Organizing Committee
  • Nigel Boston
    University of Wisconsin-Madison
  • Somesh Jha
    University of Wisconsin
Abstract

The goal of this workshop is to bring computer science researchers in security/privacy/cryptography together with researchers in mathematics. We will use information security as a term encompassing security, privacy, and cryptography. Information¬-security researchers employ various branches of mathematics such as number theory, probability theory, optimization, and real analysis. Despite this there is currently very little collaboration between information¬-security researchers and mathematicians. The main focus of this workshop will consist of researchers in information-security presenting the mathematical challenges they face in lattice¬-based cryptography, privacy, and security economics, with an eye towards interesting the mathematicians present, drawing on their expertise, and developing collaborations.

The format of the workshop will be designed to foster such collaborations. Information-¬security researchers will give talks about various topics and indicate interesting mathematical problems that arise in their research. Talks will be interspersed with “breakout sessions” that will consist of mathematicians and information¬-security researchers working together. Each session will begin with a short presentation on some mathematical problems that both groups find interesting. At the end, we will collate all the presentations into a slide deck that will be distributed to the participants. We also intend to have a plenary presentation and a panel discussion featuring prominent mathematicians and computer scientists discussing the obstacles to truly interdisciplinary cooperation.

Workshop Schedule

Wednesday, June 15, 2016
TimeEventLocationMaterials
9:30 - 9:45Opening RemarksRoom 2328 of WID (Wisconsin Institute for Discovery) 
9:45 - 10:45Fully Homomorphic Encryption (Keynote) - Craig Gentry, IBM Thomas J. Watson Research CenterRoom 2328 of WID (Wisconsin Institute for Discovery) 
10:45 - 11:30Game-theoretic approach to information security - Tamer Basar, University of Illinois at Urbana-ChampaignRoom 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:15Lattice-based Cryptography - Chris Peikert, University of Michigan - Ann ArborRoom 2328 of WID (Wisconsin Institute for Discovery) 
12:15 - 1:45LunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:45 - 2:15TBDRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:15 - 2:45Post-quantum key exchange from LWE - Jintai Ding, University of CincinnatiRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:45 - 3:15BreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:15 - 3:45Using semidirect product of (semi) groups in public key cryptography - Delaram Kahrobaei, Graduate College, CUNYRoom 2328 of WID (Wisconsin Institute for Discovery)
3:45 - 4:45Discussion/Panel Room 2328 of WID (Wisconsin Institute for Discovery) 
Thursday, June 16, 2016
TimeEventLocationMaterials
9:30 - 10:15The many faces of garbled circuits - Vinod Vaikuntanathan, MITRoom 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 11:00Information security without computational assumptions - Vladimir Shpilrain, The City College of New YorkRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:00 - 11:30Ring-Learning-With-Errors from a number theorist's perspective - Katherine Stange, University of Colorado, BoulderRoom 2328 of WID (Wisconsin Institute for Discovery)
11:30 - 12:00Groebner bases and Polynomial systems from cryptography - Shuhong Gao, Clemson UniversityRoom 2328 of WID (Wisconsin Institute for Discovery)
12:00 - 1:30LunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:30 - 2:15New Directions in Privacy-Preserving Machine Learning - Kamalika Chaudhuri, University of California - San DiegoRoom 2328 of WID (Wisconsin Institute for Discovery)
2:15 - 2:45TBA - Paul Gunnells, University of Massachusetts - AmherstRoom 2328 of WID (Wisconsin Institute for Discovery) 
2:45 - 3:15TBA - Shuhong Gao, Clemson UniversityRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:15 - 3:45BreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
3:45 - 4:30Discussion/PanelRoom 2328 of WID (Wisconsin Institute for Discovery) 
Friday, June 17, 2016
TimeEventLocationMaterials
9:30 - 10:15Obfuscation without the vulnerabilities of multi-linear maps - Pratyay Mukherjee, University of California - BerkeleyRoom 2328 of WID (Wisconsin Institute for Discovery)
10:15 - 10:45Isogeny-based public-key cryptography - David Jao, University of WaterlooRoom 2328 of WID (Wisconsin Institute for Discovery)
10:45 - 11:15Quantum algorithms for number theory and their relevance to cryptography - Jean-Francois Biasse, University of Illinois at Urbana-ChampaignRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:15 - 11:30BreakRoom 2328 of WID (Wisconsin Institute for Discovery) 
11:30 - 12:00TBARoom 2328 of WID (Wisconsin Institute for Discovery) 
12:00 - 1:30LunchRoom 2328 of WID (Wisconsin Institute for Discovery) 
1:30 - 2:30Discussion/PanelRoom 2328 of WID (Wisconsin Institute for Discovery)