GTACS

A Greater Tel-Aviv Area Seminar

Daniel Wichs@ BIU on :Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions

Abstract: Succinct non-interactive arguments (or SNARGs) are
computationally sound proofs whose communication complexity is
polylogarithmic the instance and witness sizes. Unfortunately, we
currently do not know of any construction of SNARGs with a formal
proof of security under any simple assumption. My talk will give a
broad black-box separation result, showing that the security of SNARGs
cannot be proven via a black-box reduction from any falsifiable
cryptographic assumption. This includes essentially all common

29/02/2012 - 11:30

Amos Beimel @ BIU: Secret-Sharing: A Survey

A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are an important tool in cryptography and they are used as a building box in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribute-based encryption, and generalized oblivious transfer.

14/03/2012 - 11:30

Amir Herzeberg@TAU on: Off-path Hacking TCP/IP (and DNS, HTTP, too)

We present overview of several of our recent results on practical attacks on the core Internet protocols: TCP, IP, DNS and HTTP. Our attacks are all by off-path spoofing adversary, i.e., do not require eavesdropping abilities. The attacks can be abused in many ways, including threats to integrity and confidentiality (e.g., via injection of malicious scripts/applets into web pages, for XSS, CSRF and phishing attacks, or via DNS poisoning), as well as for devastating Denial of Service (DoS) attacks.

02/05/2012 - 11:30

Tal Moran@BIU on: Time-lock puzzles and Proofs-of-Work in the Random Oracle Model

Abstract:
A time-lock puzzle is a mechanism for sending messages ``to the future''. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until enough time has elapsed for the puzzle to be solved. For time-lock puzzles to be useful, generating a puzzle should take less time than solving it. Since adversaries may have access to many more computers than honest solvers, massively parallel solvers should not be able to produce a solution much faster than serial ones.

23/05/2012 - 11:30

Rita Vald @ TAU on: Universally Composable Security With Local Adversaries

ABSTRACT: The traditional approach to formalizing ideal-model based definitions of security for multi-party protocols model adversaries (both real and ideal) as centralized entities that control all parties that deviate from the protocol. While this centralized-adversary modeling suffices for capturing basic security properties such as secrecy of local inputs and correctness of outputs against coordinated attacks, it turns out to be inadequate for capturing security properties that involve restricting the sharing of information between separate adversarial entities.

30/05/2012 - 11:00

Alessandro Chiesa @ TAU on: How MIPs and Proof-Carrying Data Make Delegation More Affordable

Speaker: Alessandro Chiesa (MIT CSAIL)
Time: Thursday August 2nd 2012, 14:00
Place: Schreiber 309, Tel Aviv University

Title: How MIPs and Proof-Carrying Data Make Delegation More Affordable

Abstract:
In this talk, we will discuss two important efficiency aspects of succinct arguments:
(1) the time and space complexity of the prover
(2) the offline complexity of the verifier (a.k.a. preprocessing complexity)

02/08/2012 - 14:00