*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************
The Cybersecurity Lecture Series is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.
Held weekly each Friday at Noon through Apr. 21, lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.
Complimentary lunch provided for registered guests. Please bring your own beverage.
Sign up to receive future lecture announcements.
ABSTRACT | Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human-compatible (HC) functions, password-authenticated key exchange (PAKE), commitment, and authenticated encryption. Chen will prove that HAKE protocols can remain secure under reasonable assumptions and will discuss efficient instantiations. He'll also propose a variant where users get help from a small device such as RSA SecurID. This allows implementation of an HC function with stronger security and weakens required assumptions on the PAKE. Overall, this leads to the very efficient HAKE, which can withstand strong corruptions.
BIO | Shan Chen is a Ph.D. student in the School of Computer Science at the Georgia Institute of Technology. His research interests are in the areas of cryptography and applied cryptography.