The 32nd IPP Symposium

Trusted Computing: Academia Meets Industry

Anna Lysyanskaya, Brown University

In this talk, I will give an overview of how fundamental problems in theoretical cryptography have found applications in practice, and in particular, in the TCG efforts. I will then review some current key research challenges.

The question I will then discuss in more detail is who trusts who in trusted computing. Is a user of a given application a friend who needs protection from malicious software, or a foe from whom this application needs to be protected? I will outline the pros and cons of both approaches, and explain why I believe this question to be important for computer industry and intriguing for Academia.

Bio:

Professor Anna Lysyanskaya's research interests are in cryptography, computer security, and theory of computation. She earned a Ph.D. from MIT in 2002, and also holds an S.M. from MIT (1999) and an A.B. from Smith College (1997). Her work has had significant impact on security industry. Jointly with Dr. Jan Camenisch (IBM Zurich), she invented a practical algorithm that makes it possible to demonstrate possession of a certificate without revealing the certificate itself. This algorithm has recently been adopted by the TCG industry standard. She has published extensively and served on program committees of the major cryptography conferences. She has taught cryptography and computer security courses at MIT and at Brown University.