TPMPC 2024







The 10. Theory and Practice of Multi-Party Computation Workshop (TPMPC 2024) will be held in Darmstadt, Germany from Monday, June 3rd to Thursday, June 6th, 2024.

Location: TU Darmstadt, City Campus, Hochschulstr., 64289 Darmstadt, Germany

Registration 


Registration is open and can be done here. The deadline for registration is 12 May 2024, 11:59 PM (AoE).


For those requiring a visa invitation letter for travel, kindly send your request via email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the following subject: "Visa invitation letter: <Your name>"

Preliminary program 


The program consists of talks by invited speakers as well as several contributed talks and a rump session. The preliminary program is as follows. 

Monday, 3 June 2024

08:00-08:45: -------------------------------------------REGISTRATION-------------------------------------------------

08:45-09:00: -------------------------------------------OPENING REMARKS-------------------------------------------

09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------

09:00-09:50: Invited Talk - Distributed Discrete Logarithms and Applications, Part I.

Pierre Meyer (Aarhus University)

09:50-10:40: Invited Talk - Distributed Discrete Logarithms and Applications, Part II.

Lawrence Roy (Aarhus University)

10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------

11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------

11:10-11:35: Advanced FHE and MPC Protocols for the Blockchain.

Daniel Demmler (Zama)

11:35-12:00: Analysing Dutch public transport data with MPC.

Meilof Veeningen (Roseman Labs)

12:00-12:25: Integrating Sharemind MPC into Carbyne Stack.

Riivo Talviste (Cybernetica)

12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------

14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------

14:00-14:50: Invited Talk - Verifiable Homomorphic Secret Sharing.

Aarushi Goel (NTT Research)

14:50-15:15: Scalable Multiparty Computation from Non-linear Secret Sharing.

Mingyuan Wang (UC Berkley)

15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------

15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------

15:45-16:35: Invited Talk - Achieving Asynchronous MPC with Linear Communication and Optimal Resilience.

Yifan Song (Tsinghua University)

16:35-17:00: Perfect Asynchronous MPC with Linear Communication Overhead.

Arpita Patra (Indian Institute of Science)

17:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------

Tuesday, 4 June 2024

09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------

09:00-09:50: Invited Talk - A Bigger Picture of Secure Multi-Party Computation.

Marina Blanton (University of Buffalo)

09:50-10:15: Malicious Security for Sparse Private Histograms.

Lennart Braun (Aarhus University)

10:15-10:40: Willow: Secure Aggregation with Asynchronous Clients. 

Phillipp Schoppmann (Google)

10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------

11:10-12:25: -------------------------------------------SESSION 2: DIVERSITY EVENT-------------------------------

12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------

14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------

14:00-14:50: Invited Talk - Practical Secure Machine Learning.

Divya Gupta (Microsoft Research, India)

14:50-15:15: Sigma: Secure GPT Inference with Function Secret Sharing.

Neha Jawalkar (Indian Institute of Science)

15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------

15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------

15:45-16:35: Invited Talk - Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography. 

Wenting Zheng (Carnegie Mellon University)

16:35-17:00: Revitalizing Privacy-Preserving Machine Learning: Introducing FANNG-MPC for Actively Secure MLaaS.

Abdelrahaman Aly and Ajith Suresh (Technology Innovation Institute)

17:30-19:00 -------------------------------------------GUIDED TOUR TO MATHILDENHÖHE----------------------

19:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------

Wednesday, 5 June 2024

09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------

09:00-09:50: Invited Talk - On the round-complexity of secure multi-party computation.

Michele Ciampi (University of Edinburgh)

09:50-10:15: Rational Secure Computation: New Definitions and Constructions.

Siddharth Agarwal (Indian Institute of Science)

10:15-10:40: On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC. 

Jan Bobolz (University of Edinburgh)

10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------

11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------

11:10-12:00: Invited Talk - The Communication Complexity of Oblivious Transfer.

Nico Döttling (CISPA)

12:00-12:25: Multipars: Reduced-Communication MPC over Z2k.

Sebastian Hasler (University of Stuttgart)

12:25-12:35: -------------------------------------------GROUP PHOTO--------------------------------------------------

12:35-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------

14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------

14:00-14:50: Invited Talk - On Broadcast and Identifiability in MPC.

Divya Ravi (University of Amsterdam)

14:50-15:15: Distributed Randomness using Weighted VRFs. 

Benny Pinkas (Bar-Ilan University)

15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------

15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------

15:45-16:10: Garbling gadgets and its applications to oblivious garbling.

Rahul Satish (ITU Copenhagen)

16:10-16:35: Adaptive Distributional Security for Garbling Schemes with O(|x|) Online Complexity.

Kirthivaasan Puniamurthy (Aalto University)

16:35-17:00:Threshold Garbled Circuits with Low Overhead.

Schuyler Rosefield (Northeastern University)

17:00-17:45 -------------------------------------------INDUSTRY EVENT----------------------------------------------

17:45-20:00 -------------------------------------------RUMP SESSION AND DINNER--------------------------------

20:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------

Thursday, 6 June 2024

09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------

09:00-09:50: Invited Talk - Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity. 

Peihan Miao (Brown University)

09:50-10:15: Optimizing Preprocessing for Maliciously Secure MPC: Faster Matrix Multiplications and Convolutions without Sacrifice.

Marc Rivinius (University of Stuttgart)

10:15-10:40: Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. 

Nikolas Melissaris (Aarhus University)

10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------

11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------

11:10-12:00: Invited Talk - Private Set Union (PSU). 

Ni Trieu (Arizona State University)

12:00-12:25: Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.

Amit Agarwal (University of Illinois Urbana-Champaign)

12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------

14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------

14:00-14:25: Asterisk: Super-fast MPC with a Friend.

Protik Paul (Indian Institute of Science)

14:25-14:50: Preprocessing 4 Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.

Matan Hamilis (Reichman University)

14:50-15:15: Threshold ECDSA in Three Rounds.

Yashvanth Kondi (Silence Laboratories)

15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------

15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------

15:45-16:10: A lesson about the UC security of optimized MPC implementations.

Peter Scholl (Aarhus University)

16:10-16:35: Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.

Anasuya Acharya (Bar-Ilan University)

16:35-17:00: SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation.

Robin William Hundt (Technical University of Darmstadt)

17:00-17:10 -------------------------------------------CLOSING REMARKS----------------------------------------------

Student stipends


We have a limited number of stipends to support students to attend the workshop. Preference will be given to students who have limited funding from other sources (e.g., from institutions without access to large travel funds).


Accepted contributed talks

Invited speakers 

We are delighted to have talks from the following 12 confirmed invited speakers.

Marina Blanton (University at Buffalo)

Talk title: A Bigger Picture of Secure Multi-Party Computation

Abstract: Secure multi-party computation is a mature area that enables computation over private data. Products utilizing secure computation techniques are now increasingly being built by tech companies for privacy-preserving data analytics and other purposes. For many years, progress in this area has focused on mechanisms for securely realizing different functionalities, i.e., on how to perform secure function evaluation. In this talk, we argue that other aspects of privacy-preserving computation deserve the attention of the research community. They include ensuring the trustworthiness of inputs to the computation, achieving security of linked computations, and selecting functions to ensure that the (authorized) information disclosure from the output is limited. We investigate the last component in more detail on the example of average salary computation, inspired by the Boston privacy-preserving gender pay gap study carried out in 2015-2017.

Bio: Marina Blanton is an Associate Professor in the Department of Computer Science and Engineering at the University at Buffalo (UB). She also serves as the Faculty Director of Women in Science and Engineering (WiSE) program at UB. Dr. Blanton received her MS in EECS from Ohio University in 2002, MS in CS from Purdue University in 2004, and PhD in CS from Purdue University in 2007. Her research interests are centrally in information security, privacy, and applied cryptography and recent projects span areas such as secure computation and outsourcing, integrity of outsourced computation and storage, and private biometric and genomic computation. Dr. Blanton has over 80 refereed publications, has served on the technical program committees of top conferences such as USENIX Security, IEEE S&P, and CCS, and is currently an associate editor of IEEE Transactions on Dependable and Secure Computing. She has received multiple awards for her research, including a 2013 AFOSR Young Investigator Award, the 2015 ACM CCS Test of Time Award, and a 2018 Google Faculty Research Award.

Michele Ciampi (University of Edinburgh)

Talk title: On the round-complexity of secure multi-party computation

Abstract: In multi-party computation (MPC), multiple entities, each having some inputs want to jointly compute a function of these inputs with the guarantee that nothing aside from the output of the function will be leaked. In this talk, we are going to investigate how many messages the parties of an MPC need to exchange to securely realize any functionality with simulation-based security in the case where there is no setup and the majority of the parties can be corrupted. We will then consider a relaxation of the standard simulation-based paradigm, and show that this relaxation leads to more efficient MPC protocols that still realize non-trivial functionalities with meaningful security.

Bio: Michele Ciampi is a Chancellor’s Fellow (equivalent to Assistant Professor) at the School of Informatics at the University of Edinburgh. His work focuses on theoretical aspects of cryptography, including multi-party computation protocols, zero-knowledge proofs, and blockchain.

Talk title: The Communication Complexity of Oblivious Transfer

Abstract: Oblivious Transfer (OT) is the central primitive in the study of secure two-party computation; classical results in the area show that any secure two-party computation task can be realized from OT. However, until recently essentially all OT protocols (with very few exceptions) only achieved rate below 1/2. Here, the rate refers to the ratio between the communication size of the best insecure protocol and that of the protocol under consideration. The barrier at rate 1/2 is somewhat natural, as achieving OT with a rate above 1/2 implies highly desirable cryptographic concepts such as private information retrieval, which remain elusive from low-rate OT.

In this talk I will discuss a line of work which has led to communication-optimal OT protocols across a wide spectrum of assumptions and settings. Specifically, I will discuss the string-OT setting, the batch-OT setting as well as semi-honest security, statistical sender privacy and fully malicious security. A key concept pivotal to the development of communication-optimal OT is that of trapdoor hash functions, which have given rise to unexpected and compelling applications in their own right.

Bio: Nico Döttling is a tenured faculty at the Helmholtz Center for Information Security (CISPA) in Saarbrücken, where he leads a research group in the field of public-key cryptography and secure computation. After studying Computer Science at the Karlsruhe Institute of Technology (then Technical University of Karlsruhe), he finished his PhD in 2014 at the Karlsruhe Institute of Technology. His PhD thesis won the biennial Erika and Dr. Wolfgang Eichelberger Dissertation Award. After postdoctoral studies at Aarhus University and UC Berkeley, he joined Friedrich-Alexander-University Erlangen Nürnberg as an assistant professor in 2017 and CISPA as a tenure-track faculty in 2018. His research is currently supported by the European Union via an ERC Starting Grant for his project “Next-Generation Laconic Cryptography".

Aarushi Goel (NTT Research)

Talk title: Verifiable Homomorphic Secret Sharing

Abstract: A homomorphic secret sharing (HSS) scheme allows a client to delegate a computation to a group of untrusted servers while achieving input privacy as long as at least one server is honest. In recent years, many HSS schemes have been constructed that have, in turn, found numerous applications to cryptography. 

Prior work on HSS focuses on the setting where the servers are semi-honest. In our work, we lift HSS to the setting of malicious evaluators. We propose the notion of verifiable HSS (vHSS) that guarantees correctness of output even when all the servers are corrupted. vHSS retains all the attractive features of HSS and adds the new feature of succinct (public) verification of output. 

We present black-box constructions of vHSS by devising generic transformations for semi-honest HSS schemes (with negligible error). This provides a new non-interactive method for verifiable and private outsourcing of computation to a group of untrusted servers. 

This is joint work with Arka Rai Choudhuri, Aditya Hegde and Abhishek Jain.

Bio: Aarushi Goel is a postdoctoral researcher in the Cryptography and Information Security Lab at NTT Research, mentored by Sanjam Garg. Previously, she was a Ph.D. student at Johns Hopkins University, where she was advised by Abhishek Jain. Her research interests span broadly across cryptography and related areas of security and theoretical computer science. 

Divya Gupta (Microsoft Research India)

Talk title: Practical Secure Machine Learning

Abstract: With the rise of data silos, it is becoming increasingly important to enable private data collaboration, i.e., securely computing on data owned by different entities without any exchange or sharing of data in the clear. While theoretically, secure multiparty computation (MPC) enables this scenario with strong formal security guarantees, its general application suffers from many challenges, namely, performance, scalability and ease-of-use. In my talk, I will primarily focus on computations occurring in collaborative machine learning, namely, ML inference, training and validation. Over the last decade, the crypto and security communities have worked hard to address these challenges for secure machine learning. In fact, one of our recent works shows that secure inference has reached a tipping point: latency of secure inference for certain model classes matches that of cleartext. In another work, we improve the latency and scalability of secure transformer inference by more than an order of magnitude and enable secure inference of GPT-2 model in 1.6 seconds. My talk will discuss these recent developments, how we get there and what problems remain.

Bio: Divya Gupta is a Principal Researcher at Microsoft Research India. Her research interest is cryptography and its applications to security and privacy. Currently her work at MSR focusses on secure multiparty computation and blockchains, and in particular, making cryptography practical, usable, and performant. She has published several papers in top computer science conferences such as Crypto, Eurocrypt, IEEE S&P, ACM CCS, OSDI, and so on and holds 3 US Patents. Before joining MSR, she was a postdoc at UC Berkeley hosted by Sanjam Garg. She completed her PhD at University of California at Los Angeles with Amit Sahai. Her PhD dissertation was recognized by the Dissertation Fellowship and the Dimitris N. Chorafas Dissertation Award, given for outstanding work in engineering sciences, medicine and the natural sciences. She got her bachelors and masters degree in Computer Science and Engineering from Indian Institute of Technology, Delhi.  

Peihan Miao (Brown University)

Talk title: Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity

Abstract: Private set intersection (PSI) allows two mutually distrusting parties each holding a private set of elements, to learn the intersection of their sets without revealing anything beyond the intersection. Recent work by Badrinarayanan et al. (PoPETS'22) initiates the study of updatable PSI (UPSI), which allows the two parties to compute PSI on a regular basis with sets that constantly get updated, where both the computation and communication complexity only grow with the size of the small updates and not the large entire sets. However, there are several limitations of their presented protocols, which we address in this work.

We study UPSI in both the addition-only and addition-deletion settings. We present new protocols for both settings that support plain PSI as well as extended functionalities including PSI-Cardinality and PSI-Sum, achieving one-sided output with semi-honest security. In the addition-only setting, we also present a protocol for a more general functionality Circuit-PSI that outputs secret shares of the intersection. All of our protocols have worst-case computation and communication complexity that only grow with the set updates instead of the entire sets (except for a polylogarithmic factor). We implement our new UPSI protocols, which outperform the state-of-the-art protocols when the total set sizes are sufficiently large, the new updates are sufficiently small, or in networks with low bandwidth.

Based on joint work with Saikrishna Badrinarayanan, Xinyi Shi, Max Tromanhauser, and Ruida Zeng.

Bio: Peihan Miao is an assistant professor in the Department of Computer Science at Brown University. Her research interests lie broadly in cryptography, theory, and security, with a focus on secure multi-party computation. She received her PhD from the University of California, Berkeley in 2019. Before joining Brown, she had brief stints at the University of Illinois Chicago as an assistant professor and Visa Research as a staff research scientist. She is a recipient of a Meta Privacy Enhancing Technologies Award, Google Research Scholar Award, and Amazon Research Award.

Pierre Meyer and Lawrence Roy (Aarhus University)

Talk title: Distributed Discrete Logarithms and Applications, Part I / Part II

Abstract: In this two-parts talk we will introduce the "distributed discrete logarithm" problem (DDL) and present many of the exciting applications it has enabled in recent years. DDL is a crucial tool in recent share-conversion protocols and has enabled many exciting such as MPC with sub-linear complexity, homomorphic- and function secret-sharing, pseudorandom correlation generators, garbling, and more. We will give examples of DDL protocol from established assumptions, and dive into some of the applications.


Bio: Pierre Meyer is currently a Postdoc at Aarhus University, hosted by Claudio Orlandi. Previously, he completed his PhD at Reichman University and Université Paris Cité, advised by Elette Boyle and Geoffroy Couteau. His research mostly focuses on theoretical aspects of cryptography, and of MPC in particular.


Lawrence Roy is currently a postdoc at Aarhus University, Denmark. He completed his PhD at Oregon State University, advised by Mike Rosulek. His research interests include homomorphic secret sharing, oblivious transfer, and garbled circuits.


Divya Ravi (University of Amsterdam)

Talk title: On Broadcast and Identifiability in MPC

Abstract: Many existing deployments of Secure Multiparty Computation (MPC) protocols are susceptible to denial of service attacks unless they incorporate mechanisms to pinpoint cheating participants responsible for disruptions. However, identifying cheaters typically demands significant resources, which includes costly broadcast channels. Notably, use of broadcast is known to be necessary for unanimous identification of cheaters by all participants.

In this talk, we delve into the established correlations between the use of broadcast and identifiability within MPC protocols. Furthermore, we introduce a new notion of identifiability that does not require broadcast but nevertheless satisfies practical identifiability requirements.  Specifically, this notion enables an honest party to provably identify an attacker to any external auditor, even when the protocol operates solely over point-to-point channels. Additionally, our identification mechanism distinguishes between unresponsive participants and those actively deviating from the protocol, facilitating handling of such qualitative distinctions at higher logic levels. Finally, we demonstrate the application of this notion to a new honest majority ECDSA signing protocol that supports cheater identification.

Bio: Divya is currently an Assistant Professor at the University of Amsterdam, Netherlands. Prior to this, she was a postdoctoral researcher at the Aarhus Crypto group and completed her PhD at Indian Institute of Science, India. Her primary research interests include feasibility and efficiency of tasks related to secure MPC under various adversarial and network models. 

Ni Trieu (Arizona State University)

Talk title: Private Set Union (PSU)

Abstract: Private set intersection (PSI) and private set union (PSU) are two fundamental set operations with widespread applications in various privacy-sensitive contexts.  Over the last decade, a substantial body of research has focused on PSI, whereas PSU has received relatively little attention.  In this talk, I will review the existing literature on PSU protocols. Most recent PSU protocols have been tailored specifically for the two-party scenario, following the framework outlined by Kolesnikov et al. (Asiacrypt 2019) based on oblivious transfer (OT). Subsequently, I will present our new result on multi-party PSU (MPSU), enabling more than two parties to compute the union of their private datasets without revealing additional information. Our protocol avoids computationally expensive homomorphic operations or generic multi-party computation, thus providing an efficient solution for  MPSU. It  shows an improvement of up to $37.82\times$ in terms of running time and $389.85\times$ bandwidth cost compared to the existing state-of-the-art protocols.

Bio:  Ni Trieu is currently an Assistant Professor at Arizona State University (ASU). Her research interests lie in the area of cryptography and security, with a specific focus on secure computation and its applications such as private set operation, secure bio-computing. Her work has been published in top-tier Cryptography & Security conferences. She received my Ph.D. degree from Oregon State University. Before joining ASU, she was a postdoctoral researcher at UC Berkeley. 

Yifan Song (Tsinghua University)

Talk title: Achieving Asynchronous MPC with Linear Communication and Optimal Resilience

Abstract: Secure multiparty computation (MPC) allows a set of n parties to jointly compute a function over their private inputs. The seminal works of Ben-Or, Canetti and Goldreich [STOC '93] and Ben-Or, Kelmer and Rabin [PODC '94] settled the feasibility of MPC over asynchronous networks. Despite the significant line of work devoted to improving the communication complexity, current protocols with information-theoretic security and optimal resilience t<n/3 communicate \Omega(n^4C) field elements for a circuit with C multiplication gates. In contrast, synchronous MPC protocols with \Omega(nC) communication have long been known.

In this talk, I will introduce our recent progress that gives the first information-theoretic AMPC with communication complexity O(nC) field elements. Our construction is obtained from the following two results:

-       We first build an asynchronous complete secret-sharing (ACSS) protocol with linear communication complexity. ACSS allows a dealer to share a batch of Shamir sharings such that all parties eventually receive their shares. ACSS is an important building block in AMPC. We improve the previously best-known result by Choudhury and Patra [J. Cryptol '23], which requires O(n^3) elements per sharing, by a factor of n^2.

- We then provide a novel MPC protocol that makes black-box use of ACSS, where the cost per multiplication reduces to the cost of distributing a constant number of sharings via ACSS, improving a linear factor over the state of the art by Choudhury and Patra [IEEE Trans. Inf. Theory '17].

Bio: Yifan Song is an assistant professor at Tsinghua University. He received the Ph.D. degree from Carnegie Mellon University in 2022, advised by Prof. Vipul Goyal. Before that, he received the Bachelor degree from Yao Class at Tsinghua University in 2017. Yifan Song is generally interested in theoretical Cryptography and has a special focus on secure multiparty computation. He has published more than 10 papers in the top conferences of Cryptography. He was a committee member of Eurocrypt 2023 and PKC 2024, and served as an external reviewer for many top conferences in Cryptography.

Wenting Zheng (Carnegie Mellon University)

Talk title: Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography

Abstract: The recent revolution in advanced data analytics and machine learning have made it possible to extract unprecedented value from user data. However, this comes at the cost of user privacy in many application workflows. In this talk, I will discuss some ideas around building systems that enable privacy-preserving computation via a co-design of systems and cryptography. In the first part of the talk, I will present Bolt (IEEE S&P 2024), a new system for privacy-preserving two-party inference for a large language model like BERT using secure multiparty computation (MPC). With our system, a user can safely outsource prediction to a third party without revealing their sensitive data and or learning about the third party’s proprietary model parameters. In the second part, I will talk about building systems for democratizing cryptography. In Silph (IEEE S&P 2023), we develop a framework that can automatically compile a program written in a high-level language to an optimized, hybrid MPC protocol that mixes multiple MPC primitives securely and efficiently. This makes it possible for any programmer with no expertise in cryptography to create efficient MPC protocols from scratch.

Bio: Wenting Zheng is an assistant professor in the Computer Science Department at CMU. Her research interests are in computer systems, security, and applied cryptography. She aims to bridge the gap between theory and practice through a co-design of cryptography and systems. She does so by building practical cryptosystems with provable security guarantees, designing novel cryptographic primitives and protocols, and building systems for democratizing and accelerating cryptography. She is a recipient of NSF CAREER Award, Google Research Scholar Award, Distinguished Paper Award at IEEE Euro S&P, IBM PhD Fellowship, and Berkeley Fellowship. She obtained her Ph.D. in EECS from UC Berkeley.

Accommodation


We have negotiated special rates for TPMPC participants with the following two hotels in Darmstadt. We encourage you to reserve your rooms promptly to take advantage of these exclusive offers.


     Login ID: TU

     Password: tu

Organization 

Local Organizers

Administrative Organization

Program Committee

Steering Committee

Call for contributed talks (closed)

Submission Deadline: Mon, February 26, 2024, 23:59 (AoE)

Notification: Fri, March 22, 2024

The 10th TPMPC Workshop seeks submissions for contributed talks in the area of the theory and/or practice of secure multiparty computation. The workshop does not have proceedings and hence, the submission can be based on either work in progress, papers in submission, or papers already published at a conference, workshop or journal. Areas of interest broadly include

The TPMPC program committee will select talks with the aim of constructing a balanced program that will be of high interest to the audience.

Submission Details:


Sponsors

ERC Project PSOTI
DFG CRC CROSSING