TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 24362

Next-Generation Secure Distributed Computing

( Sep 01 – Sep 06, 2024 )

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/24362

Organizers
  • Christian Cachin (Universität Bern, CH)
  • Aniket Kate (Purdue University - West Lafayette, US & Supra Research - West Lafayette, US)
  • Julian Loss (CISPA - Saarbrücken, DE)
  • Kartik Nayak (Duke University - Durham, US)

Contact

Motivation

Trust in a single or a group of parties is fundamentally needed to design any secure system. A common approach to establishing this trust is to use secure distributed computing (SDC) protocols. In this approach, systems rely on multiple different communicating parties and the correct behavior of a subset of those. Several SDC primitives are used in practice underneath a wide array of other cryptographic primitives and applications. Examples include blockchains, decentralized oracles, random beacons, and primitives such as threshold signatures.

The formal models for such systems' security/correctness guarantees were introduced in the 80s and 90s and have been used ever since. However, ever-evolving software, (trusted) hardware, and communication infrastructure present new threats, attack vectors as well as opportunities that often fall outside the scope of these classical security models. Therefore, it is necessary to revisit and reevaluate these system models and threat assumptions in today's distributed systems context.

Moreover, tremendous growth in the cryptocurrency space demands high-performance solutions that scale to billions of users. It also introduces fascinating new challenges related to fairness, incentive compatibility, and crypto-economics that have received comparatively little attention in the existing literature.

This Dagstuhl Seminar will reveal and exploit synergies in the fields of cryptography, distributed computing, game theory, and systems to identify promising new application domains for SDC. These topics are directly motivated by discussion and collaborations with the blockchain industry as well as emerging IoT needs. The goal of this Dagstuhl Seminar is to bring together researchers from these distinct communities, identify gaps and overlaps, and foster future collaboration.

Copyright Christian Cachin, Aniket Kate, Julian Loss, and Kartik Nayak

Classification
  • Computer Science and Game Theory
  • Cryptography and Security
  • Distributed / Parallel / and Cluster Computing

Keywords
  • Distributed Computing
  • Cryptography
  • Game Theory
  • Blockchain