The goal of this workshop is to bring computer science researchers in security/privacy/cryptography together with researchers in mathematics. We will use information security as a term encompassing security, privacy, and cryptography. Information¬-security researchers employ various branches of mathematics such as number theory, probability theory, optimization, and real analysis. Despite this there is currently very little collaboration between information¬-security researchers and mathematicians. The main focus of this workshop will consist of researchers in information-security presenting the mathematical challenges they face in lattice¬-based cryptography, privacy, and security economics, with an eye towards interesting the mathematicians present, drawing on their expertise, and developing collaborations.
The format of the workshop will be designed to foster such collaborations. Information-¬security researchers will give talks about various topics and indicate interesting mathematical problems that arise in their research. Talks will be interspersed with “breakout sessions” that will consist of mathematicians and information¬-security researchers working together. Each session will begin with a short presentation on some mathematical problems that both groups find interesting. At the end, we will collate all the presentations into a slide deck that will be distributed to the participants. We also intend to have a plenary presentation and a panel discussion featuring prominent mathematicians and computer scientists discussing the obstacles to truly interdisciplinary cooperation.
Workshop Schedule
Wednesday, June 15, 2016
Time
Event
Location
Materials
9:30 - 9:45am EDT
Opening Remarks
Room 2328 of WID (Wisconsin Institute for Discovery)
9:45 - 10:45am EDT
Fully Homomorphic Encryption (Keynote) - Craig Gentry, IBM Thomas J. Watson Research Center
Room 2328 of WID (Wisconsin Institute for Discovery)
10:45 - 11:30am EDT
Game-theoretic approach to information security - Tamer Basar, University of Illinois at Urbana-Champaign
Room 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:15pm EDT
Lattice-based Cryptography - Chris Peikert, University of Michigan - Ann Arbor
Room 2328 of WID (Wisconsin Institute for Discovery)
12:15 - 1:45pm EDT
Lunch
Room 2328 of WID (Wisconsin Institute for Discovery)
1:45 - 2:15pm EDT
TBD
Room 2328 of WID (Wisconsin Institute for Discovery)
2:15 - 2:45pm EDT
Post-quantum key exchange from LWE - Jintai Ding, University of Cincinnati
Room 2328 of WID (Wisconsin Institute for Discovery)
2:45 - 3:15pm EDT
Break
Room 2328 of WID (Wisconsin Institute for Discovery)
3:15 - 3:45pm EDT
Using semidirect product of (semi) groups in public key cryptography - Delaram Kahrobaei, Graduate College, CUNY
Room 2328 of WID (Wisconsin Institute for Discovery)
3:45 - 4:45pm EDT
Discussion/Panel
Room 2328 of WID (Wisconsin Institute for Discovery)
Thursday, June 16, 2016
Time
Event
Location
Materials
9:30 - 10:15am EDT
The many faces of garbled circuits - Vinod Vaikuntanathan, MIT
Room 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 11:00am EDT
Information security without computational assumptions - Vladimir Shpilrain, The City College of New York
Room 2328 of WID (Wisconsin Institute for Discovery)
11:00 - 11:30am EDT
Ring-Learning-With-Errors from a number theorist's perspective - Katherine Stange, University of Colorado, Boulder
Room 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:00pm EDT
Groebner bases and Polynomial systems from cryptography - Shuhong Gao, Clemson University
Room 2328 of WID (Wisconsin Institute for Discovery)
12:00 - 1:30pm EDT
Lunch
Room 2328 of WID (Wisconsin Institute for Discovery)
1:30 - 2:15pm EDT
New Directions in Privacy-Preserving Machine Learning - Kamalika Chaudhuri, University of California - San Diego
Room 2328 of WID (Wisconsin Institute for Discovery)
2:15 - 2:45pm EDT
TBA - Paul Gunnells, University of Massachusetts - Amherst
Room 2328 of WID (Wisconsin Institute for Discovery)
2:45 - 3:15pm EDT
TBA - Shuhong Gao, Clemson University
Room 2328 of WID (Wisconsin Institute for Discovery)
3:15 - 3:45pm EDT
Break
Room 2328 of WID (Wisconsin Institute for Discovery)
3:45 - 4:30pm EDT
Discussion/Panel
Room 2328 of WID (Wisconsin Institute for Discovery)
Friday, June 17, 2016
Time
Event
Location
Materials
9:30 - 10:15am EDT
Obfuscation without the vulnerabilities of multi-linear maps - Pratyay Mukherjee, University of California - Berkeley
Room 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 10:45am EDT
Isogeny-based public-key cryptography - David Jao, University of Waterloo
Room 2328 of WID (Wisconsin Institute for Discovery)
10:45 - 11:15am EDT
Quantum algorithms for number theory and their relevance to cryptography - Jean-Francois Biasse, University of Illinois at Urbana-Champaign
Room 2328 of WID (Wisconsin Institute for Discovery)
11:15 - 11:30am EDT
Break
Room 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:00pm EDT
TBA
Room 2328 of WID (Wisconsin Institute for Discovery)
12:00 - 1:30pm EDT
Lunch
Room 2328 of WID (Wisconsin Institute for Discovery)
1:30 - 2:30pm EDT
Discussion/Panel
Room 2328 of WID (Wisconsin Institute for Discovery)