BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Drupal iCal API//EN
X-WR-CALNAME:Events items teaser
X-WR-TIMEZONE:America/Toronto
BEGIN:VTIMEZONE
TZID:America/Toronto
X-LIC-LOCATION:America/Toronto
BEGIN:DAYLIGHT
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:69cea1d8794c6
DTSTART;TZID=America/Toronto:20251119T103000
SEQUENCE:0
TRANSP:TRANSPARENT
DTEND;TZID=America/Toronto:20251119T113000
URL:https://uwaterloo.ca/combinatorics-and-optimization/events/crypto-readi
 ng-group-roy-stracovsky
SUMMARY:Crypto Reading Group -Roy Stracovsky
CLASS:PUBLIC
DESCRIPTION:TITLE:Enhancing Anamorphic Cryptography\n\nSpeaker\n Roy Straco
 vsky\n\nAffiliation\n Georgia Tech\n\nLocation\n MC 5479\n\nABSTRACT: Ana
 morphic cryptography (Persiano\, Phan\, and Yung\,\nEurocrypt 2022) allows
  users who share a “double key” to hide\nencrypted messages in ciphert
 exts and signatures to allow covert\ncommunication under a hypothetical 
 “dictator” who can monitor all\ncommunication or force parties to give
  up their cryptographic keys in\norder to check for compliance.\n\nIn this
  talk\, I will present joint work with Joseph Jaeger which\nenhances the s
 ecurity and functionality of anamorphic cryptography. We\nfirst enhance th
 e security of anamorphic signatures by proposing two\nparallel notions of 
 unforgeability (against the aforementioned\ndictator or instead a recipien
 t) which close gaps in existing\ndefinitions termed robustness (Banfi\, Ge
 gier\, Hirt\, Maurer\, and Rito\,\nEurocrypt 2024) and private anamorphism
  (Kutylowski\, Persiano\, Phan\,\nYung\, and Zawada\, Crypto 2023). Previo
 usly proposed anamorphic schemes\ndo not necessarily achieve our new defin
 itions but can sometimes be\nmade to do so by modifying the scheme or by l
 everaging stronger\nassumptions on the underlying building blocks. \nFor o
 ur second enhancement\, we introduce techniques to stealthily\nexchange ke
 ys via anamorphic cryptosystems\, allowing covert\ncommunication between u
 sers that do not a priori share a double key.\nWe propose and analyze mult
 iple protocols in a four-quadrant security\nmodel capturing passive versus
  active adversaries who may or may not\nperform key compromise.
DTSTAMP:20260402T170528Z
END:VEVENT
END:VCALENDAR