Summer School Talks

Talks

Here are the currently confirmed summer school talks!

  • Authenticated encryption: state-of-the-art and beyond
  • Speaker: Joan Daemen

  • Abstract: Nowadays the core functionality of symmetric cryptography is authenticated encryption (AE), that combines encryption to protect the confidentiality of data with its authentication. In this presentation we define the security goal of AE and show how AE schemes can be built and proven secure assuming an ideal primitive. In what many consider the state-of-the-art, the primitive is a block cipher (in practice AES), and it is assumed to behave like a random permutation.

  • Private Information Retrieval: are we close to make it practical?
  • Speaker: Sofía Celi

  • Abstract: Private Information Retrieval (PIR) schemes provide the ability to make private queries on databases that are hosted by a(n) untrusted (semi-honest) server(s). In the the single-server setting (where there are no trust assumptions over non-colluding servers), the majority of approaches with tolerable costs are limited to querying indices (single items) over flat arrays. However, this abstraction differs greatly from real-world instantiations of both structured and unstructured databases.

  • Empirical Security Research in the Android Ecosystem
  • Speaker: Juan Tapiador

  • Abstract: Android dominates the mobile operating system landscape worldwide, with over 3 billion active users and nearly 9 million mobile apps. The open-source nature of the Android Open Source Project (AOSP) has been instrumental in this success. However, it has also facilitated a complex supply chain across the software stack, involving Original Equipment Manufacturers (OEMs), Mobile Network Operators (MNOs), application markets, and a diverse ecosystem of third-party developers, advertising, and tracking services.

  • Federated Learning Security: From Advantages to Adversaries
  • Speaker: Alexandra Dmitrienko

  • Abstract: The rise of machine learning (ML) as a disruptive technology has ushered in a new era of intelligent applications. Among these advancements, distributed learning, particularly federated learning (FL), stands out as a significant evolution in collaborative intelligence. FL's unique capacity to utilize decentralized data sources enables privacy-preserving collaborative training, particularly beneficial in application domains where accessing public data is challenging or unfeasible, such as healthcare, finance, and beyond.

  • Anamorphic Encryption: Private Communication against a Dictator.
  • Speaker: Giuseppe Persiano

  • Abstract: Cryptosystems have been developed over the years under the typical prevalent setting which assumes that the receiver’s key is kept secure from the adversary, and that the choice of the message to be sent is freely performed by the sender and is kept secure from the adversary as well. Under these fundamental and basic operational assumptions, modern Cryptography has flourished over the last half a century or so, with amazing achievements: New systems (including public-key Cryptography), beautiful and useful models (including security definitions such as semantic security), and new primitives (such as zero-knowledge proofs) have been developed. Furthermore, these fundamental achievements have been translated into actual working systems, and span many of the daily human activities over the Internet. However, in recent years, there is an overgrowing pressure from many governments to allow the government itself access to keys and messages of encryption systems (under various names: escrow encryption, emergency access, communication decency acts, etc.).

  • Foundations of Layer-2 Blockchain Protocols
  • Speaker: Matteo Maffei

  • Abstract: Permissionless blockchains enable secure payments, and more generally computations, in a decentralized, trustless environment. Transactions are verified through a consensus mechanism and all valid transactions are recorded in a public, distributed ledger. While grounbreaking in nature and, despite their tender age, already rich of societal impact, existing blockchain technologies suffer from a few inherent limitations. First, storing each transaction on the ledger presents obvious scalability issues and fails to meet the growing user demands: For instance, in Bitcoin, the transaction throughput is technically limited to tens of transactions per second, a throughput three orders of magnitude lower than credit card networks. Secondly, consensus protocols operate on individual blockchains, whereas rich DeFi applications require to synchronize operations and transfer coins from a blockchain to the other, which typically requires trusted parties.




Speakers

Here are the currently confirmed school speakers!

#

Joan Daemen

Radboud University, The Netherlands
#

Juan Tapiador

Universidad Carlos III de Madrid, Spain
#

Alexandra Dmitrienko

Julius-Maximilians-Universität Würzburg, Germany
#

Giuseppe Persiano

Università di Salerno, Italy
#

Cristiana Teixeira Santos

Utrecht University, The Netherlands
#

Matteo Maffei

TU Wien, Austria
#

Esha Ghosh

Microsoft, Redmond, Washington, US
#

Aanjhan Ranganathan

Northeastern University, Boston, USA
#

Gene Tsudik

University of California, Irvine, USA
#

Christof Paar

Max Planck Institute for Security and Privacy, Bochum, Germany
#

Yuval Yarom

Ruhr University Bochum, Germany
#

Elena Dubrova

Royal Institute of Technology (KTH), Sweden
#

Gustavo Banegas

Qualcomm, France