Home
Search results “Oded regev lattice based cryptography software”
Winter School on Cryptography: Introduction to Lattices - Oded Regev
 
02:05:29
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 20739 barilanuniversity
Winter School on Cryptography: Proving Hardness of LWE - Oded Regev
 
01:32:37
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 1828 barilanuniversity
Winter School on Cryptography: Cryptanalysis of GGH and NTRU Signatures - Oded Regev
 
59:35
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 1682 barilanuniversity
Mathematical Ideas in Lattice Based Cryptography - Jill Pipher
 
53:28
2018 Program for Women and Mathematics Topic: Mathematical Ideas in Lattice Based Cryptography Speaker: Jill Pipher Affiliation: Brown University Date: May 21, 2018 For more videos, please visit http://video.ias.edu
Winter School on Cryptography: A History of Lattice-Based Encryption - Vadim Lyubashevsky
 
01:00:06
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 3552 barilanuniversity
IBM Research 5 in 5 Science Slam: Lattice Cryptography
 
08:04
During the IBM Research 5 in 5 Science Slam at IBM Think 2018, IBM researcher Cecilia Boschini explains one of the technologies that will change the world in the next five years: lattice cryptography. Learn more at http://ibm.biz/five-in-five.
Views: 2890 IBM Research
Steven Galbraith - Challenges for Lattice Cryptography
 
57:47
Title: Challenges for Lattice Cryptography Speaker: Steven Galbraith (University of Auckland) 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/
Views: 701 PQCrypto 2016
34C3 -  LatticeHacks
 
01:05:56
https://media.ccc.de/v/34c3-9075-latticehacks Fun with lattices in cryptography and cryptanalysis Lattices are an extremely useful mathematical tool for cryptography. This talk will explain the basics of lattices in cryptography and cryptanalysis. It’s an exciting time for public-key cryptography. With the threat of practical quantum computers looming in the next few decades, it’s high time to replace the systems that can be broken by a quantum computer with ones that remain secure even if the attacker has a quantum computer. However, this is easier said than done – there is no consensus what replacements should be chosen and how secure the systems are. NIST has just started a 5-7 year competition with the target to recommend a portfolio of post-quantum encryption and signature schemes. Considerations will be speed, bandwidth, and of course security. Several of the submissions are based on lattices. At our current level of understanding, lattice-based cryptography offers relatively small public keys for both encryption and signatures, while having good performance and reasonably sized ciphertexts and signatures. While these features are nice and make us want to know more about lattices, that world can be a scary place full of discussions of Minkowski bounds, Gaussian distributions, and orthogonalized bases. We will show how these schemes work in accessible terms. Lattices have been used in cryptography for more than thirty years, but for most of that only as a tool to attack systems, starting with knapsack systems in the early 80’s. Lattices can also be used to break conventional public-key cryptosystems such as RSA or Diffie-Hellman when they are incorrectly implemented. This talk will explain these fun attacks in concrete terms, with code you can run at home. Algorithms will be presented as Python/Sage code snippets and will already be online before the talk at https://latticehacks.cr.yp.to. This is a joint presentation by Daniel J. Bernstein, Nadia Heninger, and Tanja Lange, surveying work by many people. djb Tanja Lange Nadia Heninger https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9075.html
Views: 2380 media.ccc.de
CCS 2016 - ΛОλ: Functional Lattice Cryptography
 
29:28
Authors: Eric Crockett (Georgia Institute of Technology) and Chris Peikert (University of Michigan) presented at CCS 2016 - the 23rd ACM Conference on Computer and Communications Security (Hofburg Palace Vienna, Austria / October 24-28, 2016) - organized by SBA Research
Views: 233 CCS 2016
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
 
04:18
Crypto 2011 Rump session presentation for Daniele Micciancio and Chris Peikert, talk given by Chris Peikert
Views: 325 TheIACR
IBM Innovations of the Next Five Years - Blockchain, Lattice Cryptography, AI
 
05:20
http://www.Motorward.com - Subscribe For More Cool Videos: https://goo.gl/2nkv2Z IBM predicts the technlogical innovations of the next five years in their annual 5 in 5 predictions for 2018. The main highlights include Blockchain, Lattice Cryptography, and AI. "Great scientific leaps rarely happen incrementally. They come from setting big, ambitious goals that move discovery forward. Think of the Wright brothers’ determination to fly, President John F. Kennedy’s pledge to put a man on the moon, or IBM Research’s resolve to build a computer that could understand spoken language and beat the greatest human champions on Jeopardy! The bigger the goal, the greater the impact on society. This approach has been a hallmark of IBM Research since our founding more than 70 years ago, and it is responsible for many world-changing inventions. In that spirit, today we’re renewing our annual “5 in 5” predictions about five technologies that we believe have the potential to change the way people work, live, and interact during the next five years. IBM Research began the 5 in 5 conversation a decade ago as a way to stimulate interest and discussion around some of the most exciting breakthroughs coming out of our labs. Then, as now, this effort was informed by the breadth of IBM’s unmatched expertise across systems, software, services, semiconductors and a wide swath of industries. Forecasting is always a tricky business, but over the past ten years many of our 5 in 5 predictions have proven highly accurate in spotting and accelerating emerging technologies. For example: In 2012, IBM Research predicted that computers would not only be able to look at pictures, but understand them. The field of computer vision has advanced rapidly over the last several years, to the point where our scientists have designed systems with a computational form of sight that can examine images of skin lesions and help dermatologists identify cancerous states. That same year, we projected that computers will “hear” what matters. Significant advances are being made in creating cognitive systems that can interpret and analyze sounds to create a holistic picture of our surroundings. Very recently, in collaboration with Rice University, IBM announced a sensor platform that can “see”, “listen”, and “talk” and aids senior citizen for staying healthy, mobile, and independent. Also in 2012, we envisioned digital taste buds that could help people to eat smarter. IBM researchers turned to the culinary arts to see if Watson, the world’s first cognitive computing system, could help cooks discover and create original recipes with the help of flavor compound algorithms. They trained Watson with thousands of recipes and learning about food pairing theories. Two years later, Chef Watson debuted at SXSW, followed by a web application for home cooks. In 2013, our scientists anticipated that doctors will routinely use your DNA to keep you well. Full DNA sequencing is on its way to becoming a routine procedure. The following year, New York Genome Center and IBM started a collaboration to analyze genetic data with Watson to accelerate the race to personalized, life-saving treatment for brain cancer patients. In 2015, IBM announced another collaboration with more than a dozen leading cancer institutes to accelerate the ability of clinicians to identify and personalize treatment options for their patients. For this year’s 5 in 5, we’re struck by the powerful implications of the ongoing effort to make the invisible world visible, from the macroscopic level down to the nanoscale. Innovation in this area could enable us to dramatically improve farming, enhance energy efficiency, spot harmful pollution before it’s too late, and prevent premature cognitive decline."
Views: 137 Motorward
3rd BIU Winter School on Cryptography: Applications of Elliptic Curves to Cryptography - Nigel Smart
 
01:14:33
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 1353 barilanuniversity
Zero-Knowledge Arguments for Lattice-Based Accumulators
 
20:45
Full title: Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors, Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang. Talk at Eurocrypt 2016. See http://iacr.org/cryptodb/data/paper.php?pubkey=27634
Views: 288 TheIACR
Ilaria Chillotti - An Homomorphic LWE based E-voting Scheme
 
28:21
Title: An Homomorphic LWE based E-voting Scheme Authors: Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachene 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 460 PQCrypto 2016
Winter School on Cryptography: Ideal Lattices and Applications - Vadim Lyubashevsky
 
01:04:43
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2709 barilanuniversity
Winter School on Cryptography: Fully Homomorphic Encryption - Craig Gentry
 
01:59:38
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 7552 barilanuniversity
Proofs in Cryptography: Lecture 6  Reduction Proof Example - PRG based Encryption
 
13:32
Proofs in Cryptography Lecture 6 Reduction Proof Example - PRG based Encryption ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Koç University http://crypto.ku.edu.tr
Views: 1996 KOLT KU
Flush, Gauss, and Reload    A Cache Attack on the BLISS Lattice Based Signature Scheme
 
22:55
Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27851
Views: 407 TheIACR
Winter School on Cryptography: Reduction for Sis - Vadim Lyubashevsky
 
01:25:07
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 3322 barilanuniversity
Vinod Vaikuntanathan - Lattices and Cryptography:  A Match Made in Heaven
 
01:00:58
Vinod Vaikuntanathan of the University of Toronto presented a talk titled: Lattices and cryptography: A match made in heaven at the 2014 PQCrypto conference in October, 2014. PQCrypto 2014 Book: http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11658-7 Workshop: https://pqcrypto2014.uwaterloo.ca/ Find out more about IQC! Website - https://uwaterloo.ca/institute-for-qu... Facebook - https://www.facebook.com/QuantumIQC Twitter - https://twitter.com/QuantumIQC
The Mathematics of Lattices I
 
01:08:26
Vinod Vaikuntanathan, Massachusetts Institute of Technology Cryptography Boot Camp http://simons.berkeley.edu/talks/vinod-vaikuntanathan-2015-05-18a
Views: 9239 Simons Institute
Winter School on Cryptography: Learning With Errors - Chris Peikert
 
01:50:46
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 6735 barilanuniversity
Daniele Micciancio - Cryptography developments
 
02:39
Daniele Micciancio is a professor of computer science at the University of California, San Diego. As a leader in the field of lattice based cryptography and computational complexity, his research has focused heavily on fully homomorphic encryption and its challenges. Micciancio was visiting IQC for PQCrypto 2014, the 6th international conference on post-quantum cryptography (https://pqcrypto2014.uwaterloo.ca/). Find out more about IQC! Website - https://uwaterloo.ca/institute-for-quantum-computing/ Facebook - https://www.facebook.com/QuantumIQC Twitter - https://twitter.com/QuantumIQC Micciancio explains fully homomorphic encryption and how it relates to his group work on latice algorithms.
Oscar Reparaz - Additively Homomorphic Ring-LWE Masking
 
32:44
Title: Additively Homomorphic Ring-LWE Masking Authors: Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 254 PQCrypto 2016
Webcast: NTRU - A Secure, High Performance Alternative to RSA or ECC
 
49:44
This webcast, presented by William Whyte (Chief Scientist, Security Innovation) and Chris Conlon (Software Developer, wolfSSL Inc) discusses how the lattice-based NTRU algorithm works, some of its features and benefits, and the process of migrating from RSA to NTRU
Views: 1268 Security Innovation
Proofs in Cryptography: Lecture 1 Encryption Schemes
 
05:33
Proofs in Cryptography Lecture 1 Encryption Schemes ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Koç University http://crypto.ku.edu.tr
Views: 3398 KOLT KU
Winter School on Cryptography: Trapdoors and Applications - Chris Peikert
 
02:09:51
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2362 barilanuniversity
Crypto Lab: Diffie-Hellman, Public Key and Private Key
 
19:01
Lab: Private Key, Public Key and Key Sharing: http://asecuritysite.com/public/lab02.pdf and details at: http://asecuritysite.com/crypto/day2
Views: 1655 Bill Buchanan OBE
3rd BIU Winter School on Cryptography: Non-Interactive Zero Knowledge from Pairings - Jens Groth
 
01:53:28
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 1482 barilanuniversity
NJIT CryptoLab Lattice Encryption Series, Volume 2: Ring-LWE NTRU Variant
 
01:07:57
This is the third part of the NJIT CryptoLab first volume in our seminar series on lattice encryption focusing on the underlying mathematics.
Views: 227 NJIT CryptoLab
Winter School on Cryptography: Fully Homomorphic Encryption - Craig Gentry
 
01:23:05
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2758 barilanuniversity
Vlad Dragoi - Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
 
28:46
Title: Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes Authors: Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, and Jean-Pierre Tillich 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 321 PQCrypto 2016
3rd BIU Winter School on Cryptography: Attribute-Based Encryption - Allison Bishop Lewko
 
01:50:16
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 4109 barilanuniversity
Proofs in Cryptography: Lecture 13 ROM Proof Example - CPA secure RSA Encryption
 
16:18
Proofs in Cryptography Lecture 13 ROM Proof Example - CPA secure RSA Encryption ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Koç University http://crypto.ku.edu.tr
Views: 831 KOLT KU
Winter School on Cryptography: Basic Cryptanalysis - Vadim Lyubashevsky
 
01:24:32
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2834 barilanuniversity
3rd BIU Winter School on Cryptography: How Pairings Work - Florian Hess
 
57:30
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2360 barilanuniversity
3rd BIU Winter School on Cryptography: Identity-Based Encryption and Variants - Dan Boneh
 
01:25:53
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 5640 barilanuniversity
Daniele Micciancio - Lattice-based public-key cryptography
 
01:47:21
Daniele Micciancio of the University of California, San Diego presented an invited talk on lattice-based public key cryptography at the 2014 PQCrypto summer school in October, 2014. PQCrypto Summer School: https://pqcrypto2014.uwaterloo.ca/summer-school/ Find out more about IQC! Website - https://uwaterloo.ca/institute-for-qu... Facebook - https://www.facebook.com/QuantumIQC Twitter - https://twitter.com/QuantumIQC
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
 
25:51
Paper by Sam Kim and David J. Wu, presented at Crypto 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28247
Views: 189 TheIACR
Winter School on Cryptography: Fully Homomorphic Encryption and the Bootstrapping - Craig Gentry
 
50:40
Winter School on Lattice-Based Cryptography and Applications, which took place at Bar-Ilan University between february 19 - 22. The event's program: http://crypto.biu.ac.il/winterschool2012/ Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2698 barilanuniversity
3rd BIU Winter School on Cryptography: School overview - Dan Boneh
 
25:38
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 2750 barilanuniversity
3rd BIU Winter School on Cryptography: Opening Remarks - Yehuda Lindell
 
09:33
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 4064 barilanuniversity
3rd BIU Winter School on Cryptography: How Pairings Work - Florian Hess
 
01:34:21
The 3rd Bar-Ilan Winter School on Cryptography: Bilinear Pairings in Cryptography, which was held between February 4th - 7th, 2013. The event's program: http://crypto.biu.ac.il/winterschool2013/schedule2013.pdf For All 2013 Winter school Lectures: http://www.youtube.com/playlist?list=PLXF_IJaFk-9C4p3b2tK7H9a9axOm3EtjA&feature=mh_lolz Dept. of Computer Science: http://www.cs.biu.ac.il/ Bar-Ilan University: http://www1.biu.ac.il/indexE.php
Views: 1024 barilanuniversity
Cryptography Research
 
05:36
Cryptography Research IBM and the Future of Cyber Security By 2011, the world will be 10 times more instrumented than it was in 2006. Internet connected devices will leap from 500 Million to 1 Trillion. Approximately 70% of the digital universe is created by individuals, but enterprises are responsible for 85% of the security, privacy, reliability, and compliance. Increasingly, the proliferation of data-generating sensors and mobile computing devices, and the emergence of new forms of communication such as social networking, are driving unprecedented growth in the collection, storage and management of all types of data. Not surprisingly, this phenomenon has sparked growing demand for the ability to extract intelligence from these massive mountains of information—intelligence that can enable organizations to improve their decision-making and run their businesses more effectively and efficiently. With this capacity to rapidly sift thru data and gain new insights comes a significant challenge and responsibility when it comes to personal information, or information that relates to identifiable individuals: how to enable the exchange and analysis of data, while protecting privacy. IBM has long recognized the importance of information privacy and led by example in its own privacy polices and practices: the company was the first multinational to adopt a global privacy policy in the late 1960s, and continued that leadership as recently as 2005 when it was the first company to address genetic privacy. But policies and practices are not enough on their own to address the privacy challenges of an increasingly smarter planet. Thoughtfully-designed technologies can play a key role here, part of a paradigm that some are calling Privacy by Design. As the world becomes smarter and more interconnected, the capacity to rapidly sift through data to gain new insights brings with it a significant challenge and responsibility when it comes to personal information. How do we enable the exchange and analysis of data, while protecting privacy? IBM, which in the 1960s because the first multinational to adopt a global privacy policy and in 2005 was the first to address genetic privacy, has long recognized the importance of information privacy. Leading by example in its own privacy polices and practices, IBM has also received many patents for inventions that support our commitment to privacy leadership. For example, an IBM Researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called "privacy homomorphism," or "fully homomorphic encryption," makes possible the deep and unlimited analysis of encrypted information -- data that has been intentionally scrambled -- without sacrificing confidentiality. IBM's solution, formulated by IBM Researcher Craig Gentry, uses a mathematical object called an "ideal lattice," and allows people to fully interact with encrypted data in ways previously thought impossible. With the breakthrough, computer vendors storing the confidential, electronic data of others will be able to fully analyze data on their clients' behalf without expensive interaction with the client, and without seeing any of the private data. With Gentry's technique, the analysis of encrypted information can yield the same detailed results as if the original data was fully visible to all. Using the solution could help strengthen the business model of "cloud computing," where a computer vendor is entrusted to host the confidential data of others in a ubiquitous Internet presence. It might better enable a cloud computing vendor to perform computations on clients' data at their request, such as analyzing sales patterns, without exposing the original data. Other potential applications include enabling filters to identify spam, even in encrypted email, or protecting information contained in electronic medical records. The breakthrough might also one day enable computer users to retrieve information from a search engine with more confidentiality http://asmarterplanet.com/
Views: 13329 Social Media
The SPDZ Protocol Part 1 - Prof. Ivan Damgård
 
01:09:05
The SPDZ Protocol Part 1, a lecture given by Prof. Ivan Damgård Of Aarhus University, during Bar-Ilan University's 5th Winter School: Advances in Practical Multiparty Computation, held at BIU in February, 2015. Bar-Ilan University: www.biu.ac.il/en Full Playlist: https://www.youtube.com/playlist?list=PLXF_IJaFk-9BFn8M-dsEm5x3-5Cvji3V9
Views: 1645 barilanuniversity
Separate Separations of CPA and Circular Security for Any Cycle Length
 
20:46
Paper title: Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE, Navid Alamati and Chris Peikert, Crypto 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27671
Views: 202 TheIACR
The Cryptographic Lens: Visions of our Past and Future
 
57:12
Shafi Goldwasser, MIT Symposium on Visions of the Theory of Computing, May 30, 2013, hosted by the Simons Institute for the Theory of Computing at UC Berkeley.
Views: 1527 Simons Institute
Predicate Encryption for Inner Products from LWE
 
03:04
Crypto 2011 Rump session presentation for Shweta Agrawal, David Freeman, Vinod Vaikuntanathan, talk given by Shweta Agrawal
Views: 424 TheIACR
Johannes A. Buchmann - Post-Quantum Cryptography – an overview
 
01:17:20
Tutorial Talk 4 by Johannes A. Buchmann at 5th International Conference on Quantum Cryptography (QCrypt 2015) in Hitotsubashi Hall, Tokyo, October 2nd, 2015. Download the slides at: http://2015.qcrypt.net/scientific-program/
Views: 3584 QCrypt 2015