Invited Keynote Speakers
Title: Secure message transmission using multiple paths: theory and practice
Abstract: Secure message transmission is a fundamental problem in cryptography with formalized and proven secure solutions in information theoretic and computational settings. Dolev, Dwork, Waarts and Yung considered secure message transmission (SMT) problem in a network that is partially controlled by a computationally unbounded adversary, proposed an elegant abstract model for networks and showed that perfect (information theoretic) secrecy and reliability can be achieved without requiring a shared key as long as sufficient number of uncorrupted network paths exists between the two. In this talk we give an overview of SMT problem, consider a variation of the problem that is attractive in practice, and discuss our experience in attempting to securely implement the system in real-life networks, and lessons that we learnt.
Title: Cyber aspects of the Russian Ukraine war
- How to Explain the Failure of Russia’s Information Operations in Ukraine?
- Russia’s Stalled Electronic Warfare Betrays Bad Planning, Poor Training
- Is Ukraine the Cyberwar That Wasn’t?
Title: Searching for Searchable Encryption
Abstract: Cloud storage continues to experience explosive growth. Even if a cloud storage provider is trusted, it may be subject to security compromises. Unsurprisingly, data confidentiality is often a big concern or even a core compliance requirement. Simply using off-the-shelf encryption schemes does not work flawlessly for cloud storage applications because ciphertexts of standard encryption are not searchable. Hence in the last decade and a half, numerous research works have addressed the problem of designing protocols for secure search on encrypted outsourced data. However, the findings still do not seem to have caught up with growing practical demand. One of the main problems is to find suitable tradeoffs between performance, security, and functionality. This talk will discuss the evolution of the area of searchable encryption, covering the early schemes, some attacks, up through the state of the current research.