Participants in MPC workshop 2016 (click for large image).
MONDAY May 30 | |
Session chair: Ivan Damgård | |
11:45-12:30 | Registration and sandwiches |
12:30-12:45 | Welcome |
12:45-13:30 | Ivan Damgård: TinyTable - 2-party secure computation made simple [abstract] |
13:30-14:15 | Martin Hirt: Compact Adversary Structures [presentation] [abstract] |
14:15-14:45 | Coffee break |
14:45-15:30 | Meilof Veeningen: Privacy-Preserving Outsourcing by Distributed Verifiable Computation [presentation] [abstract] |
15:30-16:15 | Yehuda Lindell: Efficient Constant-Round Multiparty Computation [presentation] [abstract] |
16:15- | Coffee and networking |
Tuesday May 31 | |
Session chair: Ivan Damgård | |
09:00-09:45 | Carmit Hazay: What Security Can We Achieve In Less Than 4-Rounds? [abstract] |
09:45-10:30 | Rafael Pass: Analysis and Design of Blockchains [presentation] [abstract] |
10:30-11:00 | Coffee break |
11:00-11:45 | Ariel Nof: Fast Garbling of Circuits under Standard Assumptions [abstract] |
11:45-12:30 | abhi shelat: Secure Stable and Perfect Matchings [abstract] |
12:30-13:30 | Lunch |
Session chair: John Steinberger | |
13:30-14:15 | Juan A. Garay: Probabilistic Termination and Composability of Cryptographic Protocols [presentation] [abstract] |
14:15-15:00 | Marcel Keller: MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer [presentation] [abstract] |
15:00-15:30 | Coffee break |
15:30-16:15 | Yvo Desmedt: Optimal round VSS with a non-interactive Dealer: VSS as a special case of VSR [presentation] [abstract] |
Wednesday June 1 | |
Session chair: Claudio Orlandi | |
09:00-09:45 | Yuval Ishai: Function Secret Sharing, Part I: Constructions from One-Way Functions and Applications [abstract] |
09:45-10:30 | Elette Boyle: Function Secret Sharing, Part II: Succinct Secure Computation from DDH [abstract] |
10:30-11:00 | Coffee break |
11:00-11:45 | Michael Walfish: Verifiable ASICs [presentation] [abstract] |
11:45-12:30 | David Evans: Mercury Delay Lines to Magnetic Core Memories: Progress in Oblivious Memories [presentation] [abstract] |
12:30-13:30 | Lunch |
Afternoon | Outing in Aarhus (on your own) |
Thursday June 2 | |
Session chair: Jesper Buus Nielsen | |
09:00-09:45 | Ran Canetti: Adaptive & Fully Succinct Garbled RAM [presentation] [abstract] |
09:45-10:30 | Samuel Ranellucci: On the Computational Overhead of MPC with Dishonest Majority [abstract] |
10:30-11:00 | Coffee break |
11:00-11:45 | Geoffroy Couteau: Encryption Switching Protocols [presentation] [abstract] |
11:45-12:30 | Tarik Moataz: Constant Communication Oblivious RAM [presentation] [abstract] |
12:30-13:30 | Lunch |
Session chair: John Steinberger | |
13:30-14:15 | Vladimir Kolesnikov: Overlaying Branches in Garbled Circuits [presentation] [abstract] |
14:15-15:00 | Aaron Johnson: Private Measurement of Tor [abstract] |
15:00-15:30 | Coffee break |
15:30-16:15 | Muthuramakrishnan Venkitasubramaniam: Composable Adaptive Secure Protocols without Setup under Polytime Assumptions [abstract] |
16:15-17:00 | Sander Siim: Sharemind – practical privacy-preserving analytics [presentation] [abstract] |
17:00-17:30 | Break |
Rump session and dinner: Peter Bøgh Andersen Auditorium, Nygaard Building | |
Session chair: Claudio Orlandi | |
17:30-18:30 | Rump session part I |
18:30-19:30 | Workshop dinner |
19:30-20:30 | Rump session part II |
20:30- | Dessert and networking |
Friday June 3 | |
Session chair: Ivan Damgård | |
09:00-09:45 | Christina Brzuska: On Statistically Secure Obfuscation with Approximate Correctness [abstract] |
09:45-10:30 | Michael Zohner: Efficient OT Extension and its Impact on Secure Computation [presentation] [abstract] |
10:30-11:00 | Coffee break |
11:00-11:45 | Claudio Orlandi: Cross&Clean: Amortized Garbled Circuits With Constant Overhead [abstract] |
11:45-12:15 | Wrap-up and end of workshop |
Sandwich to-go |