Report on Crypto 2012
Crypto 2012 was held August 19-23 on the beautiful campus of the University
of California, Santa Barbara. The Program Co-chairs were Rei Safavi-Naini
and Ran Canetti, and the General Chair was Yiqun Lisa Yin.
A total of 225 papers were submitted, and 48 were accepted for publication,
a record number for IACR flagship conferences. For the Best Paper Award,
the PC overwhelmingly selected “Efficient Dissection of Composite Problems,
with Applications to Cryptanalysis, Knapsacks and Combinatorial Search
Problems” by Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir.
There were two invited talks and one tutorial session at the conference.
Professor Jonathan Zittrain from Harvard gave a talk entitled “The End of
Crypto”. Dr. Ernie Brickell from Intel spoke about “Recent Advances and
Existing Research Questions in Platform Security”. Professor Adam Smith
from Penn State delivered a tutorial on “Pinning Down ‘Privacy’ in
Statistical Databases”. Dan Bernstein and Tanja Lange co-chaired yet
another entertaining Rump Session. Almost all of the talks were video
recorded. These videos, along with author's slides and full versions of the
papers, are available on the conference program webpage.
Generous donations were given by five industry sponsors Google, Microsoft
Research, Qualcomm, RIM, and Voltage Security, as well as the Marconi Fund.
In addition, the conference applied and received a special funding of
$10,000 from the National Science Foundation (NSF). With all the financial
support, stipends were offered to over 40 students, both domestic and
The Chairs of Crypto 2012 were very grateful for the wonderful work of
Sally Vito and the UCSB conference services staff.
Report on Inscrypt 2012
Inscrypt 2012, Nov. 28-30, 2012 in Beijing, China
The 8th China International Conference on Information Security and Cryptology
was held at Beijing International Convention Center, Nov. 28 - Nov. 30, 2012, Beijing, China. See http://www.inscrypt.cn/2012/ for the web-site.
The program co-chairs were Miroslaw Kutylowski and Moti Yung, and the general chair was Dongdai Lin. Inscrypt 2012 received 73 submissions from 24 countries, and 23 were selected for presentation at the conference. These accepted papers, after revision, appeared in the conference post-proceeding which was published as Lecture Notes in Computer Science vol. 7763.
Two invited talks were given by Jung Hee Cheon (Seoul National University) and Goichiro Hanaoka (AIST) on the topics "Open Questions for the Discrete Logarithm" and "Toward Shorter Ciphertext in ElGamal-type CCA-secure Public Key Encryption", respectively. Additionally, the conference was featured with two tutorials given by Junfeng Fan (KU Leuven) and Miroslaw Kutylowski (Wroclaw University of Technology) on the topics "Cryptographic hardware: design for low power, low area and security against physical attacks" and "Electronic Personal Identity Documents", respectively.
The conference banquet was a traditional Chinese one, with Chinese rice wine (Baijiu) served. The registration fee was 450 USD for regular and 350 USD for full-time student. About 90 attendees enjoyed the 3-day conference sessions and Beijing in winter.
Report on TCC 2012
The 9th IACR Theory of Cryptography Conference (TCC'12) was held at the Hotel "Villa Diodoro" in Taormina, Italy, on March 19-21, 2012. The organizing committee included Rosario Gennaro and Nelly Fazio (General Co-chairs) and Dario Catalano (Local Arrangements Chair).
The technical program featured 36 papers selected from 131 submissions, along with two invited lectures: "Locally Decodable Codes" by Sergey Yekhanin of Microsoft Research and "Non-Interactive Zero-Knowledge" by Jens Groth of the University College of London. The program was assembled by a 20-member Program Committee led by Ronald Cramer as Program Chair.
The conference attracted 108 delegates, including 29 students of which 16 were given financial aid to attend the conference in the form of free registration and free housing.
The generous financial support of the conference sponsors (Bell Labs, IBM Research, Microsoft, AT&T and Oxford University Press) was also an important factor for the success of the event, and is gratefully acknowledged.
This was the first IACR workshop or conference where printed proceedings were optional, and had to be ordered at the time of registration for an extra fee of $50. Conference delegates received an electronic copy of the proceedings stored on a USB stick which was donated by DEShaw.
Research fellow in computer security, University of Bergen, Norway, EEA
The Department of Informatics has a vacancy for 2 research fellows (PhD positions) in computer security for a period of 4 years. The recruited students will work in a new research group, named Simula@UiB, that is headed by Professor Kjell Jørgen Hole. The group is a joint venture between Simula Research Laboratory (http://simula.no) and University of Bergen. It currently consists of two professors, two research scientists, one PhD student and several master students.
Candidates must have good analytical skills and be able to generate their own research ideas. They must have good communication skills and be fluent in English. Experience in computer security is an advantage. Candidates with experience from one or more of the areas Cyber Security, Software Security, Network Science, Game Theory, or Information Theory are of special interest.
In total, the fellowship period is 4 years. For positions with a 4-year duration 25 pct of the period will be designated to teaching and/or administrative duties. The fellowship period may be reduced if the successful applicant has held previous employment as research fellow or similar.
Parallel and Dynamic Searchable Symmetric Encryption, by Seny Kamara and Charalampos Papamanthou
Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly due to the fact that, currently, the only method for achieving sub-linear time search is the inverted index approach (Curtmola, Garay, Kamara and Ostrovsky, CCS \'06) which requires the search algorithm to access a sequence of memory locations, each of which is unpredictable and stored at the previous location in the
Motivated by advances in multi-core architectures, we present a new method for constructing sub-linear SSE schemes. Our approach is highly parallelizable and dynamic. With roughly a logarithmic number of cores in place, searches for a keyword w in our scheme execute in o(r) parallel time, where r is the number of documents containing keyword w (with more cores, this bound can go down to O(log n), i.e., independent of the result size r). Such time complexity outperforms the optimal \\theta(r) sequential search time--a similar bound holds for the updates.
Our scheme also achieves the following important properties: (a) it enjoys a strong notion of security, namely security against adaptive chosen-keyword attacks; (b) compared to existing sub-linear dynamic SSE schemes (e.g., Kamara, Papamanthou, Roeder, CCS \'12), updates in our scheme do not leak any information, apart from information that can be inferred from previous search tokens; (c) it can be implemented efficiently in external memory (with logarithmic I/O overhead). Our technique is simple and uses a red-black tree data structure; its security is proven in the random oracle model.