(December 23, 2024 15:30) 2024 Workshop on Cryptography, Information Security, and Mathematics
Date:December 4, 2024
InformationSee details->2024 Workshop on Cryptography, Information Security, and Mathematics(CRISMATH 2024) IMI HP
| Date & Time | Monday, December 23, 2024 Afternoon, Tuesday, December 24, 2024 Morning |
| Place | IMI auditorium, 4F, West 1 zone (W1-D-413) *Hybrid meeting with online (Zoom) participation |
| Time Schedule | Monday, December 23, 2024 13:30 – 15:00 Prof. Shinozaki (Department of Mathematical and Computing Science, School of Computing, Institute of Science Tokyo) Title: “On the Relationship Between FuncCPA Security and FuncCPA+ Security” |
| Monday, December 23, 2024 15:10 – 16:40 Prof. Iwamoto (Department of Informatics, Graduate School of Informatics and Engineering, University of Electro-Communications) Title: ”Information-Theoretic Security: Beyond Probabilistic Independence” | |
| Tuesday, December 24, 2024 9:00 – 12:00 (Online Lecture: Also Available at the Venue) Tutorial Lecture: Mr. Matsuda (National Institute of Advanced Industrial Science and Technology (AIST)) Title: ”Public-key cryptography that is secure against chosen ciphertext attacks” | |
| Lecture Summary | ▶Tutorial Lecture Mr. Matsuda (National Institute of Advanced Industrial Science and Technology (AIST)) Public-key cryptography is one of the key cryptographic technologies, and security against chosen ciphertext attacks is a major security requirement that is considered a de facto standard for practical public-key cryptography. In this lecture, we will explain the basic concepts of security definitions and security proof techniques for cryptographic elements, using the security proofs of major constructions of public-key cryptosystems that meet the security requirements against chosen ciphertext attacks as examples. ▶General Lecture Prof. Shinozaki (Department of Mathematical and Computing Science, School of Computing, Institute of Science Tokyo) FuncCPA Security, proposed by Akavia, Gentry, Halevi, and Vald, is a type of public-key cryptography security. This security is defined by adding an oracle to the IND-CPA game. This oracle takes a sequence of ciphertexts and a function, applies the function to the decrypted results of the ciphertexts, and returns the encrypted output. This definition is important in secure computation, where the server is allowed to delegate part of the computation to the client. Dodis, Halevi, and Wichs proposed FuncCPA+ as a stronger security than FuncCPA and showed that a scheme satisfying IND-CPA can be constructed to satisfy FuncCPA+. It has been shown that schemes satisfying FuncCPA+ also satisfy FuncCPA, but the reverse, whether schemes satisfying FuncCPA also satisfy FuncCPA+, remains an open problem. In this lecture, we will explain FuncCPA and FuncCPA+, as well as their variants such as ReEncCPA and ReEncCPA+, and discuss their relative strengths and weaknesses. Prof. Iwamoto (Department of Informatics, Graduate School of Informatics and Engineering, University of Electro-Communications) Information-theoretic security, proposed by Shannon, is a security concept that guarantees security without limiting the computational power of the attacker. It is still considered the strongest security concept. Mathematically, it can be easily formulated using conditional probabilities, but considering its validity reveals various aspects of information-theoretic security. In this lecture, starting from Shannon’s definition of probabilistic independence, we will examine the validity of information-theoretic security from multiple perspectives, including information theory, probability theory, and theoretical computer science. |
| Purpose of the Event | In recent years, various studies based on more specialized mathematical knowledge have been conducted in the field of information security, including cryptography. Meanwhile, in the field of mathematics, there is a growing momentum to promote research collaboration with related fields more than ever before. This workshop aims to provide a platform for researchers and students from these two fields to engage in academic exchange and to promote research collaboration across both fields by introducing several research topics related to both areas. |
| Executive Committee Members | Assoc. Prof. Ikematsu (Kyushu University, ikematsu@imi.kyushu-u.ac.jp) Prof. Kaji (Kyushu University) Prof. Nuida (Kyushu University) Prof. Numata (Hokkaido University) This workshop is supported by the Grant-in-Aid for Scientific Research (C) ‘Reconsideration of Tacit Knowledge in Security Proofs of Cryptographic Techniques and Realization of Clear Security Proofs’ (JP22K11906). |
| Participation | Free of charge! |
| Registration | https://docs.google.com/forms/d/e/1FAIpQLSeFjqyZPx5bqTt2Py2ldHHQFHwKnBhKqf5kDMagw-46u_a8Dg/viewform?pli=1 |
Please join us!! We are looking forward to seeing you!!