TPMPC 2019

TPMPC 2019 will be held at Bar-Ilan University (in the Tel Aviv area) from June 17 to June 20. Transportation will be provided from some select Tel Aviv hotels to Bar-Ilan in the morning and back at the end of the day, for those interested in staying in Tel Aviv.

More details will be posted on this page as we get closer to the event.

Registration
The registration fee for TPMPC 2019 is $150 (USD). Please register at the TPMPC 2019 registration page.

Venue
The exact location of the workshop is in the Nanotechnology Building (building number 206) at Bar-Ilan University (map). Please note that photo ID (passport or drivers license) is needed to enter the campus.

We recommend staying at a hotel in Tel-Aviv; we will provide transportation to the conference at Bar-Ilan and back every day. 

We have a special rate at the Atlas hotel chain for the Yam, Tal by the Beach, Melody and Shalom & Relax hotels. The prices per night including breakfast are: 730NIS-single and 780NIS-double at the Yam hotel; 800NIS-single and 870NIS-double at Tal by the Beach and at Melody (100NIS more for a superior room); and 840NIS-single and 930NIS-double at Shalom & Relax (100NIS more for a superior room).  
Please make your booking via https://www.atlas.co.il and use the Promo Code TPMPC2019. 

For those who wish other options, the Hilton, Carlton and Grand Beach hotels are in the area.

Buses will pick participants up from the Tal by the Beach and Shalom & Relax hotels every morning, and will return participants there at the end of every day. (Note that all of the above hotels are close to these two pick-up points.) The buses will leave approximately 1 hour before the talks begin each day. Exact times will be given closer to the workshop, and to those who sign up for the bus.

Program
The full workshop program appears here. In order to see more details regarding the speakers and co-authors, see the lists of invited speakers and contributed talks below.

Confirmed Invited Speakers
  • Marina Blanton (University at Buffalo, USA): Efficient Building Blocks For Secure Computation Based On Secret Sharing
  • Elette Boyle (IDC, Israel): Beaver Meets FSS: Secure Computation with Preprocessing via Function Secret Sharing
  • Ran Canetti (Tel-Aviv University, Israel and Boston University, USA): Fully Deniable Encryption and Multiparty Computation
  • Ivan Damgård (Aarhus University, Denmark): Communication Lower Bounds for Statistically Secure MPC,  with or without Preprocessing
  • Shai Halevi (IBM T.J. Watson, USA): Compressible FHE with Applications to PIR
  • Marcella Hastings (University of Pennsylvania, USA): Lessons From A Survey Of General-Purpose Frameworks For Secure Multi-Party Computation
  • Yehuda Lindell (Bar-Ilan University, Israel): Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest 
  • Tal Malkin (Columbia University, USA): Garbled Neural Networks are Practical
  • Arpita Patra (Indian Institute of Science Bangalore, India): The Round Complexity Landscape of Secure  Computation
  • Thomas Schneider (Technische Universität Darmstadt, Germany): Private Function Evaluation - From Functions to Data to Code
List of Accepted Contributed Talks

Title: Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Authors: Phillipp Schoppmann (Humboldt-Universität zu Berlin), Adrià Gascón (The Alan Turing Institute / University of Warwick), Mariana Raykova (Google), and Benny Pinkas (Bar-Ilan University)
Speaker: Phillipp Schoppmann

Title: MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Authors: Dragos Rotaru (University of Bristol, KU Leuven) and Tim Wood (University of Bristol, KU Leuven)
Speaker: Dragos Rotaru

Title: Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
Authors: Leonid Reyzin (Boston University), Adam Smith (Boston University) and Sophia Yakoubov (Boston University)
Speaker: Sophia Yakoubov

Title: Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Authors: Adi Akavia (University of Haifa), Craig Gentry (IBM Research), Shai Halevi (IBM Research) and Max Leibovich (University of Haifa).
Speaker: Max Leibovich

Title: On Writing and Reading MPC Security Proofs: An Explorational Study of State Separation
Authors: Chris Brzuska (Aalton University) and Sabine Oechsner (Aarhus University)
Speaker: Sabine Oechsner

Title: Robust MPC: Asynchronous Responsiveness yet Synchronous Security
Authors: Chen-Da Liu-Zhang (ETH Zurich), Julian Loss (Ruhr-University Bochum), Ueli Maurer (ETH Zurich), Tal Moran (IDC Herzliya), and Daniel Tschudi (Aarhus University)
Speaker: Chen-Da Liu-Zhang

TitleMPC with Silent Preprocessing or (or: Two-Round OT Extension from LPN)
Authors: Elette Boyle (IDC Herzliya), Geoffroy Couteau (KIT), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion), Lisa Kohl (KIT), Peter Rindal (Visa Research) and Peter Scholl (Aarhus University)
Speaker: Peter Scholl

Title: Adaptively Secure MPC with Sublinear Communication Complexity
Authors: Ran Cohen (Boston University and Northeastern University), abhi shelat (Northeastern University) and Daniel Wichs (Northeastern University)
Speaker: abhi shelat

Title: Trapdoor Hash Functions and Applications: Rate-1 OT and More
Authors: Nico Döttling (CISPA Helmholtz Center), Sanjam Garg (UC Berkeley), Yuval Ishai (Technion), Giulio Molavolta (Carnegie Mellon University), Tamer Mour (Weizmann Institute of Science), and Rafail Ostrovsky (UC Los Angeles)
Speaker: Tamer Mour

Title: New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Authors:   Ivan Damgård (Aarhus University), Daniel Escudero (Aarhus University), Tore Frederiksen (Alexandria Institute), Marcel Keller (Data61, CSIRO), Peter Scholl (Aarhus University), and Nikolaj Volgushev (Alexandria Institute)
Speaker: Daniel Escudero

Title: Applying MPC for Genotype Analysis While Considering Population Stratification
Authors: Andre Ostrak (Cybernetica AS, University of Tartu), Jaak Randmets (Cybernetica AS), Ville Sokk (Cybernetica AS), Sven Laur (University of Tartu) and Liina Kamm (Cybernetica AS)
Speaker: Liina Kamm

Title: Secure multiparty PageRank algorithm for collaborative fraud detection
Authors: Alex Sangers (TNO), Maran van Heesch (TNO), Thomas Attema (TNO,CWI,Leiden University), Thijs Veugen (TNO,CWI), Mark Wiggerman (ABN AMRO), Jan Veldsink (Rabobank), Oscar Bloemen (ING), and Daniël Worm (TNO)
Speaker: Thomas Attema

Title: Overview on Topology-Hiding Computation
Authors: Daniel Tschudi (Aarhus University)
Speaker: Daniel Tschudi

Title: The Privacy Blanket of the Shuffle Model
Authors: Borja Balle (independent), James Bell (Alan Turing Institute), Adria Gascon (Alan Turing Institute/Warwick University), and Kobbi Nissim (Georgetown University)
Speaker: James Bell

Title: Two Round Information-Theoretic MPC with Malicious Security
Authors: Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Speaker: Aarushi Goel

Title: Two-Round Oblivious Transfer from CDH or LPN
Authors: Nico Döttling (CISPA Helmholtz Center for Information Security), Sanjam Garg (UC Berkeley), Mohammad Hajiabadi (UC Berkeley), Daniel Masny (Visa Research), and Daniel Wichs (Northeastern University)
Speaker: Daniel Masny

Title: MonZa: Fast Maliciously-Secure Two-Party Computation on the ring Z_2^k
Authors: Dario Catalano e Mario Di Raimondo (Università di Catania), Dario Fiore (IMDEA Software Institute), and Irene Giacomelli (ISI Foundation)
Speaker: Irene Giacomelli

Title: SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Authors: Benny Pinkas (Bar-Ilan University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University) and Avishay Yanai (Bar-Ilan University)
Speaker: Avishay Yanai

Title: Reducing the Memory Overhead of Garbled Circuits
Authors: Valery Osheter (Unbound Tech) and Samuel Ranellucci (Unbound Tech)
Speaker: Samuel Ranellucci

Title: Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Authors: Emmanuela Orsini (imec-COSIC, KU Leuven), Nigel P. Smart  (imec-COSIC, KU Leuven, and University of Bristol), Frederik Vercauteren (imec-COSIC, KU Leuven)
Speaker: Emmanuela Orsini

Title: Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Authors: Cheng Hong (Alibaba Group), Jonathan Katz (University of Maryland), Vlad Kolesnikov (Georgia Tech), Wen-jie Lu (University of Tsukuba), and Xiao Wang (MIT and BU)
Speaker: Vlad Kolesnikov

Title: Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Authors: Frank Blom (TU Eindhoven), Niek J. Bouman (TU Eindhoven), Berry Schoenmakers (TU Eindhoven), and Niels de Vreede (TU Eindhoven)
Speaker: Frank Blom

Title: Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Authors: Carsten Baum (Bar-Ilan University) and Ariel Nof (Bar-Ilan University)
Speaker: Ariel Nof

Title: Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets
Authors: Adi Akavia (University of Haifa), Dan Feldman (University of Haifa) and Hayim Shaul (University of Haifa)
Speaker: Hayim Shaul

Title: Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Authors: Daniele Cozzo (KU Leuven), Carsten Baum (Bar-Ilan University), and Nigel P. Smart (KU Leuven and University of Bristol)
Speaker: Daniele Cozzo

Title: Transputation: Transport Framework for Secure Computation
Authors: Markus Brandt (Fraunhofer SIT and TU Darmstadt), Claudio Orlandi (Aarhus University), Kris Shrishak (TU Darmstadt), and Haya Shulman (Fraunhofer SIT and TU Darmstadt)
Speaker: Haya Shulman

Title: Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
Authors: Ignacio Cascudo (Aalborg University), Ivan Damgård (Aarhus University), Bernardo David (IT University of Copenhagen), Nico Döttling (Saarland), Rafael Dowsley (Bar-Ilan University) and Irene Giacomelli (ISI Foundation)
Speaker: Rafael Dowsley


Rump Session
A rump session will be held at the workshop and participants are invited to present their work there. We welcome both amusing and serious presentations at the rump session, and students are especially encouraged to present their work. Details on rump session submissions will be published closer to the event.

Call for Contributed Talks (closed)
TPMPC solicits contributed talks in the area of the theory and/or practice of secure multiparty computation. Talks can include papers published recently in top conferences, or work yet to be published. Areas of interest include
  • Theoretical foundations of multiparty computation: feasibility, assumptions, asymptotic efficiency, etc.
  • Efficient MPC protocols for general or specific tasks of interest
  • Implementations and applications of MPC
The TPMPC steering committee will select talks with the aim of constructing a balanced program that will be of interest to the audience. 

Details regarding contributed talks and submissions:
  • Contributed talks will be 20-30 minutes. 
  • The deadline for contributed talks is February 23 2019.
  • Please submit a short abstract (up to five pages, but preferably just one) of your proposed talk via the submission system: https://secure.iacr.org/websubrev/tpmpc2019/submit/index.php. If your talk is an already published work, please include a link and information about where it was presented.
  • Notifications will be sent out no later than March 25 2019.
The program committee who will choose the talks is the TPMPC organization committee, consisting of Ivan Damgård, Yehuda Lindell, Jesper Buus Nielsen, Claudio Orlandi, Mike Rosulek, Thomas Schneider, and Nigel Smart.

Scientific Organization
  • Yehuda Lindell, Bar-Ilan University
Administrative Organization
  • Yonit Homburger (yonit.homburger@biu.ac.il)
Comments