Hi all, <div><br></div><div>Next wednesday, we will have our last reading group meeting. Angela will talk about her recent works on </div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">&quot;Signature Schemes secure against Hard-to-Invert Leakage&quot; and &quot;</span><span style="background-color:rgb(255,255,255);color:rgb(34,34,34);font-family:arial,sans-serif">Is Simulation-Based Leakage Resilience and Adaptive Security essentially the same?</span><span style="background-color:rgb(255,255,255);color:rgb(34,34,34);font-family:arial,sans-serif">&quot;</span></div>
<div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><br></span></div><div>Speaker: Angela Zotteral</div><div>Time: Dec. 19th, 10:00am. </div>
<div>Location: Boston University Crypto Group Lounge. </div><div>              111 Cummington street, Room 135.  </div><div><br></div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Title: Signature Schemes secure against Hard-to-Invert Leakage.</span><br>
<br></div><div>Abstract:<br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">I will show how to overcome (in two different ways) the impossibility result on signature schemes secure against hard to invert leakage.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Joint work with Sebastian Faust, Carmit Hazay, Jesper B. Nielsen and Peter S. Nordholt.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Title: Is Simulation-Based Leakage Resilience and Adaptive Security essentially  the same?</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Bitanski, Canetti and Halevi (TCC12) give a general definition of simulation-based leakage security, we show that such security is hard to achieve.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">1) We show that any encryption protocol tolerating poly-log leakage must have secret keys that are essentially as long as the messages.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">2) We show an equivalence between poly-log leakage-tolerance and security against adaptive corruption.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">These results show that, even for a small amount of leakage, we need to use very expensive tools to build a leakage-tolerant protocol.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
<br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Joint work with Jesper B. Nielsen and Daniele Venturi.</span><br style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">
</div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><br></span></div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)"><br>
</span></div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Best, </span></div><div><span style="color:rgb(34,34,34);font-family:arial,sans-serif;background-color:rgb(255,255,255)">Rachel </span></div>
<div><br></div>