On asynchronous proactive threshold cryptosystems and BFT consensus scalability.

Abstract: The first part of this talk introduces PROTECT, a Platform for Robust Threshold Cryptography. The design of Threshold and Proactive cryptographic systems has received attention in recently due to the rise of cloud services, blockchain and crypto-currency technologies. However the bulk of literature in the threshold cryptography area assumes synchronous networks. The goal in

ProximiTEE: Hardened SGX Attestation Using an Embedded Device and Proximity Verification

Abstract: Intel SGX enables protected enclaves on untrusted computing platforms. An important part of SGX is its remote attestation mechanism that allows a remote verifier to check that an enclave was correctly constructed before provisioning secrets to it. However, SGX attestation is vulnerable to relay attacks where the attacker, such as malicious OS, redirects the

Protecting encrypted data against key exposure

Abstract: Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim

Zcash, Payment Privacy and Beyond: Blockchains as Limited Trusted Third Parties.

Abstract: Blockchains have received considerable attention both in academia and industry. Much of this work has focused on how to improve blockchains themselves either in terms of performance, features, or theoretical underpinnings. This talk will focus on a different question: what can blockchains do for computer security and cryptography? It will cover blockchains as a

Scalable and Efficient Distributed Ledgers

Abstract: While showing great promise, Bitcoin requires users to wait tens of minutes for transactions to commit, and even then, offering only probabilistic guarantees. In this talk we are going to address the challenges of scaling decentralised payment systems. The first part of the talk introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing

Quisquis: A New Design for Anonymous Cryptocurrencies

Abstract: Despite their usage of pseudonyms rather than persistent identifiers, most existing cryptocurrenciesdo not provide users with any meaningful levels of privacy. This has prompted the creation of privacy enhancedcryptocurrencies such as Monero and Zcash, which are specifically designed to counteract thetracking analysis possible in currencies like Bitcoin. These cryptocurrencies, however, also suffer fromsome drawbacks:

Differential Privacies

Abstract: Since the initial invention of differential privacy in 2005, the academic community has proposed a large number of variants of the original definition. What are the motivations behind these variants? Which one should you use in each context? In this talk, I’ll present ongoing research towards systematizing this body of research, propose a classification