• Home
  • |
  • Committee
  • |
  • Call For Papers
  • |
  • Accepted Papers
  • |
  • Program
  • |
  • Rump Session
  • |
  • Registration
  • |
  • Venue
  • |
  • Accommodation

2nd Workshop on International View of the State-of-the-Art of Cryptography and Security and its Use in Practice, Dec.6-7

December 6-7, Beijing, China, Continental Grand Hotel & Convention Center (conference room No.303 on 3rd floor(北京国际会议中心三层303会议室)

Cryptography and secure computation permeate the fabric of today's technologies and everyday life. All over the world, these areas of research and practice have experienced explosive development. Worldwide adoption of the results of this research means that different approaches to key technologies and societal aspects of their use (in economics, policy, user acceptance, regulation, and other areas) have been developed in different parts of the world. Specialization in different aspects of research positively affects the depth of results and emergence of new ideas, but lack of harmonization in some approaches can also negatively impact technology adoption, global interoperability, and robustness and interoperability of future technologies.

Workshop Description

Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice) that set the stage for these discussions among a group of researchers from Europe, Asia, and North America, the workshop in Beijing, following AsiaCrypt2012 envisioned in this proposal will bring together internationally recognized scientists and thought leaders from Europe, North America, and Asia to discuss direction and development in theoretical and applied cryptography and surrounding societal issues in order to form an international community of thought and practice.

The participants will discuss the broad research directions in encryption and secure computation and their applications in cloud computing, smart grid, mobile and embedded computing, hardware, software, and network security. Attention will also be paid to the non-technical issues surrounding deployment and adoption of new security technologies using encryption. Approaches and projects in different countries will be discussed, in order to increase awareness of the R&D activities internationally and continue to for a strong community of research and practice and in order to generate new ideas in this field. The Workshop will consist of keynote talks, invited talks, panels, and discussion sessions. The workshop is invitational.

During the workshop, we hope to especially highlight mobile and embedded application space, lightweight encryption, new generations of applications, such as smart metering and smart grid and mobile cloud technologies. The topics of discussions include (but are not limited to) the following subjects:

  • Secret versus public ciphers
  • Cipher and algorithm development process
  • Algorithms maturity, review, and standardization
  • Lightweight cryptography
  • New requirements for cryptography for novel applications
  • New mobile and embedded applications
  • New approaches in cryptography
  • Cipher implementation and interoperability
  • Secure function and multiparty computation
  • Trust establishment and provable trust
  • Commercial implementation
  • Economics and economic incentives
  • Standardization
  • Societal and regulatory issues
  Time Min. Content
Day One: Dec.6 (14:00~18:00) 14:00 ~ 14:10 10 Opening Statements (Lai Xuejia, Claire Vishik)
Objective: continue dialog of items of interest to the community
14:10 ~ 14:50 40 Invited talk - Bart Preneel:
Crypto diversity and open competitions in cryptography slides
14:50 ~ 15:30 40 Invited Talk - Yvo Desmedt:
Deployment issues related to cryptography in cloud computing and social networks slides
15:30 ~ 15:50 20 Coffee Break
15:50 ~ 16:30 40 Invited Talk - Dusko Pavlovic:
Gaming security by obscurity
Discussion 1: 16:30 ~ 18:00 90 Crypto Aspects in mobile and embedded cryptography (Moderators: Claire Vishik, Kazue Sako)
Talks:
Lai Xuejia: Defining cryptography slides
Ingrid Verbauwhede: Lightweight and embedded security
18:00 ~ 18:05 5 Day one closing remarks, plans for Dec 7th
19:00   Dinner at the Conference hotel
 
Day Two: Dec.7 9:00 ~ 9:05 5 Opening Day 2 (organizers)
9:05 ~ 9:45 40 Invited Talk: Qingni Shen
Security and Privacy Issues in Cloud Storage slides
9:45 ~ 10:15 30 Invited Talk: Yuliang Zheng (Mobile Cloud) slides
10:15 ~ 10:35 20 Coffee Break
Discussion 2: 10:35 ~ 12:30 115 New Directions in Cryptography (Moderator: Kenny Paterson)
Speakers:
Phong Nguyen
Kazue Sakoslides
Bart Preneel
Christian Rechberger
Kenny Paterson slides
12:30 ~ 1:45 p.m. 75 Lunch
Discussion 3: 1:45 ~ 3:15pm 90 Standardization, related issues. Moderator: Claire Vishik
Talks:
Yuliang Zheng (JTC1 activities) slides
Sean Shen (IETF: choice, update, obsolescence of crypt algorithms in Internet protocols)
3:15 ~ 4:00pm 45 Discussion: Future workshops and their focus (all)
4:00 ~ 4:05pm 15 Final remarks, adjourn
© 2011 by Shanghai Jiao Tong University | Tsinghua University | All rights reserved.