Charles River Crypto Day: Delegating RAM Computations
In the setting of cloud computing a user wishes to delegate its data, as well as computations over this data, to a cloud provider. Each computation may read and modify the data, and these modifications…
Charles River Crypto Day: Constant-Round Interactive-Proofs for Delegating Computations
Interactive proofs have had a dramatic impact on Complexity Theory and Cryptography. In particular, the celebrated IP=PSPACE Theorem [LFKN92,Shamir92] allows an all-powerful but untrusted prover to convince a polynomial-time verifier of the validity of extremely…
Asking the Oracle
Random Access in Multiparty Computation
How can two strangers figure out how many phone contacts they have in common without revealing anything else about each other? Can this be done even in the absence of trusted third parties? How about…
Guide to Applications of Homomorphic Encryption
Homomorphic encryption is an encryption function which permits encrypted data to be computed without decryption. It is considered as a solution for protecting privacy information in present situations such as cloud computing and machine communication.…
A Survey on Ring-LWE Cryptography
The Ring Learning-with-Errors problem, proposed by Lyubashevsky, Peikert and Regev in 2010, is a variant of the traditional Learning-with-Errors problem, and is an active research area in lattice based cryptography. It has drawn increased attention…
Social Computing Symposium 2016: Post Screen Personas and Listening Machines, How to Robot-Proof Your Kids
Join transgender theoretical neuroscientist, entrepreneur, technologist, and mother of two, Dr. Vivienne Ming to discover how you can use technology to maximize your child’s unique potential. During this talk, Dr. Ming will discuss how she…