February 10th, Sunday 11:15, Room 570, Education Building
** NOTE SPECIAL TIME AND PLACE **
In recent years, malleable cryptographic primitives have advanced from
being seen as a weakness allowing for attacks, to being considered a
potentially useful feature. Malleable primitives are cryptographic
objects that allow for meaningful computations, as most notably in the
example of fully homomorphic encryption. Malleability is, however, a
notion that is difficult to capture both in the hand-written and the
formal security analysis of protocols.
In my work, I look at malleability from both angles. On one hand, it
is a source of worrying attacks that have, e.g., to be mitigated in a
verified implementation of the transport layer security (TLS) standard
used for securing the Internet. On the other hand, malleability is a
feature that helps to build efficient protocols, such as delegatable
anonymous credentials and fast and resource friendly proofs of
computations for smart metering. We are building a zero-knowledge
compiler for a high-level relational language (ZQL), that
systematically optimizes and verifies the use of such cryptographic
evidence.