Organizing Committee
  • Nigel Boston
    University of Wisconsin-Madison
  • Somesh Jha
    University of Wisconsin
Abstract

The goal of this workshop is to bring computer science researchers in security/privacy/cryptography together with researchers in mathematics. We will use information security as a term encompassing security, privacy, and cryptography. Information¬-security researchers employ various branches of mathematics such as number theory, probability theory, optimization, and real analysis. Despite this there is currently very little collaboration between information¬-security researchers and mathematicians. The main focus of this workshop will consist of researchers in information-security presenting the mathematical challenges they face in lattice¬-based cryptography, privacy, and security economics, with an eye towards interesting the mathematicians present, drawing on their expertise, and developing collaborations.

The format of the workshop will be designed to foster such collaborations. Information-¬security researchers will give talks about various topics and indicate interesting mathematical problems that arise in their research. Talks will be interspersed with “breakout sessions” that will consist of mathematicians and information¬-security researchers working together. Each session will begin with a short presentation on some mathematical problems that both groups find interesting. At the end, we will collate all the presentations into a slide deck that will be distributed to the participants. We also intend to have a plenary presentation and a panel discussion featuring prominent mathematicians and computer scientists discussing the obstacles to truly interdisciplinary cooperation.

Image for "The SaTC Workshop on Privacy and Security at the University of Wisconsin"

Workshop Schedule

Wednesday, June 15, 2016
TimeEventLocationMaterials
9:30 - 9:45am EDTOpening RemarksRoom 2328 of WID (Wisconsin Institute for Discovery) 
9:45 - 10:45am EDTFully Homomorphic Encryption (Keynote) - Craig Gentry, IBM Thomas J. Watson Research CenterRoom 2328 of WID (Wisconsin Institute for Discovery) 
10:45 - 11:30am EDTGame-theoretic approach to information security - Tamer Basar, University of Illinois at Urbana-ChampaignRoom 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:15pm EDTLattice-based Cryptography - Chris Peikert, University of Michigan - Ann ArborRoom 2328 of WID (Wisconsin Institute for Discovery) 
12:15 - 1:45pm EDTLunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:45 - 2:15pm EDTTBDRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:15 - 2:45pm EDTPost-quantum key exchange from LWE - Jintai Ding, University of CincinnatiRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:45 - 3:15pm EDTBreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:15 - 3:45pm EDTUsing semidirect product of (semi) groups in public key cryptography - Delaram Kahrobaei, Graduate College, CUNYRoom 2328 of WID (Wisconsin Institute for Discovery)
3:45 - 4:45pm EDTDiscussion/Panel Room 2328 of WID (Wisconsin Institute for Discovery) 
Thursday, June 16, 2016
TimeEventLocationMaterials
9:30 - 10:15am EDTThe many faces of garbled circuits - Vinod Vaikuntanathan, MITRoom 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 11:00am EDTInformation security without computational assumptions - Vladimir Shpilrain, The City College of New YorkRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:00 - 11:30am EDTRing-Learning-With-Errors from a number theorist's perspective - Katherine Stange, University of Colorado, BoulderRoom 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:00pm EDTGroebner bases and Polynomial systems from cryptography - Shuhong Gao, Clemson UniversityRoom 2328 of WID (Wisconsin Institute for Discovery)
12:00 - 1:30pm EDTLunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:30 - 2:15pm EDTNew Directions in Privacy-Preserving Machine Learning - Kamalika Chaudhuri, University of California - San DiegoRoom 2328 of WID (Wisconsin Institute for Discovery)
2:15 - 2:45pm EDTTBA - Paul Gunnells, University of Massachusetts - AmherstRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:45 - 3:15pm EDTTBA - Shuhong Gao, Clemson UniversityRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:15 - 3:45pm EDTBreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:45 - 4:30pm EDTDiscussion/PanelRoom 2328 of WID (Wisconsin Institute for Discovery) 
Friday, June 17, 2016
TimeEventLocationMaterials
9:30 - 10:15am EDTObfuscation without the vulnerabilities of multi-linear maps - Pratyay Mukherjee, University of California - BerkeleyRoom 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 10:45am EDTIsogeny-based public-key cryptography - David Jao, University of WaterlooRoom 2328 of WID (Wisconsin Institute for Discovery)
10:45 - 11:15am EDTQuantum algorithms for number theory and their relevance to cryptography - Jean-Francois Biasse, University of Illinois at Urbana-ChampaignRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:15 - 11:30am EDTBreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:30 - 12:00pm EDTTBARoom 2328 of WID (Wisconsin Institute for Discovery) 
12:00 - 1:30pm EDTLunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:30 - 2:30pm EDTDiscussion/PanelRoom 2328 of WID (Wisconsin Institute for Discovery)