Monday, May 5Venue: Incuba Science Park, Small Auditorium, Aabogade 15, Aarhus N | ||
1200 | Registration opens | |
1250-1300 | Welcome | |
1300-1430 | TUTORIAL: MULTILINEAR MAPS - Sanjam Garg | |
1430-1500 | Break | |
1500-1630 | TUTORIAL: GARBLED CIRCUITS OLD AND NEWfileadmin/www.cfem.au.dk/Downloads/MPC_2014/Vinod_Vaikuntanatan.pdf - Vinod Vaikuntanatan | |
Tuesday, May 6Venue: Aarhus Institute of Advanced Studies, Høegh-Guldbergs Gade 6B, Aarhus C | ||
0800-0900 | Registration | |
0900-0945 | OUTSOURCING RAM COMPUTATION - Daniel Wichs | |
0945-1030 | EFFICIENT OBLIVIOUS TRANSFER EXTENSIONS AND APPLICATIONS - Thomas Schneider | |
1030-1100 | Break | |
1100-1145 | RECONSTRUCTING A SHARED SECRET IN THE PRESENCE OF FAULTY SHARES | |
1145-1230 | PRACTICAL PRIVATE DATABASE QUERYING - Vladimir Kolesnikov | |
1230-1400 | Lunch (on your own) | |
1400-1445 | STRUCTURED ENCRYPTION AND LEAKAGE SUPPRESSION - Seny Kamara | |
1445-1530 | SIZE-HIDING SECURE COMPUTATION: REVISITING THE IDEAL MODEL - fileadmin/www.cfem.au.dk/Downloads/MPC_2014/Melissa_Chase.pdfMelissa Chase | |
1530-1600 | Break | |
1600-1645 | ARITHMETIC CRYPTOGRAPHY - Benny Applebaum | |
Wednesday, May 7Venue: Aarhus Institute of Advanced Studies, Høegh-Guldbergs Gade 6B, Aarhus C | ||
0900-0945 | 5 YEARS OF FHE - Zvika Brakerski | |
0945-1030 | OUTSOURCED PATTERN MATCHING - Carmit Hazay | |
1030-1100 | Break | |
1100-1145 | ON THE INTRINSIC COMPLEXITY OF BROADCAST - Martin Hirt | |
1145-1230 | FASTER PRIVATE SET INTERSECTION BASED ON OT EXTENSION - Benny Pinkas | |
1230-1330 | Lunch for all (included) | |
1330-1600 | Outing to The Old Town | |
Thursday, May 8Venue: Aarhus Institute of Advanced Studies, Høegh-Guldbergs Gade 6B, Aarhus C | ||
0900-0945 | CIRCUITS RESILIENT TO ADDITIVE ATTACKS WITH APPLICATIONS TO SECURE COMPUTATION - Yuval Ishai | |
0945-1030 | DISTRIBUTED OBFUSCATION AND NON-INTERACTIVE SECURE MULTIPARTY COMPUTATION - Eyal Kushilevitz | |
1030-1100 | Break | |
1100-1145 | INDISTINGUISHABILITY OBFUSCATION FROM SEMANTICALLY-SECURE MULTILINEAR ENCODINGS - Rafael Pass | |
1145-1230 | 2-PARTY SECURE COMPUTATION & APPLICATIONS - Abhi Shelat | |
1230-1400 | Lunch (on your own) | |
1400-1445 | LARGE-SCALE SECURE COMPUTATION - Elette Boyle | |
1445-1530 | FleXOR: FLEXIBLE GARBLING FOR XOR GATES THAT BEATS FREE-XOR - Mike Rosulek | |
1530-1600 | Break | |
1600-1645 | PERFORMANCE OPTIMIZATION OF LINEAR SECRET SHARING MPC FOR REAL APPLICATIONS - fileadmin/www.cfem.au.dk/Downloads/MPC_2014/Dave_Archer.pdfDavid Archer | |
1730-2100 | Rump/Demo Session and workshop dinner at Department of Computer Science, PB Auditorium, Nygaard Building, Aabogade 34, 8200 Aarhus N Rump Session Programme | |
Friday, May 9Venue: Aarhus Institute of Advanced Studies, Høegh-Guldbergs Gade 6B, Aarhus C | ||
0900-0945 | BINARY TREE OBLIVIOUS RAM FRAMEWORK AND APPLICATIONS IN MPC - Elaine Shi | |
0945-1030 | ADVANCES IN OBFUSCATIONfileadmin/www.cfem.au.dk/Downloads/MPC_2014/Amit_Sahay.pdf - fileadmin/www.cfem.au.dk/Downloads/MPC_2014/Amit_Sahay.pdfAmit Sahai | |
1030-1100 | Break | |
1100-1145 | PRIVATE FUNCTION EVALUATION: A GENERAL FRAMEWORK AND EFFICIENT INSTANTIATIONS - Payman Mohassel | |
1145-1230 | ADAPTIVE MPC FROM NEW NOTIONS OF NON-MALLEABILITY - Muthu Ramakrishnan Venkitasubramaniam | |
1230- | Wrap-up and end of workshop | |