain, Johns Hopkins University
Video
Thursday, June 11, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
9:55 a.m.
Public-Coin Differing-Inputs Obfuscation and its Applications
Omkant Pandey, UCLA
Video
10
–
10:25 a.m.
Obfuscation of Probabilistic Circuits and Applications
Huijia Lin (University of Washington)
Video
10:30
–
11 a.m.
Break
11 a.m.
–
12 p.m.
Discussion on Obfuscation: Bottlenecks and the Future (moderated by Shai Halevi)
12
–
2 p.m.
Lunch
2
–
2:30 p.m.
Breaking News Sessions / Young Researcher Presentations
Multiple Speakers (Auditorium, Room 116 and the 2nd Floor Interaction Area)
2:30
–
3 p.m.
Breaking News Sessions / Young Researcher Presentations
Multiple Speakers (Auditorium, Room 116 and the 2nd Floor Interaction Area)
3
–
3:30 p.m.
Break
3:30
–
4 p.m.
Breaking News Sessions / Young Researcher Presentations
Multiple Speakers (Auditorium, Room 116 and the 2nd Floor Interaction Area)
4
–
4:30 p.m.
Breaking News Sessions / Young Researcher Presentations
Multiple Speakers (Auditorium, Room 116 and the 2nd Floor Interaction Area)
Friday, June 12, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
9:55 a.m.
Two Round MPC via Multi-Key FHE
Daniel Wichs (Northeastern University and NTT Research)
Video
10
–
10:25 a.m.
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Ron Rothblum (Succinct)
Video
10:30
–
11 a.m.
Break
11
–
11:25 a.m.
Oblivious RAM for MPC
Stanislaw Jarecki, UC Irvine
Video
11:30
–
11:55 a.m.
Provably Secure Virus Detection: Using the Uncertainty to End Computer Malware
Vassilis Zikas (Georgia Tech)
Video
12
–
12:15 p.m.
Discussion
12:15
–
2 p.m.
Lunch
2
–
2:25 p.m.
On the Cryptographic Hardness of Finding a Nash Equilibrium
Omer Paneth (Boston University)
Video
2:30
–
2:55 p.m.
How Fair is your Protocol? A Utility-Based Approach to Protocol Optimality
Bjoern Tackmann, UC San Diego
Video
3
–
3:30 p.m.
Break
3:30
–
3:55 p.m.
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Manoj Prabhakaran (Indian Institute of Technology, Bombay)
Video
4
–
4:25 p.m.
New Advances in Secure RAM Computation
Sanjam Garg (UC Berkeley)
Video
Share this page
Copy URL of this page
link to homepage
Close
Main navigation
Home
Programs & Events
Research Programs
Workshops & Symposia
Public Lectures
Research Pods
Internal Program Activities
Algorithms, Society, and the Law
People
Scientific Leadership
Staff
Current Long-Term Visitors
Research Fellows
Postdoctoral Researchers
Scientific Advisory Board
Governance Board
Industry Advisory Council
Affiliated Faculty
Science Communicators in Residence
Law and Society Fellows
Participate
Apply to Participate
Plan Your Visit
Accessibility
Location & Directions
Postdoctoral Research Fellowships
Law and Society Fellowships
Science Communicator in Residence Program
Circles
Breakthroughs Workshops and Goldwasser Exploratory Workshops
Support
Annual Fund
All Funders
Institutional Partnerships
News & Videos
News
Videos
About
Utility navigation
Calendar
Contact
Login
MAKE A GIFT
link to homepage
Close
Search