
Shahed Sharif
Fri Dec 7, 2018
10:00 am
Despite widespread interest in cryptographic multilinear maps since
BonehSilverberg's 2003 paper, very few candidate maps have been
discovered. The first serious candidate was a scheme of
GargGentryHalevi (GGH), which is based on ideal lattices in cyclotomic
number rings. While the scheme was later shown to be broken, the only
other...

Travis Scholl
Tue Nov 20, 2018
3:00 pm
Multilinear maps is a new hot topic in cryptography because they offer a significant number of applications. The main open problem in this area is constructing a secure and efficiently computable multilinear map. In this talk, we introduce cryptographic multilinear maps, go through several applications, and then discuss some possible obstructions...

Travis Scholl
Tue Oct 9, 2018
3:00 pm
Elliptic curve cryptography (ECC) is a widely used public key cryptosystem. The security of ECC relies on the difficulty of the elliptic curve discrete log problem (ECDLP). Isogenies are morphisms of curves that can be used to transfer instances of ECDLP between elliptic curves. Suppose that we suspect that some proportion of curves are...

Josh Benaloh, Alex Halderman, Hovav Shacham
Tue Mar 13, 2018
3:30 pm
Event on Elections and Voting, with Panels on the Technology, Law, & Policy of Election Hacking, 1:30  7:30 pm
The Technology of Voting: Risks & Opportunities
Josh Benaloh (Microsoft Research)
Alex Halderman (University of Michigan)
Hovav Shacham (UC San Diego)
Panel moderated by Alice Silverberg (UC Irvine), 3:30 pm  4:40 pm
Keynote...

Shahed Sharif
Thu Jan 11, 2018
11:00 am
A continuation of the previous talk on the GargGentryHalevi multilinear map. We finish our description of the scheme, and describe some attacks on it.

TBA
Tue May 30, 2017
2:00 pm

Alice Silverberg and Shahed Sharif
Tue May 30, 2017
2:00 pm
A.S. will give some remarks (joint work with Hendrik Lenstra) on homomorphic encryption schemes of SmartVercauteren and GentryHalevi.
S.S. will discuss the paper "A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes" by Martin Albrecht, Shi Bai, Léo Ducas,...