Working Groups

 

The research activity of the Action is divided in four working groups.

WG1: Protocol Design

The WG will coordinate efforts for the design of practical MPC protocols. In particular the WG will promote the dialogue between protocol designers and practitioners to understand where the real bottlenecks in implementing MPC protocols are, as theoretical measures of communication and computational complexity are not always good predictors of the actual performances. The WG aims at developing a framework for benchmarking different protocols, as it is not clear today how to compare protocols that use different resources (network, CPU, etc.) in different ways, or how to compare protocols that rely on different computational assumptions. By combining the experience of privacy experts, cryptographers and systems researchers, the WG will coordinate the design of privacy-preserving data processing schemes that provide security guarantee to the users. In terms of techniques, this WG will include tools such as garbled circuits, homomorphic encryption, zero-knowledge protocols etc. This WG will also lead the study of relevant cryptographic tools with advanced functionalities that can be used in interactive and outsourced computation, such as functional encryption schemes, searchable encryption, order preserving encryption etc.

WG1 Participants
Name Country
Carmit Hazay (WG1 leader) IL
Manuel Barbosa PT
Dario Catalano IT
Carlos Cid UK
Stefan Dziembowski PL
Sebastian Faust CH
Serge Fehr NL
Dario Fiore ES
Marc Fischlin DE
Apostolos Fournaris EL
Kristian Gjsteen NO
Bogdan Groza RO
Kimmo Halunen FI
Alptekin Kupcu TR
Aggelos Kiayias EL
Ferucio Laurentiu Tiplea RO
Anja Lehmann CH
Albert Levi TR
Vadim Lyubashevsky FR
Miodrag Mihaljevic RS
Stig Mjolsnes NO
Svetla Nikova BE
Claudio Orlandi DK
Panagiotis Rizomiliotis EL
Mehmet Sabir Kiraz TR
Mehmet Tahir Sandikkaya TR
Dominique Schroeder DE
Nicolas Sklavos EL
Nigel Smart UK
Denis Trcek SI
Viktoria Villanyi HU
Ivan Visconti IT
Tihomir Zoranovic RS

WG2: Protocol Analysis

The WG focuses on understanding the security of real-life protocols such as TLS, IPSec, EMV etc. as their security is poorly understood. Towards this goal, the WG will develop appropriate security models for the building blocks used within the protocols. Illustrating the above on the TLS example, this WG will analyze the TLS-primitives such as RSA encryption and key derivation functions with respect to the new models. The WG will bring together practitioners and modeling experts towards tackling these questions. In particular, the WG will extract appropriate protocol and primitive descriptions from the standards, and develop new analysis tools and models inspired by approaches such as the Bellare-Rogaway model. The goal is to obtain security notions that capture the real world attacks in a concise fashion. The new tools and models will then be combined with classical techniques such as "game hopping" to obtain a rigorous security analysis. Finally, in case positive results turn out to be hard to obtain, the WG will bring in experts from the area of impossibility results and use techniques such as oracle separations and meta-reductions.

WG2 Participants
Christina Brzuska (WG2 leader) UK
Bogdan Warinschi (WG2 co-leader) UK
Ali Aydin Selcuk TR
Daniel Bernstein NL
Dario Catalano IT
Chitchanok Chuengsatiansup NL
Cas Cremers UK
Bernardo David DK
Jean-Paul Degabriele UK
Pooya Farshim UK
Dario Fiore ES
Marc Fischlin DE
Cedric Fournet UK
Felix Gunther DE
Tommaso Gagliardoni DE
Adela Georgescu RO
Kristian Gjosteen NO
Britta Hale NO
Julia Hesse DE
Hakon Jacobsen NO
Tibor Jager DE
Markulf Kohlweiss UK
Tanja Lange NL
Anja Lehmann CH
Albert Levi TR
Giorgia Azzurra Marson DE
Sogol Mazaheri DE
Katerina Mitrokotsa SE
Ruxandra F. Olimid RO
Claudio Orlandi DK
Kenny Paterson UK
Bertram Poettering DE
Dominique Schroeder DE
Nicolas Sklavos EL
Nigel Smart UK
Rita Vald DE
Thyla van der Merwe UK
Ivan Visconti IT
Hoeteck Wee FR

WG3: Implementation and Verification

The WG will bring together theoreticians and practitioners in the areas of cryptography, programming languages and formal verification, and coordinate research and development initiatives centered on the implementation and verification of cryptographic schemes and protocols. The overarching goal is to resolve the existing tension between the need to guarantee efficiency, correctness and security at the level of executable code; versus the absence of adequate techniques and tools to assist developers in obtaining such guarantees (e.g., there is little support to ensure the preservation of correctness and security properties established for implementations constructed using a high-level programming language). To this end, collaborative research effort will be promoted in three complementary directions: i) the investigation of existing and novel optimizations and countermeasures (e.g., against side channel attacks), their deployment in cryptographic implementations, and the study of potential vulnerabilities arising from incorrect implementation; ii) the automation and integration of these techniques into domain-specific development tools that can assist practitioners in the implementation of cryptographic schemes and protocols; and iii) the design and development of formal verification tools that permit establishing the correctness and security of cryptographic implementations to a high degree of assurance, integrating the capability of reasoning about cryptographic security proofs, implementation correctness and physical security.

WG3 Participants
Name Country
Manuel Barbosa (WG3 leader) PT
Pedro Adão PT
Selcuk Baktir TR
Gilles Barthe ES
Apostolos Fournaris EL
Bogdan Groza RO
Alptekin Kupcu TR
Aggelos Kiayias EL
Stig Mjolsnes NO
Daniel Page UK
Mehmet Tahir Sandikkaya TR
Nicolas Sklavos EL
Cengiz Togay TR
Ingrid Verbauwhede BE
Jorge Villar ES
Tihomir Zoranovic RS

WG4: Cryptographic Primitives

The WG aims at finding new primitives having a low implementation cost which achieve the functionalities required by the main cryptographic protocols. Identifying the needs arising from real-life protocols is an important issue and will clearly benefit from an interaction with WG1 and WG2. This WG will focus on building both symmetric-key and public-key primitives and in particular it will encourage closer interaction between researchers in the areas of public-key cryptography, secret-key cryptography, hardware constructions, and automated verification. Indeed, the current lack of communication between these communities is a clear obstacle to the design of new real-world primitives. Constructions of new modes of operation, leakage-resilient public-key primitives, as well as the understanding of new mathematical assumptions that can lead to practical and provably-secure primitives, will greatly benefit from this added cooperation.

WG4 Participants
Name Country
Anne Canteaut (WG4 co-leader) FR
Vadim Lyubashevsky (WG4 co-leader) FR
Elena Adreeva BE
Tomer Ashur BE
Tsonka Baicheva BG
Selcuk Baktir TR
Manuel Barbosa PT
Guy Barwell UK
Dan Bernstein NL
Carlos Cid UK
Vesna Dimitrova MK
Itai Dinur FR
Apostolos Fournaris EL
Bogdan Groza RO
Carmit Hazay IL
Anthony Journault BE
Ferucio Laurentiu Tiplea RO
Virginie Lallemand FR
Gaetan Leurent FR
Hristina Mihajloska MK
Miodrag Mihaljevic RS
Aleksandra Mileva MK
Katerina Mitrokotsa SE
Svetla Nikova BE
Markku-Juhani Olavi Saarinen TR
George Petrides CY
Bart Preenel BE
Reza Reyhanitabar CH
Panagiotis Rizomiliotis EL
Simona Samardjiska MK
Dominique Schroeder DE
Nicolas Sklavos EL
Nigel Smart UK
Francois-Xavier Standaert BE
Viktoria Villanyi HU
Kerem Varici BE
Vesselin Velichkov LU
Jorge Villar ES
Tolga Yalcin MK