Isolated abelian varieties in cryptography

Speaker: 

Travis Scholl

Institution: 

UCI

Time: 

Tuesday, October 9, 2018 - 3:00pm to 4:00pm

Host: 

Location: 

RH 340P

Elliptic curve cryptography (ECC) is a widely used public key cryptosystem. The security of ECC relies on the difficulty of the elliptic curve discrete log problem (ECDLP). Isogenies are morphisms of curves that can be used to transfer instances of ECDLP between elliptic curves. Suppose that we suspect that some proportion of curves are "weak" in the sense that the ECDLP can be solved quickly. To avoid an attacker moving the ECDLP to a weak curve, we would want to use curves for which it difficult to transfer the ECDLP. In this talk we will introduce the notion of an "isolated" curve. These are curves which do not admit many computable isogenies which obstructs the transferring of the ECDLP.

The Technology of Voting: Risks & Opportunities

Speaker: 

Josh Benaloh, Alex Halderman, Hovav Shacham

Institution: 

Microsoft Research, University of Michigan, UCSD

Time: 

Tuesday, March 13, 2018 - 3:30pm to 4:40pm

Host: 

Location: 

Crystal Cove Auditorium, UCI Student Center

Event on Elections and Voting, with Panels on the Technology, Law, & Policy of Election Hacking, 1:30 - 7:30 pm

The Technology of Voting: Risks & Opportunities
Josh Benaloh (Microsoft Research)
Alex Halderman (University of Michigan)
Hovav Shacham (UC San Diego)
Panel moderated by Alice Silverberg (UC Irvine), 3:30 pm - 4:40 pm

Keynote Speaker: James Carville 6:30 - 7:30 pm

More information: https://cpri.uci.edu/can-adversaries-hack-our-elections-can-we-stop-them...

FREE to UCI students, faculty, and staff.  Register at: https://scout.eee.uci.edu/s/CPRI-March13

Two topics: remarks on homomorphic encryption schemes of Smart-Vercauteren and Gentry-Halevi; a subfield lattice attack on overstretched NTRU assumption

Speaker: 

Alice Silverberg and Shahed Sharif

Institution: 

UCI & CSUSM

Time: 

Tuesday, May 30, 2017 - 2:00pm

Host: 

Location: 

RH 340P

A.S. will give some remarks (joint work with Hendrik Lenstra) on homomorphic encryption schemes of Smart-Vercauteren and Gentry-Halevi.

S.S. will discuss the paper "A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes" by Martin Albrecht, Shi Bai, Léo Ducas, which is available at: https://eprint.iacr.org/2016/127.pdf

Applications of the quantum unit group algorithm

Speaker: 

Shahed Sharif

Institution: 

CSUSM & UCI

Time: 

Monday, May 22, 2017 - 3:00pm

Host: 

Location: 

RH 440R

We will complete our discussion of the quantum algorithm to
compute the unit group of a number field. We will then discuss
applications by Biasse and Song to compute class groups and generators
of principal ideals. The paper of Biasse and Song is available on my
webpage,

http://public.csusm.edu/ssharif/crypto

Quantum Fourier transforms and uncountable groups

Speaker: 

Shahed Sharif

Institution: 

CSUSM & UCI

Time: 

Monday, May 15, 2017 - 3:00pm

Host: 

Location: 

RH 440R

We will discuss the quantum Fourier transform for an arbitrary
finite abelian group, and Hallgren's adaptation of Shor's algorithm to
uncountable abelian groups—namely, to $\mathbb{R}$. Both pieces are
essential ingredients in the quantum algorithm of
Eisentr\"ager-Hallgren-Kitaev-Song to compute the unit group of a number
field. Suggested readings are Hallgren's Pell equation paper and Jozsa's
exposition on the quantum Fourier transform; as usual, both are
available at

http://public.csusm.edu/ssharif/crypto

Hallgren's algorithm for solving Pell's equation

Speaker: 

Shahed Sharif

Institution: 

CSUSM and UCI

Time: 

Monday, May 8, 2017 - 3:00pm

Host: 

Location: 

RH 440R

We will complete our discussion of Shor's algorithm for
factoring integers. Then we will begin discussing Hallgren's quantum
polynomial-time algorithm for solving Pell's equation x^2 - dy^2 = 1.
The paper can be found at

http://public.csusm.edu/ssharif/crypto/

Hallgren's idea is to adapt Shor's algorithm to estimate the regulator
of Q(\sqrt{d}), and recover a fundamental unit from the regulator. This
algorithm also provides the main ideas in the quantum unit group
algorithm of Eisentr\"ager, Hallgren, Kitaev, and Song.

Cryptography Learning Seminar

Speaker: 

Nathan Kaplan and Shahed Sharif

Institution: 

UCI and CSUSM

Time: 

Monday, May 1, 2017 - 3:00pm

Host: 

Location: 

RH 440R

The May 1 meeting will include Nathan continuing the topic from last time, and Shahed discussing the topic below. Suggestions for things to read before the seminar are also given below.

Shahed's abstract:
We will cover the basics of quantum computation, with the goal of understanding Shor's algorithm and, eventually, the Hidden Subgroup Problem as applied to computation of unit groups. Please read the documents linked from the seminar webpage (http://public.csusm.edu/ssharif/crypto/), especially the paper titled QCPrerequisites.pdf:
http://www.qi.damtp.cam.ac.uk/sites/default/files/QCPrerequisites.pdf

Addendum to Shahed's abstract:

I will not assume any of the material in the reading. The specific
sections I will be covering, which you are encouraged to read, are

• Prerequisites paper, sections 1 and 2;
• Lecture 3;
• Lecture 5, sections 1 and 2; and
• Lecture 6, section 1.

5.3 and 6.3 may be worthwhile reading, but I will likely not cover them.

My notes will soon be posted on my webpage.

Cryptography Learning Seminar

Speaker: 

Nathan Kaplan

Institution: 

UC Irvine

Time: 

Monday, April 17, 2017 - 3:00pm to 4:00pm

Location: 

RH 440R

Computing the Unit Group of a Number Field

Starting from Pell’s equation and units in real quadratic fields, we will discuss the problem of computing the unit group of a number field. This will lead to a discussion of the Hidden Subgroup Problem, which arises in many quantum algorithms.  We will discuss recent work of Eisentrager, Hallgren, Kitaev, and Song, and of Biasse and Song, giving a quantum algorithm for this problem that runs in polynomial time.

Pages

Subscribe to RSS - Cryptography