PETShop: Workshop on Language Support for Privacy Enhancing Technologies

Co-located with CCS 2013. Room B04.

Program

7:30 - 8:30 Breakfast
8:50 - 9:00 Welcome
9:00 - 10:00 A Brief History of Practical Multi-Party Computation (Invited Talk)
Nigel Smart, University of Bristol, UK
In the last few years amazing progress has been made in turning the theoretical area of cryptography called Multi-Party Computation into a practical reality. In particular we can now use MPC to solve many security tasks which were thought impossible just a few years ago. In this talk I will overview this progress, and examine how far we have come in such a short space of time.
10:00 - 10:30 Session 1a: Protocols

Specifying Sharemind’s Arithmetic Black Box. Peeter Laud, Alisa Pankova, Martin Pettai and Jaak Randmets
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 1b: Protocols

Domain-Polymorphic Language for Privacy-Preserving Applications. Dan Bogdanov, Peeter Laud and Jaak Randmets
Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System. George Danezis, Cedric Fournet, Markulf Kohlweiss and Bryan Parno
Towards an EasyCrypt Formalization of Garbling Schemes. José Carlos Bacelar Almeida, Manuel Bernardo Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire and Pierre-Yves Strub
12:30 - 14:00 Lunch Break
14:00 - 15:00 Non-Interactive Secure Computation Systems (Invited Talk)
Benny Pinkas, Bar Ilan University, Israel
Secure computation enables parties to run a distributed computation of arbitrary functions of their private inputs while hiding everything but the final output of the computation. Protocols for secure computation are usually composed of multiple rounds of interaction. This property often limits the usability of the protocols, especially in if not all participants are guaranteed to be simultaneously online. The talk will describe the design and implementation of secure non-interactive protocols in the two-party and the multi-party settings, as well as in a web environment.
15:00 - 15:30 Session 2a: Compiler
Efficient Secure Computation Optimization. Raphael Urmoneit and Florian Kerschbaum
15:30 - 16:00 Coffee Break
16:00 - 17:00 Session 2b: Compiler
Lessons Learned with PCF: Scaling Secure Computation. Benjamin Kreuter and Abhi Shelat
Challenges in Compiler Construction for Secure Two-Party Computation. Andreas Holzer, Nikolaos P. Karvelas, Stefan Katzenbeisser, Helmut Veith and Martin Franz

Call for Papers

petshop-cfp

To emphasize the workshop character and the focus on the discussion of open challenges, we ask for submissions of short (2 pages) work-in-progress/position papers/extended abstracts which describe applications, problems, and new ideas in the field of multi-party computation. Especially we want to encourage authors to later publish extended versions of their submissions at other venues.

Scope

Privacy enhancing technologies (PETs) are necessary when untrusted platforms compute on sensitive data, for example in a distributed setting or in cloud computing. Cryptography offers a rich set of PETs for such privacy-preserving computations, including secure multi-party computation (SMC) and zero-knowledge (ZK) protocols. These systems enable distrusting parties to collectively compute over their private inputs without revealing their data to the other parties. With the wide availability of distributed systems, social media, and cloud computing, there is a pressing need to make these technologies usable in practice. A key step towards practicality is the ability to compile from high-level languages, like C, into cryptographic protocols. Such cryptographic compilers have only recently begun to emerge, and they stand to benefit from decades of research in programming languages, compiler construction, and program verification. We believe that the concepts, methodologies, and tools developed in these areas of research can help to make cryptographic PETs practically available.

PETShop is located at the crossroads of security, programming languages, compiler construction, and program verification and aims to bring together researchers from these different communities to exchange ideas and research results to improve the practicality of state of the art cryptographic PETs. The one-day workshop will be a combination of invited talks, tutorials, tool presentations, and informal presentations.

The workshop solicits short/work-in-progress/position-papers. Submitted papers must be in ACM double-column format with at most 2 pages, including bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interest include but are not limited to:

  • Compiler optimizations for privacy-preserving computations, e.g., SMC or ZK protocols
  • Programming language support for privacy-preserving computations
  • Execution environments for privacy-preserving computations
  • Experience reports, use cases, and implementations of privacy-preserving computations
  • Tool demonstrations

Important Dates

Submission Deadline: August 4, 2013 (anywhere on earth)
Notification of Authors: August 23, 2013
Camera ready due: August 30, 2013
Workshop: November 4, 2013

Submission Instructions

Submissions will be handled via EasyChair, the link is: https://www.easychair.org/conferences/?conf=petshop2013
At least one author of each paper is expected to register and attend to present the work.

Program Chairs

Martin Franz Deutsche Bank
Andreas Holzer Vienna University of Technology

Organizers

Martin Franz Deutsche Bank
Andreas Holzer Vienna University of Technology
Rupak Majumdar MPI SWS Kaiserslautern
Bryan Parno Microsoft Research
Helmut Veith Vienna University of Technology