THURSDAY 31 MAY | |
---|---|
9:30 | Benny Applebaum: Perfect Secure Computation in Two Rounds |
10:20 | Phillipp Schoppmann: Secure Text Classification in Federated Databases |
Revisit talk 1 & 2 by Benny Applebaum & Phillipp Schoppmann | |
10:45 | Coffee |
11:15 | Satrajit Ghosh: Maliciously Secure Oblivious Linear Function Evaluation and its Applications |
11:40 | abhi shelat: Doubly efficient ZKSNARK without setup assumptions |
Revisit talk 3 & 4 by Satrajit Ghosh & abhi shelat | |
12:30 | Lunch |
14:00 | Geoffroy Couteau: On the Communication Complexity of Multiparty Computation in the Correlated Randomness Model |
14:50 | Mark Simkin: Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings |
Revisit talk 5 & 6 by Geoffroy Couteau & Mark Simkin | |
15:15 | Coffee |
15:45 | Irene Giacomelli: Privacy-Preserving Regression via Homomorphic Encryption |
16:10 | Adi Akavia: Secure Search via Multi Ring Fully Homomorphic Encryption |
16:35 | Peter Rindal: Fast Private Set Intersection from Fully Homomorphic Encryption |
Revisit talk 7, 8 & 9 by Irene Giacomelli, Adi Akavia & Peter Rindal | |
17:00 | End of workshop - See you next year! |