Gaurav Sharma

Author's posts

Dec 11

Seminar: Rajeev Anand Sahu “Strong Designated Verifier Signcryption” (Dec 12, 2018)

Dec 12, 2018 – 13.00 – room P.2NO8.08

Speaker: Rajeev Anand Sahu (ULB)

Title: “Strong Designated Verifier Signcryption”
Short abstract: “Recall two important cryptographic primitives: Strong designated verifier signature
(SDVS), which can be verified only by the designated receiver, and Signcryption, which is a hybrid cryptographic primitive that offers functionality of both digital signature and encryption in a single phase. Signcryption is useful for electronic transactions where authentication and privacy both are desired together, for example in secure routing, multi-cast key distribution etc. However, in a usual SDVS, the message is always sent with the signature, which is not desired for classified messages. Instead, to ensure the confidentiality of the message an encryption can be used. On the other hand in a signcryption scheme a designated authentication may require for special needs. To address this issue, we combine these two primitives SDVS and Signcryption, and propose a condensed construction of strong designated verifier signcryption (SDVSigncryption) scheme. The protocol enjoys all properties of the individual primitives. The scheme uses functionalities of bilinear pairing and has been designed on the identity-based setting to avoid key management overhead. Security of the scheme has been realized over the standard assumption, the hardness of computational bilinear Diffie-Hellman problem (CBDHP).”

Dec 03

Seminar: Gaurav Sharma “Security Threats on NoC-based MPSoCs” (Dec 05, 2018)

Dec 05, 2018 – 13.00 – room P.2NO8.08

Speaker: Gaurav Sharma (ULB)

Title: “Security Threats on NoC-based MPSoCs”
Short abstract: “The target applications are spread on a multi-processor system-on-chip (MPSoC) platform to enhance performance. The peer interaction of IP cores invite several security vulnerabilities. Our investigation is mainly focused on isolating computation and communication resources for sensitive applications. A relative study of existing approaches is presented during this talk. Furthermore, we analyze how software defined networking (SDN) approach can be a viable solution to ensure security in such systems.”

Nov 19

Seminar: Suman Bala “Searching over Encrypted Emails” (Nov 21, 2018)

Nov 21, 2018 – 13.00 – room P.2NO8.08

Speaker: Suman Bala (ULB)

Title: “Searching over Encrypted Emails”
Short abstract: “Searching over outsourced encrypted data is challenging while preserving realistic communication, computation and storage overhead. E-mail encryption has been a long-standing issue of usable security. The users, who archive email messages in outsourced storage will not only wants to hide the contents of the archived messages from anyone especially the server but also wants to search over them if the need arises. Various solutions will be addressed for their adoption and usability in the case of email system.”

Nov 12

Seminar: Ankan Pal “Mathematics of Post-Quantum Cryptography” (Nov 22, 2018)

Nov 22, 2018 – 11.00 – room P.2NO8.08

Speaker: Ankan Pal (University of L’Aquila)

Title: “Mathematics of Post-Quantum Cryptography”
Short abstract: “Since the last decade, the Post-Quantum (PQ) Cryptography has drawn attention of researchers due to its resistance against the upcoming quantum threats. As the security of many classical and popular cryptosystems are based on the intractability of the underlying hard mathematical problems, in a permissible amount of time, it is of worth interest to investigate the difficulty of solution of those problems in classical era versus quantum era. This talk also aims to explore distinguished mathematical properties which support cryptographic primitives as candidate post-quantum cryptosystems, for example Isogeny-Based Elliptic Curve Cryptography, Lattice-Based Cryptography. Lastly, this talk intend to address some methods from Algebraic Geometry to attack ECDLP.”

Nov 12

Seminar: Soultana Ellinidou “SDNoC: A new NoC alternative” (Nov 14, 2018)

Nov 14, 2018 – 13.00 – room P.2NO8.08

Speaker: Soultana Ellinidou (ULB)

Title: “SDNoC: A new NoC alternative”
Short abstract: “As the number of processors and cores on a single chip is increasingly dramatically, the communication among them is of bigger concern. SDNoC is a NoC alternative able to solve the scalability issues by bringing Software Defined Network approach within Hardware. However it also brought a lot of new threats into hardware.”

Nov 05

Seminar: Helena Bruyninckx “Quantum Key Recycling Scheme based on qubits” (Nov 7, 2018)

Nov 7, 2018 – 13.00 – room P.2NO8.08

Speaker: Helena Bruyninckx (ULB)

Title: “Quantum Key Recycling Scheme based on qubits”
Short abstract: “Quantum Key Recycling Schemes encode information into quantum states, such that the detection of eavesdropping is made possible. In case no eavesdropping was detected, the secret shared key can be safely re-used which is impossible for classical encryption schemes like the one-time pad. In this talk, we discuss a Quantum Key Recycling Scheme for classical messages and compare it to previous schemes.”

Oct 23

Seminar: Veronika Kuchta “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions” (Oct 24, 2018)

Oct 24, 2018 – 13.00 – room P.2NO8.08

Speaker: Veronika Kuchta (Monash University)

Title: “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions”
Short abstract: “We present a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which enables the public to verify if two or more signatures were generated by same signer, whilst still preserving her anonymity. The L2RS provides unconditional anonymity and security guarantees under the Ring Short Integer Solution (Ring-SIS) lattice hard- ness assumption. The proposed L2RS scheme is extended to be applied in a protocol that we called Lattice Ring Confidential transaction (Lattice RingCT) RingCT, which forms the foundation of the privacy-preserving protocol in any post-quantum secure cryptocurrency such as Hcash. We also present and extension of Lattice RingCT supporting Multiple-Input and Multiple-Output wallet transactions.”

May 23

Seminar: Frédéric LAFITTE “Differential properties of ARX ciphers with CryptoSAT” (May 23, 2018)

May 23, 2018 – 12.30 – room P.2NO8.08

Speaker: Frédéric LAFITTE (ULB)

Title: “Differential properties of ARX ciphers with CryptoSAT”
Short abstract: “This seminar focuses on symmetric key primitives of the ARX family. The cryptographic strength of ARX primitives comes from the combination of incompatible operators: modular addition, rotation with constant amplitude, and bit-wise exclusive OR. Despite their popularity, the resistance of ARX primitives against differential cryptanalysis is not as well understood as that of other ciphers for which design strategies allow to bound the probability of a successful attack. We show that CryptoSAT, a tool for SAT-based cryptanalysis, can be used for the verification of differential properties of ARX ciphers without sacrificing its usability.”

May 07

Seminar: Gaurav Sharma “Secure Communication on MPSoC” (May 09, 2018)

May 09, 2018 – 12.30 – room P.2NO8.08

Speaker: Gaurav Sharma (ULB)

Title: “Secure Communication on MPSoC”
Short abstract: “The recent elevation in complexity of System on Chip (SoC) needs multiple processing units to meet the latest demands. Multiple Processor System on Chip (MPSoC) is an emerging solution for this purpose. The rise in design and verification cost for complex integrated circuits and, in order to fulfill the demand of short time to market, many vendors leave the circuits vulnerable to security breaches. We are investigating to provide security of such systems with the help of affordable symmetric key cryptosystem.”

May 01

Seminar: Soultana Ellinidou “Secure SDN approach for a MPSoC platform” (May 02, 2018)

May 02, 2018 – 12.30 – room P.2NO8.08

Speaker: Soultana Ellinidou (ULB)

Title: “Secure SDN approach for a MPSoC platform”
Short abstract: “The rise of Internet of Things (IoT) and Internet of Everything (IoE) brings a wide variety of application in which traditional System on Chip (SoC) are not capable to support for that reason we propose a scalable MPSoC(Multi-Processor SoC) architecture. In order to split and address all that requirements inside our MpSoC platform we are leveraging on strategies developed within the field of Software Define Networking (SDN). SDN emerged to deal with the dynamic nature of future network functions and intelligent applications while lowering operating costs through simplifying hardware and providing flexibility on the communication inside our platform. Furthermore as far as the communication over the MPSoC platform is concerned, SDN turns the embedded system susceptible to security breaches for that reason as an initial step we will make a short introduction on the registration and authentication of our network entities by using ID-based and Group-based approach in order to provide a secure communication between them.”