BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:IC Colloquium: Could Anonymity be a Myth?
DTSTART:20231218T161500
DTEND:20231218T173000
DTSTAMP:20260414T111003Z
UID:82b12b65d35b419bdd6d8c6c585ca35c07ccc13ba1f365e388fd9d88
CATEGORIES:Conferences - Seminars
DESCRIPTION:By: Yvo Desmedt - University of Texas at Dallas\nVideo of his 
 talk\n\nAbstract\nChaum's 1980's Dining Cryptographers and Chaum's MIX are
  very well known approaches towards anonymity. At that time it was not cus
 tomary for cryptographers to model the security goal. So\, Chaum never mod
 eled anonymity. Afterwards researchers were building on top of Chaum's sol
 ution\, but were not looking back at the foundations of anonymity. We show
  that there are message probabilities for which anonymity is completely im
 possible. Moreover\, we show that sometimes Chaum's solutions are not opti
 mal and leak information about the sender/receiver.\n\nThis paper appeared
  in IEEE Tr. on Information Theory 2019.\n\n*Note*: This talk is open to a
 nyone familiar only with probability theory.\n\nBio\nYvo Desmedt is the Jo
 nsson Distinguished Professor at the University of Texas at Dallas\, a Fel
 low of the International Association of Cryptologic Research (IACR) and a 
 Member of the Belgium Royal Academy of Science. He received his Ph.D. (198
 4\, Summa cum Laude) from the University of Leuven\, Belgium. He held posi
 tions at: Universite de Montreal\, University of Wisconsin - Milwaukee (fo
 unding director of the Center for Cryptography\, Computer and Network Secu
 rity)\, and Florida State University (Director of the Laboratory of Securi
 ty and Assurance in Information Technology). He was BT Chair\, Chair of In
 formation Communication Technology at University College London and lately
  Honorary Professor.  He has held numerous visiting appointments. He is t
 he Editor-in-Chief of IET Information Security and Chair of the Steering C
 ommittee of CANS.  He was Program Chair of e.g.\, Crypto 1994\, the ACM W
 orkshop on Scientific Aspects of Cyber Terrorism 2002\, and ISC 2013. He h
 as authored over 200 refereed papers\, primarily on cryptography\, compute
 r security\, and network security. He has made important predictions\, suc
 h as his 1983 technical description how cyber could be used to attack cont
 rol systems (realized by Stuxnet)\, and his 1996 prediction hackers will t
 arget Certifying Authorities (DigiNotar was targeted in 2011). He also aut
 hored the first paper on Hardware Trojan (Proc. Crypto 1986) and posed sea
 rchable encryption as an open problem in 1993 (NSPW). He was requested to 
 give feedback on: the report by the US Presidential Commission on Critical
  Infrastructures Protection\, the list of Top 10 Scientific Issues Concern
 ing Development of Human Society (China)\, and gave feedback on some US NI
 ST standards. He suggested that NIST makes a Threshold Cryptography standa
 rd.\n\nMore information
LOCATION:BC 420 https://plan.epfl.ch/?room==BC%20420 https://epfl.zoom.us/
 j/61642114618
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
