https://www.dagstuhl.de/12381
16. – 21. September 2012, Dagstuhl-Seminar 12381
Privacy-Oriented Cryptography
Organisatoren
Jan Camenisch (IBM Research GmbH – Zürich, CH)
Mark Manulis (University of Surrey, GB)
Gene Tsudik (University of California – Irvine, US)
Rebecca Wright (Rutgers University – Piscataway, US)
Die Veranstaltung wird unterstützt von:
• | ![]() | Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) |
Auskunft zu diesem Dagstuhl-Seminar erteilt
Dokumente
Dagstuhl Report, Volume 2, Issue 9
Teilnehmerliste
Dagstuhl's Impact: Dokumente verfügbar
Press Room
- OTR Team Strikes Again with Dagstuhl Privacy Preserving Presence Protocol P (DP5)
Article about this seminar published on "Hacked.com" on January 4, 2015
Summary
The constantly increasing volume of electronic interactions and sensitive information disseminated online raises privacy concerns and motivates the need for efficient privacy-oriented techniques. The aim of our "Privacy-Oriented Cryptography" seminar was to bring together (mainly, but not only) researchers working in different domains of cryptography and privacy. Although non-cryptographic measures can, at times, aid privacy (e.g., statistical or ad hoc obfuscation techniques) - cryptography, via its mathematical mechanisms and formal concepts, helps obtain novel and efficient privacy-enhancing solutions, achieving concrete and measurable privacy guarantees.
Since privacy is a very broad area, being explored not only by security and cryptography experts, this seminar focused on two domains: user privacy and data privacy, for which the benefit from using cryptographic techniques is especially significant. Seminar participants presented and discussed many novel privacy-oriented cryptographic algorithms and protocols that admit various fields of deployment for protecting privacy in a broad range of applications, involving possibly huge amounts of data (e.g., cloud computing) and many different users (e.g. online communities). The seminar further addressed the emerging research direction of provable privacy, by discussing various mechanisms and techniques for defining concrete privacy goals and enabling their formal analysis.
The seminar brought together 39 of the leading scientists in the areas of (applied) cryptography and privacy. The participants came from all over the world, including the US (13 participants), Germany (8), Switzerland (6), Great Britain (5), Australia (1), Belgium (1), Canada (1), France (1), Italy (1), and Sweden (1).
The program contained 26 interactive presentations, each about 35-40 minutes and two panel discussions, with a free afternoon on Wednesday to offer time for social activities or for conducting collaborative research in smaller groups. The seminar ended on Friday after lunch to enable time for traveling. We asked participants prior to the seminar to suggest talks based on their most recent results. Most presentations followed this suggestion and introduced new, sometimes even not yet submitted or still work-in-progress results. The first panel --- "Privacy Models: UC or Not UC?" --- discussed the advantages and disadvantages of existing cryptographic methods for formal specification and analysis of security and privacy guarantees. The second panel --- "Privacy-Oriented Cryptography: Why is it not adopted more in practice?" --- discussed challenges that arise in the practical deployment of existing privacy-oriented cryptographic solutions but also considered some success stories like Tor, a popular anonymous communications service, which is widely used in different parts of the world.
The organizers would like to thank all participants for accepting our invitations and attending the seminar, and for sharing their ideas and contributing to the interesting seminar program. We hope that discussions were fruitful and the opportunity to work face-to-face during the seminar helped to create impulses for exciting new research projects, paving the way for further progress and new discoveries in Privacy-Oriented Cryptography.
Finally, the organizers, also on behalf of the participants, would like to thank the staff and the management of Schloss Dagstuhl for their support throughout the 1,5 years of preparations of this very pleasant and successful event.
Classification
- Security / Cryptography
Keywords
- Applied Cryptography
- Cryptographic Protocols
- Privacy-Oriented Cryptography
- User Privacy
- Data Privacy
- Privacy Models