Advances in Secure Computation
January 23-26, 2022
Secure computation allows a set of parties to compute some joint function of their private inputs, while guaranteeing privacy (i.e., the parties learn the output and nothing more) and correctness (meaning the output is correctly distributed). Due to its generality, secure computation is a central tool in cryptography. In recent years, there is a surging interest in deploying secure computation to solve problems arising in practice. This requires designing light-weight and concretely-efficient protocols for problems of interest, such as accessing and searching over large outsourced databases, or threshold cryptographic primitives (such as signatures) that can be used to guarantee validity of transactions on the blockchain.
In the 12th BIU Winter School on Cryptography, we will study recent advances in secure computation. The program will cover the following topics: advances in private-information retrieval and in oblivious RAM, function secret sharing and homomorphic secret sharing, vector oblivious linear evaluation, threshold signatures, and private set intersection.
The program aims to give a taste of key topics in the area, focusing on the state of the art. We expect the audience to already have knowledge on foundations of cryptography (e.g., what secure computation is, the basics of private information retrieval and oblivious RAM, etc.). The target audience for the school is graduate students and postdocs in cryptography (we will assume that participants have taken at least one university-level course in cryptography). However, all faculty, undergrads and professionals with the necessary background are welcome. The winter school is open to participants from all over the world; all talks will be in English.
- Gilad Asharov, Bar-Ilan University
- Elette Boyle, Reichman University (IDC)
- Henry Corrigan-Gibbs, MIT
- Rosario Gennaro, City College of New York and Protocol Labs
- Yuval Ishai, Technion
- Dima Kogan, Arnac
- Benny Pinkas, Bar-Ilan University
- Peter Scholl, Aarhus University
Where: Due to the COVID pandemic, the school will be held online via Zoom.
When: Sunday, January 23, 2022 to Wednesday, January 26, 2022
Registration: Participation is limited to registered users and is free. Only those who have applied to the school and have been confirmed by the organizers can be considered registered and receive updates and lecture links.
Please apply by January 20, 2022 at: https://winter-school2022.forms-wizard.biz/
Travel to Israel: COVID related travel restrictions can be found at https://corona.health.gov.il/en/country-status/. Since the identification of the Omicron variant in late November, non-Israeli citizens cannot enter Israel. This travel restriction will be lifted in the next few weeks. You can monitor the situation by checking the web page or by asking us.
Contact: For any questions or queries, please send an e-mail to: email@example.com
The detailed schedule for the winter school can be downloaded here.
Sunday, January 23 – FSS + Prio + ORAM
- Opening remarks
- Elette Boyle: Function Secret Sharing – part 1 (Slides parts 1-3) (Video)
- Elette Boyle: Function Secret Sharing – part 2 (Video)
- Elette Boyle: Function Secret Sharing – part 3 (Video)
- Henry Corrigan-Gibbs: Private Analytics Techniques and Applications – part 1 (Video)
- Henry Corrigan-Gibbs: Private Analytics Techniques and Applications – part 2 (Video)
- Gilad Asharov: Oblivious RAM – part 1 (Slides) (Video)
Monday, January 24 – ORAM + VOLE
- Gilad Asharov: Oblivious RAM – part 2 (Slides) (Video)
- Gilad Asharov: Oblivious RAM – part 3 (Slides) (Video)
- Peter Scholl: Vector Oblivious Linear Evaluation – part 1 (Slides) (Video)
- Peter Scholl: Vector Oblivious Linear Evaluation – part 2 (Slides) (Video)
Tuesday, January 25 – PCG + VOLE + Signatures
- Yuval Ishai: Pseudorandom Correlation Generators – part 1 (Slides parts 1-2) (Video)
- Yuval Ishai: Pseudorandom Correlation Generators – part 2 (Video)
- Dima Kogan: Introduction to Private Information Retrieval (Slides Parts 1-2) (Video)
- Dima Kogan: Offline/Online Private Information Retrieval (Video)
- Rosario Gennaro: Threshold Signatures – Discrete Log Based Schemes – part 1 (Slides parts 1-3) (Video)
- Rosario Gennaro: Threshold Signatures – Discrete Log Based Schemes – part 2 (Video)
Wednesday, January 26 – PIR + PSI + Signatures
- Benny Pinkas: Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System (Slides) (Video)
- Benny Pinkas: Private Set Intersection (PSI) – Malicious Security, and Probability Amplification (Slides) (Video)
- Peter Scholl: Silent OT and VOLE from LPN (Slides) (Video)
- Peter Scholl: Pseudorandom Correlation Functions from Paillier (Slides) (Video)
- Rosario Gennaro: Threshold Signatures – Discrete Log Based Schemes – part 3 (Video)
- Rosario Gennaro: Threshold Signatures – RSA Signatures (Slides) (Video)
- Rosario Gennaro: Threshold Signatures – Quantum Resistant Schemes (Slides) (Video)
This winter school is graciously supported by
The BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office and the Alter Family.