December 6-7, Beijing, China, Continental Grand Hotel & Convention Center (conference room No.303 on 3rd floor(北京国际会议中心三层303会议室)
Cryptography and secure computation permeate the fabric of today's technologies and everyday life. All over the world, these areas of research and practice have experienced explosive development. Worldwide adoption of the results of this research means that different approaches to key technologies and societal aspects of their use (in economics, policy, user acceptance, regulation, and other areas) have been developed in different parts of the world. Specialization in different aspects of research positively affects the depth of results and emergence of new ideas, but lack of harmonization in some approaches can also negatively impact technology adoption, global interoperability, and robustness and interoperability of future technologies.
Workshop Description
Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice) that set the stage for these discussions among a group of researchers from Europe, Asia, and North America, the workshop in Beijing, following AsiaCrypt2012 envisioned in this proposal will bring together internationally recognized scientists and thought leaders from Europe, North America, and Asia to discuss direction and development in theoretical and applied cryptography and surrounding societal issues in order to form an international community of thought and practice.
The participants will discuss the broad research directions in encryption and secure computation and their applications in cloud computing, smart grid, mobile and embedded computing, hardware, software, and network security. Attention will also be paid to the non-technical issues surrounding deployment and adoption of new security technologies using encryption. Approaches and projects in different countries will be discussed, in order to increase awareness of the R&D activities internationally and continue to for a strong community of research and practice and in order to generate new ideas in this field. The Workshop will consist of keynote talks, invited talks, panels, and discussion sessions. The workshop is invitational.
During the workshop, we hope to especially highlight mobile and embedded application space, lightweight encryption, new generations of applications, such as smart metering and smart grid and mobile cloud technologies. The topics of discussions include (but are not limited to) the following subjects:
- Secret versus public ciphers
- Cipher and algorithm development process
- Algorithms maturity, review, and standardization
- Lightweight cryptography
- New requirements for cryptography for novel applications
- New mobile and embedded applications
- New approaches in cryptography
- Cipher implementation and interoperability
- Secure function and multiparty computation
- Trust establishment and provable trust
- Commercial implementation
- Economics and economic incentives
- Standardization
- Societal and regulatory issues
Time | Min. | Content | |
Day One: Dec.6 (14:00~18:00) | 14:00 ~ 14:10 | 10 | Opening Statements (Lai Xuejia, Claire Vishik) Objective: continue dialog of items of interest to the community |
14:10 ~ 14:50 | 40 | Invited talk - Bart Preneel: Crypto diversity and open competitions in cryptography slides |
|
14:50 ~ 15:30 | 40 | Invited Talk - Yvo Desmedt: Deployment issues related to cryptography in cloud computing and social networks slides |
|
15:30 ~ 15:50 | 20 | Coffee Break | |
15:50 ~ 16:30 | 40 | Invited Talk - Dusko Pavlovic: Gaming security by obscurity |
|
Discussion 1: 16:30 ~ 18:00 | 90 | Crypto Aspects in mobile and embedded cryptography (Moderators: Claire Vishik, Kazue Sako) Talks: Lai Xuejia: Defining cryptography slides Ingrid Verbauwhede: Lightweight and embedded security |
|
18:00 ~ 18:05 | 5 | Day one closing remarks, plans for Dec 7th | |
19:00 | Dinner at the Conference hotel | ||
Day Two: Dec.7 | 9:00 ~ 9:05 | 5 | Opening Day 2 (organizers) |
9:05 ~ 9:45 | 40 | Invited Talk: Qingni Shen Security and Privacy Issues in Cloud Storage slides |
|
9:45 ~ 10:15 | 30 | Invited Talk: Yuliang Zheng (Mobile Cloud) slides | |
10:15 ~ 10:35 | 20 | Coffee Break | |
Discussion 2: 10:35 ~ 12:30 | 115 | New Directions in Cryptography (Moderator: Kenny Paterson) Speakers: Phong Nguyen Kazue Sakoslides Bart Preneel Christian Rechberger Kenny Paterson slides |
|
12:30 ~ 1:45 p.m. | 75 | Lunch | |
Discussion 3: 1:45 ~ 3:15pm | 90 | Standardization, related issues. Moderator: Claire Vishik Talks: Yuliang Zheng (JTC1 activities) slides Sean Shen (IETF: choice, update, obsolescence of crypt algorithms in Internet protocols) |
|
3:15 ~ 4:00pm | 45 | Discussion: Future workshops and their focus (all) | |
4:00 ~ 4:05pm | 15 | Final remarks, adjourn |