Computer Science Department
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Ucla Computer Science Depart "Tment
THE UCLA COMPUTER SCIENCE DEPART"TMENT QUARTERLY THE DEPARTMENT AND ITS PEOPLE FALL 1987/WINTER 1988 VOL. 16 NO. 1 SCHOOL OF ENGINEERING AND APPLIED SCIENCE COMPUTER SCIENCE DEPARTMENT OFFICERS Dr. Gerald Estrin, Chair Dr. Jack W. Carlyle, Vice Chair, Planning & Resources Dr. Sheila Greibach, Vice Chair, Graduate Affairs Dr. Lawrence McNamee, Vice Chair, Undergraduate Affairs Mrs. Arlene C. Weber, Management Services Officer Room 3713 Boelter Hall QUARTERLY STAFF Dr. Sheila Greibach, Editor Ms. Marta Cervantes, Coordinator Material in this publication may not be reproduced without written permission of the Computer Science Department. Subscriptions to this publication are available at $20.00/year (three issues) by contacting Ms. Brenda Ramsey, UCLA Computer Science Department, 3713 Boelter Hall, Los Angeles, CA 90024-1596. THE UCLA COMPUTER SCIENCE DEPARTMENT QUARTERLY The Computer Science Department And Its People Fall Quarter 1987/Winter Quarter 1988 Vol. 16, No. 1 SCHOOL OF ENGINEERING AND APPLIED SCIENCE UNIVERSITY OF CALIFORNIA, LOS ANGELES Fall-Winfer CSD Quarterly CONTENTS COMPUTER SCIENCE AT UCLA AND COMPUTER SCIENCE IN THE UNITED STATES GeraldEstrin, Chair...................................................................................................... I THE UNIVERSITY CONTEXT .............................................................................................. 13 THE UCLA COMPUTER SCIENCE DEPARTMENT The Faculty A rane nf;ntraract Biographies ............................................................................................................................. -
JULY 14-15, 1980 SNOWBIRD, UTAH Princeton, NJ 08544 Charlottesville
MEETING OF CHAIRMEN OF PH.D. GRANTING DEPARTMENTS OF COMPUTER SCIENCE mJ JULY 14-15, 1980 SNOWBIRD, UTAH ATTENDANCE LIST Professor Donald Allison Professor Lee W. Cooprider Dept. of Computer Science Dept. of Computer Science Virginia Polytechnic Inst. Univ. of So. California and State University Los Angeles, CA 90007 Blacksburg, VA 24061 Profesor Saul Amarel Professor Jerome R. Cox, Jr. Dept. of Computer Science Dept. of Computer Science Rutgers University Washington University New Brunswick, NJ 08903 St. Louis, MO 63130 Professor Bruce W. Arden Professor Peter Denning EECS Dept., Eng. Quad. Dept. of Computer Science Princeton University Purdue University Princeton, NJ 08544 West Lafayette, IN 47907 Mr. Bruce Barnes Professor David P. Dobkin Div. Math. & CS. Dept. of Computer Science National Science Foundation The University of Arizona Washington, D.C. 20550 Tucson, AZ 85721 Professor Alan Batson Dr. George G. Dodd DAMACS, Thornton Hall Dept. of Computer University Science of Virginia General Motors Research Lab. Charlottesville, VA 22901 Warren, MI 48090 Professor John Brzozowski Dr. Richard Eckhouse, Jr. Dept. of Computer Science External Research Program University of Waterloo D.E.C.-ML 3/T4l Waterloo, Ontario 146 Main Street Canada N2L 3GI Maynard, MA 01754 Professor William G. Bulgren Professor Gerald Estrin Dept. of Computer Science Dept. of Computer Science University of Kansas 373 Boelter Hall Lawrence, KS 66045 Univ. of CA., Los Angeles Los Angeles, CA 90024 Professor B. F. Caviness Dr. Thelma Estrin Dept. of Math. Science Dept. of Computer Science R.P.I. Univ. of CA., Los Angeles Troy, NY 12181 Los Angeles, CA 90024 Professor S. -
Succinct Garbled RAM from Indistinguishablity Obfuscation
Succinct Garbled RAM from Indistinguishablity Obfuscation by Justin Lee Holmgren S.B., Massachusetts Institute of Technology (2013) Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 2015 ○c Massachusetts Institute of Technology 2015. All rights reserved. Author................................................................ Department of Electrical Engineering and Computer Science February 1, 2015 Certified by. Shafi Goldwasser RSA Professor of Electrical Engineering and Computer Science Thesis Supervisor Accepted by . Professor Albert R. Meyer Chairman, Masters of Engineering Thesis Committee 2 Succinct Garbled RAM from Indistinguishablity Obfuscation by Justin Lee Holmgren Submitted to the Department of Electrical Engineering and Computer Science on February 1, 2015, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract In this thesis, I give the first construction of a succinct garbling scheme forRAM programs. For a program requiring space S and time T to compute, the size of its garbling is O~(S) instead of poly(T ). This construction relies on the existence of indistinguishability obfuscation, as well as the existence of injective one-way functions. As a building block, I introduce and construct a primitive called asymmetrically constrained encryption (ACE). This primitive is an encryption system for which keys can be punctured on succinctly described sets of plaintexts. For programs acting on ACE-encrypted values, I give a natural and general condition for their obfuscations to be indistinguishable, using the fact that the encryption and decryption keys can be separately punctured. -
Curriculum Vitae
Curriculum Vitae Jens Groth July 11, 2021 1 Contact Information Jens Groth E-mail: [email protected] Homepage: www.cs.ucl.ac.uk/staff/J.Groth 2 Research Interests I am interested in the theory of cryptography and in the practical application of cryptographic techniques. 3 Appointments DFINITY London, UK July 2021 { present. Director of Research Febuary 2021 { June 2021 Team Lead, Research January 2019 { January 2021 Principal Researcher University College London London, UK July 2020 { present. Honorary Professor in the Department of Computer Science. October 2015 { June 2020. Professor of Cryptology in the Department of Computer Science. October 2012 { September 2015. Reader in Cryptology in the Department of Computer Science. October 2010 { September 2012. Senior Lecturer in the Department of Computer Science. September 2007 { September 2010. Lecturer in the Department of Computer Science. University of California, Los Angeles Los Angeles, US February 2005 { August 2007. Postdoctoral Employee at the Computer Science Department. Cryptomathic Arhus,˚ Denmark August 2001 { July 2004. Industrial PhD Student. 1 4 Education Aarhus University Aarhus, Denmark • PhD in Computer Science, December 2004. • Advisor: Professor Ivan Damg˚ard. • Thesis title: Honest Verifier Zero-Knowledge Proofs Applied. Danish Academy of Technical Sciences Aarhus, Denmark • Industrial Research Fellow, October 2004. • Advisor: Senior Systems Engineer, PhD Gorm Salomonsen. Aarhus University Aarhus, Denmark • MSc in Mathematics, April 2001. • Advisor: Professor Ivan Damg˚ard. • Thesis title: Non-malleable Public-Key Encryption Secure against Chosen Ciphertext At- tack based on Trapdoor Permutations. Aarhus University Aarhus, Denmark • Supplement in Philosophy, April 2001. 5 Awards and Distinctions • IACR Test-of-Time Award 2021 for Simulation-sound NIZK proofs for a practical language and constant size group signatures published at ASIACRYPT 2006. -
Efficient Non-Interactive Secure Computation
Efficient Non-Interactive Secure Computation Yuval Ishai1?, Eyal Kushilevitz1??, Rafail Ostrovsky2???, Manoj Prabhakaran3y, and Amit Sahai2z 1 Dept. of Computer Science, Technion, Haifa, Israel. 2 University of California, Los Angeles. 3 University of Illinois, Urbana-Champaign. Abstract. Suppose that a receiver R wishes to publish an encryption of her se- cret input x so that every sender S, holding an input y, can reveal f(x; y) to R by sending her a single message. This should be done while simultaneously pro- tecting the secrecy of y against a corrupted R and preventing a corrupted S from having an unfair influence on the output of R beyond what is allowed by f. When the parties are semi-honest, practical solutions can be based on Yao’s garbled circuit technique. However, for the general problem when the parties, or even S alone, may be malicious, all known polynomial-time solutions are highly inefficient. This is due in part to the fact that known solutions make a non-black-box use of cryptographic primitives, e.g., for providing non-interactive zero-knowledge proofs of statements involving cryptographic computations on secrets. Motivated by the above question, we consider the problem of secure two-party computation in a model that allows only parallel calls to an ideal oblivious trans- fer (OT) oracle with no additional interaction. We obtain the following results. – Feasibility. We present the first general protocols in this model which only make a black-box use of a pseudorandom generator (PRG). All previous OT- based protocols either make a non-black-box use of cryptographic primitives or require multiple rounds of interaction. -
Indistinguishability Obfuscation from Well-Founded Assumptions
Indistinguishability Obfuscation from Well-Founded Assumptions Aayush Jain* Huijia Lin† Amit Sahai‡ August 18, 2020 Abstract In this work, we show how to construct indistinguishability obfuscation from subexponential hardness of four well-founded assumptions. We prove: Theorem (Informal). Let τ (0, ), δ (0, 1),ǫ (0, 1) be arbitrary constants. As- ∈ ∞ ∈ ∈ sume sub-exponential security of the following assumptions, where λ is a security parameter, and the parameters ℓ,k,n below are large enough polynomials in λ: • the SXDH assumption on asymmetric bilinear groups of a prime order p = O(2λ), kǫ • the LWE assumption over Zp with subexponential modulus-to-noise ratio 2 , where k is the dimension of the LWE secret, • the LPN assumption over Zp with polynomially many LPN samples and error rate 1/ℓδ, where ℓ is the dimension of the LPN secret, • the existence of a Boolean PRG in NC0 with stretch n1+τ , Then, (subexponentially secure) indistinguishability obfuscation for all polynomial- size circuits exists. arXiv:2008.09317v1 [cs.CR] 21 Aug 2020 Further, assuming only polynomial security of the aforementioned assumptions, there exists collusion resistant public-key functional encryption for all polynomial- size circuits. *UCLA, Center for Encrypted Functionalities, and NTT Research. Email: [email protected]. †UW. Email: [email protected]. ‡UCLA, Center for Encrypted Functionalities. Email: [email protected]. Contents 1 Introduction 1 1.1 AssumptionsinMoreDetail. ... 2 1.2 OurIdeasinaNutshell............................. .. 3 2 Preliminaries 4 3 Definition of Structured-Seed PRG 7 4 Construction of Structured Seed PRG 8 5 Bootstrapping to Indistinguishability Obfuscation 20 5.1 PerturbationResilientGenerators . ........ 23 6 Acknowledgements 26 7 References 27 A Partially Hiding Functional Encryption 36 B Recap of constant-depth functional encryption 37 1 Introduction In this work, we study the notion of indistinguishability obfuscation (i ) for general O polynomial-size circuits [BGI+01a, GKR08, GGH+13b]. -
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics
This is a repository copy of Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics. White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/151333/ Version: Accepted Version Article: Kahrobaei, Delaram orcid.org/0000-0001-5467-7832, Wood, Alexander and Najarian, Kayvan (2020) Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics. ACM Comput. Surv.. ISSN 0360-0300 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics ALEXANDER WOOD∗, University of Michigan, United States KAYVAN NAJARIAN, University of Michigan, United States DELARAM KAHROBAEI, University of York, United Kingdom Machine learning and statistical techniques are powerful tools for analyzing large amounts of medical and genomic data. On the other hand, ethical concerns and privacy regulations prevent free sharing of this data. Encryption techniques such as fully homomorphic encryption (FHE) enable evaluation over encrypted data. Using FHE, machine learning models such as deep learning, decision trees, and naive Bayes have been implemented for privacy-preserving applications using medical data. -
The UCLA Fixed-Plus-Variable (F+V) Structure Computer
Reconfigurable Computer Origins: The UCLA Fixed-Plus-Variable (F+V) Structure Computer Gerald Estrin University of California at Los Angeles Gerald Estrin and his group at the University of California at Los Angeles did the earliest work on reconfigurable computer architectures. The early research, described here, provides pointers to work on models and tools for reconfigurable systems design and analysis. The earliest work on reconfigurable computer Pasta’s challenge architecture was done at the University of What triggered the UCLA work on reconfig- California at Los Angeles (UCLA), as a 1999 urable computer systems? In the spring of report in The Economist noted (see “The 1959, John Pasta, a highly respected applied Economist: Reconfigurable Systems Undergo mathematician and physicist and chairman of Revival” sidebar, p. 4). Clearly, in retrospect, the Mathematics and Computer Science digital technology was not ready for such a rev- Research Advisory Committee to the Atomic olutionary change. Now that digital technolo- Energy Commission, expressed concern about gy is enabling commercial realization, however, many vital computational problems whose the time seems right to tell this story. Of equal solutions were beyond the capabilities of exist- interest might be the saga of how a professor ing electronic computers. In his opinion, com- and his graduate students, in an academic set- mercial computer manufacturers had lost ting, can work on one complex problem over a interest in exploring risky, innovative comput- prolonged period and bring to the computer er architectures. Instead, the manufacturers science world original ideas that can them- wanted to serve the growing market for con- selves be commercially realized. -
Using Fully Homomorphic Hybrid Encryption to Minimize Non-Interative Zero-Knowledge Proofs
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Craig Gentry Jens Groth IBM T.J. Watson Research Center, U.S. University College London, U.K. [email protected] [email protected] Yuval Ishai Chris Peikert Technion, Israel Georgia Institute of Technology, U.S. [email protected] [email protected] Amit Sahai Adam Smith University of California Los Angeles, U.S. Pennsylvania State University, U.S. [email protected] [email protected] Abstract A non-interactive zero-knowledge (NIZK) proof can be used to demonstrate the truth of a statement without revealing anything else. It has been shown under standard cryptographic assumptions that NIZK proofs of membership exist for all languages in NP. While there is evidence that such proofs cannot be much shorter than the corresponding membership witnesses, all known NIZK proofs for NP languages are considerably longer than the witnesses. Soon after Gentry's construction of fully homomorphic encryption, several groups indepen- dently contemplated the use of hybrid encryption to optimize the size of NIZK proofs and dis- cussed this idea within the cryptographic community. This article formally explores this idea of using fully homomorphic hybrid encryption to optimize NIZK proofs and other related crypto- graphic primitives. We investigate the question of minimizing the communication overhead of NIZK proofs for NP and show that if fully homomorphic encryption exists then it is possible to get proofs that are roughly of the same size as the witnesses. Our technique consists in constructing a fully homomorphic hybrid encryption scheme with ciphertext size jmj+poly(k), where m is the plaintext and k is the security parameter. -
Computational Technology for Effective Health Care: Immediate Steps and Strategic Directions
Pre-publication copy – subject to further editorial correction _____________________________________________________________________________ Computational Technology for Effective Health Care: Immediate Steps and Strategic Directions William W. Stead and Herbert S. Lin, Editors Committee on Engaging the Computer Science Research Community in Health Care Informatics Computer Science and Telecommunications Board Division on Engineering and Physical Sciences EMBARGOED FROM PUBLIC RELEASE UNTIL 11:00 am, January 9, 2009 except with express permission from the National Research Council. THE NATIONAL ACADEMIES PRESS Washington, D.C. www.nap.edu Pre-publication copy – subject to further editorial correction _____________________________________________________________________________ THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support for this project was provided by the U.S. Department of Health and Human Services (Award Number N01-OD-04-2139, TO #182); the National Science Foundation (Award Number CNS-0638373); the Vanderbilt University Medical Center, Partners HealthCare System, the Robert Wood Johnson Foundation -
Embedded, Everywhere: a Research Agenda for Networked Systems of Embedded Computers (2001)
THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/10193 SHARE Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers (2001) DETAILS 235 pages | 6 x 9 | PAPERBACK ISBN 978-0-309-07568-8 | DOI 10.17226/10193 CONTRIBUTORS GET THIS BOOK Committee on Networked Systems of Embedded Computers; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council FIND RELATED TITLES SUGGESTED CITATION National Research Council 2001. Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers. Washington, DC: The National Academies Press. https://doi.org/10.17226/10193. Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers Embedded, Everywhere A Research Agenda for Networked Systems of Embedded Computers Committee on Networked Systems of Embedded Computers Computer Science and Telecommunications -
Db548ts0688.Pdf
1975 Anaheim Convention Center Anaheim, Table.—.--.—of Contents Computer California Conference May 19-22, 1975 General Chairman's Message 3 Technical Program Chairman's Message 4 Keynote Address 6 Conference Luncheon 7 v Special Address 8 Industry Luncheon 9 Harry Goode Memorial Award 10 __,_ Technical Sessions 1975 NATIONAL COMPUTER CONFERENCE Monday Afternoon 11 Sponsored by Tuesday Morning 18 Tuesday Afternoon 26 Tuesday Evening 35 a cmc a r- _, . Wednesday Morning 37 AMPS American Federation of Information Wednesday Afternoon 47 Processing Societies Thursday Morning 60 Thursday Afternoon 69 ACM Association for Computing Machinery Conference At A Glance 52 DPMA Data Processing Management Association Special Activities I pc i eee p„~„ . r. ■ Conference Receptions 78 lEEE-CS lEEE Computer Society Computer Science Fair 78 Computer bUbcr-c o :.*. Science Theatre 78 Society for Computer Simulation NCC Art Show 78 Computer Sound & Light Show 78 apidc __ General Conference Information AFIPS rntioTiTi CONSTITUENT SOCIETIES Conference Proceedings 79 A. AA American Institute of Aeronautics and M^sag^ter ZZZ. ZZZZZZZZZZ. ZZ. ...... Z. £ Astronautics Press Room 79 Room 79 AIPDA a Speaker Lounge, Registration & Practice .... Mii^rA American Institute of Certified Public Information Center 79 Accountants International Visitors Lounge 80 First-Aid Room 80 ASIS American Society for Information Science Ste Recordings- ...ZZZ ZZZ ZZZ ZZZ so ASA American Statistical Association AFIPS Officers and Board of Directors 80 ACL Association for Computational Linguistics NCC Board of Directors National Computer Conference Committee f82n ACM Association for Computing Machinery Industry Advisory Panel 83 AEDS Association for Educational Data Systems 1975 NCC Steering Committee 83 Technical Program Committee 83 Ur-MAnPMA a Data Processing Management Association Technical Program Area Directors 84 lEEE-CS lEEE Computer Society Exhibits Committee 86 , International Committee 86 HA1 1 A .