http://www.dagstuhl.de/11391

25. – 30. September 2011, Dagstuhl Seminar 11391

Public-Key Cryptography

Organisatoren

Marc Fischlin (TU Darmstadt, DE)
Anna Lysyanskaya (Brown University – Providence, US)
Ueli Maurer (ETH Zürich, CH)
Alexander May (Ruhr-Universität Bochum, DE)

Auskunft zu diesem Dagstuhl Seminar erteilt

Dagstuhl Service Team

Dokumente

Dagstuhl Report, Volume 1, Issue 9 Dagstuhl Report
Teilnehmerliste
Gemeinsame Dokumente
Programm des Dagstuhl Seminars [pdf]

Summary

Cryptography is the science of protecting data in presence of malicious parties. Without cryptography e-commerce, e-banking and e-government would not be possible. Indeed, the most prominent application of cryptography today is the SSL/TLS protocol to secure e-mail and web communication. But soon citizens will also use cryptography on large scales on identity cards, passports and health cards.

Cryptography is a relatively new area in computer science, with the first modern and scientific approaches dating back to the mid 70's, and the first large-scale scientific conferences in this area in the early 80's. Since then, cryptography has evolved as its own sub area in computer science, with intersections with many areas like number-theory or complexity theory.

Cryptography has a good tradition within the Dagstuhl Seminar series, with the first meeting about cryptography held in 1993, and subsequent seminars on this topic about every 5 years. In 2007 and 2012 a seminar for the sub area of ``Symmetric Cryptography'' is added, inciting us to coin the seminar here ``Public-Key Cryptography'' for sake of distinction.

The seminar brought together 33 of the leading scientists in the area of public-key cryptography. The participants came from all over the world, including countries like the US, Great Britain, Israel, France, or Italy. Among the affiliations Germany lead the number with 10 participants, followed by the US with 7, and Switzerland with 6.

The program contained 28 talks, each of 25-30 minutes, and a panel discussion about the field's future, with a free afternoon on Wednesday for social activities and half a day on Friday for traveling. Before the seminar we asked the participants to present very recent and ongoing work which, ideally, should not have been published or accepted to publication yet. Most of the participants followed our suggestion and to a large extend the presentations covered topics which have not even been submitted at the time.

The topics of the talk represented the diversity of public-key cryptography. As expected and envisioned, there was quite a number of talks about encryption schemes (such as homomorphic encryption) and their use for the cloud scenario. To further this area has been stated as one of the goals of the seminar. Presentations about this topic included improvements for such encryption schemes, e.g., the even more general functional encryption was covered comprehensively, as well as their applicability. Another well-represented area of the seminar touched the intended question of looking into more leakage-resilient alternatives like learning with errors (LWE) or lattice-based constructions. Discussions during and after the talks were lively.

The goal of the seminar was to incite new research in the area of public-key cryptography, with the explicit goal to enhance the areas of computing on encrypted data, leakage-resilience, and hash functions. We -and seemingly also the participants- enjoyed the possibility to further discuss fresh topics like constructive cryptography. Overall, the personal feedback of the participants to us was very positive, with the wish to repeat such a seminar.

The organizers would like to thank Alexander Meurer for collecting all abstracts of this seminar report. Finally, the organizers, also on behalf of the participants, would like to thank the staff and the management of Schloss Dagstuhl for providing the surrounding for a very pleasant and fruitful seminar.

Dagstuhl Seminar Series

Classification

  • Security / Cryptography

Keywords

  • Encryption
  • Signatures
  • Hash Functions
  • Mathematical Foundations
  • Quantum Cryptography

Buchausstellung

Bücher der Teilnehmer 

Buchausstellung im Erdgeschoss der Bibliothek

(nur in der Veranstaltungswoche).

Dokumentation

In der Reihe Dagstuhl Reports werden alle Dagstuhl-Seminare und Dagstuhl-Perspektiven-Workshops dokumentiert. Die Organisatoren stellen zusammen mit dem Collector des Seminars einen Bericht zusammen, der die Beiträge der Autoren zusammenfasst und um eine Zusammenfassung ergänzt.

 

Download Übersichtsflyer (PDF).

Publikationen

Es besteht weiterhin die Möglichkeit, eine umfassende Kollektion begutachteter Arbeiten in der Reihe Dagstuhl Follow-Ups zu publizieren.

Dagstuhl's Impact

Bitte informieren Sie uns, wenn eine Veröffentlichung ausgehend von
Ihrem Seminar entsteht. Derartige Veröffentlichungen werden von uns in der Rubrik Dagstuhl's Impact separat aufgelistet  und im Erdgeschoss der Bibliothek präsentiert.