TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 07381

Cryptography

( 16. Sep – 21. Sep, 2007 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/07381

Organisatoren




Press Room

Press Review

  • Verschlüsselung - Computerexperten auf Schloss Dagstuhl.
    Bericht von Jürgen Rinner, 24.09.2007, Aktueller Bericht im Saarländischen Fernsehen.

Press Release

Kryptographen tüfteln an neuen Verschlüsselungstechniken
10.09.07(German only)


Summary

Cryptography is of paramount importance for information security. Cryptographic primitives are the core building blocks for constructing secure systems. The last three decades have seen tremendous progress in cryptography and the field has substantially matured. Major achievements include the proposal of adequate security definitions, of new cryptographic schemes, and of security proofs for these schemes, relative to the security definition. As a consequence, cryptography has shifted from an ad-hoc discipline with many interesting tricks and ideas to a mathematically rigorous science. Despite this progress many essential problems in cryptography still remain open and new areas and topics arise constantly. The field is more lively than ever before.

While the number of scientific conferences focusing on cryptography is increasing, most of these meetings have a broad focus, and due to a growing interest by practitioners, the number of non-expert attendees has increased. As a result, it becomes more difficult to discuss the details of the advancement of the field, as well as to identify promising innovative trends. Therefore, the aim of the seminar was to provide an opportunity for key cryptographers to meet, to interact, to focus on the scientific foundation of cryptography, to spot the emerging new areas, and to work on them. Applications were also covered but the emphasis was on the conceptual framework that allows the use of appropriate models, amenable to mathematical reasoning.

The seminar brought together about 40 leading cryptographers from all over the world. Almost all participants gave a presentation about their recent research and also about future research plans they have, encouraging others to join in. In many cases the choice of the subject for the talk was targeted to the unique list of participants. The presentations were highly interactive and led to lively discussions, well into the evenings and nights. A number of new collaborations were initiated at the seminar. Overall, the seminar was a great success, as is also documented by the feedback given by the participants on the questionnaires.

The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols, etc.) and in terms of the mathematical methods and techniques used (algebra, number theory, elliptic curves, probability theory, information theory, combinatorics, quantum theory, etc.). The range of applications addressed in the various talks was broad, ranging from secure communication, key management, authentication, digital signatures and payment systems to e-voting and Internet security.

While the initial plan had been to focus more exclusively on public-key cryptography, it turned out that this sub-topic branches out into many other areas of cryptography and therefore the organizers decided to expand the scope, emphasizing quality rather than close adherence to public-key cryptography. This decision turned out to be a wise one.

What was common to almost all the talks is that rigorous mathematical proofs for the security of the presented schemes were given. In fact, a central topic of many of the talks were proof methodologies for various contexts.


Teilnehmer
  • Eli Biham (Technion - Haifa, IL) [dblp]
  • Johannes Blömer (Universität Paderborn, DE)
  • Dan Boneh (Stanford University, US) [dblp]
  • Ran Canetti (IBM TJ Watson Research Center - Hawthorne, US) [dblp]
  • Melissa Chase (Brown University - Providence, US) [dblp]
  • Ronald Cramer (CWI - Amsterdam, NL)
  • Robbert de Haan (CWI - Amsterdam, NL)
  • Yvo Desmedt (Univ. College London, GB)
  • Yevgeniy Dodis (New York University, US) [dblp]
  • Serge Fehr (CWI - Amsterdam, NL) [dblp]
  • Marc Fischlin (TU Darmstadt, DE) [dblp]
  • Matthias Fitzi (ETH Zürich, CH)
  • Oded Goldreich (Weizmann Institute - Rehovot, IL) [dblp]
  • Shai Halevi (IBM TJ Watson Research Center - Yorktown Heights, US) [dblp]
  • Johan Hastad (KTH Royal Institute of Technology, SE) [dblp]
  • Dennis Hofheinz (CWI - Amsterdam, NL) [dblp]
  • Yuval Ishai (Technion - Haifa, IL) [dblp]
  • Stanislaw Jarecki (University of California - Irvine, US)
  • Eike Kiltz (CWI - Amsterdam, NL) [dblp]
  • Eyal Kushilevitz (Technion - Haifa, IL)
  • Ueli Maurer (ETH Zürich, CH) [dblp]
  • Alexander May (TU Darmstadt, DE) [dblp]
  • Rafail Ostrovsky (UCLA, US)
  • Rafael Pass (Cornell University, US) [dblp]
  • Jacques Patarin (University of Versailles, FR) [dblp]
  • Krzysztof Pietrzak (CWI - Amsterdam, NL) [dblp]
  • Bart Preneel (KU Leuven, BE) [dblp]
  • Tal Rabin (IBM TJ Watson Research Center - Hawthorne, US) [dblp]
  • Phillip Rogaway (University of California - Davis, US) [dblp]
  • Kazue Sako (NEC - Kawasaki, JP) [dblp]
  • Christian Schaffner (CWI - Amsterdam, NL) [dblp]
  • Claus Peter Schnorr (Goethe-Universität - Frankfurt a. M., DE) [dblp]
  • Adi Shamir (Weizmann Institute - Rehovot, IL) [dblp]
  • Tsuyoshi Takagi (Future University - Hakodate, JP) [dblp]
  • Salil Vadhan (Harvard University - Cambridge, US) [dblp]
  • Serge Vaudenay (EPFL - Lausanne, CH) [dblp]
  • Douglas Wikström (KTH Royal Institute of Technology, SE)
  • Stefan Wolf (ETH Zürich, CH)

Verwandte Seminare
  • Dagstuhl-Seminar 9339: Cryptography (1993-09-27 - 1993-10-01) (Details)
  • Dagstuhl-Seminar 9739: Cryptography (1997-09-22 - 1997-09-26) (Details)
  • Dagstuhl-Seminar 02391: Cryptography (2002-09-22 - 2002-09-27) (Details)
  • Dagstuhl-Seminar 11391: Public-Key Cryptography (2011-09-25 - 2011-09-30) (Details)
  • Dagstuhl-Seminar 16371: Public-Key Cryptography (2016-09-11 - 2016-09-16) (Details)

Klassifikation
  • security / cryptography

Schlagworte
  • cryptography
  • provable security
  • mathematical foundations
  • protocols