May 19

Attacking the GGH Cryptosystem with Lattice Reduction Algorithms

Speaker: Zhaofei Tian

Abstract:

May 12

JORY

Speaker: Mohammed AlAbbad

Abstract:

May 5

Algebraic Framework for the Specification and Analysis of Cryptographic-key Distribution

Speaker: Dr. Ridha Khedri

Abstract:
Several organizations generate and store a wide range of information in what is commonly referred to as data stores. To access the information within these data stores, two main architectures are widely adopted. The first architecture gives access to information through a trusted server that enforces established confidentiality policies. The second one allows the information to be public but in its encrypted form. Then through a scheme for distribution of cryptographic keys, each user is provided with the keys needed to decrypt only the part of the information she is authorized to access. The presentation focuses on the specification and analysis of key distribution policies in the latter architecture. An algebraic framework that takes into consideration a new perspective in tackling key-distribution problem is introduced. The use of the proposed framework to analyze key-distribution schemes that are representative of the ones found in the literature is presented. The framework enables the specification and the verification of key-distribution policies. The presentation also points the applicability of the presented algebraic framework to several other applications related to measures ensuring information confidentiality.