{"id":330,"date":"2013-03-15T08:00:50","date_gmt":"2013-03-15T16:00:50","guid":{"rendered":"http:\/\/newwww.hmc.edu\/about-hmc\/?p=330"},"modified":"2014-08-21T13:20:38","modified_gmt":"2014-08-21T20:20:38","slug":"hmc-first-year-presents-paper-at-international-cryptography-conference","status":"publish","type":"post","link":"https:\/\/www.hmc.edu\/about\/2013\/03\/15\/hmc-first-year-presents-paper-at-international-cryptography-conference\/","title":{"rendered":"HMC First-year Presents Paper at International Cryptography Conference"},"content":{"rendered":"<div id=\"attachment_331\" style=\"width: 260px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.hmc.edu\/about\/wp-content\/uploads\/sites\/2\/2013\/03\/amzi-presents.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-331\" class=\"size-full wp-image-331\" alt=\"Amzi Jeffs '16 presenting his research at the Theory of Cryptography Conference in Tokyo\" src=\"https:\/\/www.hmc.edu\/about\/wp-content\/uploads\/sites\/2\/2013\/03\/amzi-presents.jpg\" width=\"250\" height=\"167\" \/><\/a><p id=\"caption-attachment-331\" class=\"wp-caption-text\">Amzi Jeffs &#8217;16 presenting his research at the Theory of Cryptography Conference in Tokyo<\/p><\/div>\n<p>Harvey Mudd College student Amzi Jeffs \u201916 presented his research on cryptography at the 10th annual Theory of Cryptography\u00a0Conference (TCC 2013), March 3-6 in Tokyo.<\/p>\n<p>The paper,\u00a0 \u201cCharacterizing the Cryptographic Properties\u00a0of Reactive 2-Party Functionalities,\u201d was co-authored with Mike Rosulek, assistant professor of Computer Science at\u00a0the University of Montana.<\/p>\n<p>Jeffs and Rosulek researched secure computation, a subfield of cryptography in which two parties perform joint computations without revealing their inputs to each other.<\/p>\n<p>\u201cImagine two people want to determine who has more money, but don\u2019t want to reveal how much money they have,\u201d said Jeffs. \u201cWe want to answer the question of how they can interact so that they get a correct answer, but neither one knows how much money the other has.\u201d<\/p>\n<div id=\"attachment_332\" style=\"width: 260px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.hmc.edu\/about\/wp-content\/uploads\/sites\/2\/2013\/03\/amzi-jeffs.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-332\" class=\"size-full wp-image-332\" alt=\"Jeffs' research addresses secure computational tasks\" src=\"https:\/\/www.hmc.edu\/about\/wp-content\/uploads\/sites\/2\/2013\/03\/amzi-jeffs.jpg\" width=\"250\" height=\"167\" \/><\/a><p id=\"caption-attachment-332\" class=\"wp-caption-text\">Jeffs&#8217; research addresses secure computational tasks<\/p><\/div>\n<p>Jeffs and Rosulek looked at computation tasks and created a decision process that can determine whether a task can be carried out securely. Previous work on this topic addressed only simple tasks that use one set of data to compute one set of results. The new work addresses tasks that have several rounds of data inputs and outputs; these are more general tasks that process private information iteratively and selectively over time. Jeffs\u2019 and Rosulek\u2019s new results add to our understanding of how persistent information can be maintained, updated, kept secret and computed upon.<\/p>\n<p>\u201cOur result is purely theoretical,\u201d said Jeffs. \u201cThat is, its purpose is not to provide some specific application to the real world, but to expand the general understanding of cryptography.\u201d<\/p>\n<p>Jeffs became interested in cryptography during his senior year of high school while taking computer science theory classes at the University of Montana, Missoula. At the recommendation of Rosulek, he signed up for a cryptography course and enjoyed it immensely.<\/p>\n<p>Following high school graduation, Jeffs spent the summer of 2012 doing research with Rosulek that culminated in the invitation to present at the TCC 2013 in Tokyo.<\/p>\n<p>\u201cAmzi was able to get up to speed very quickly and familiarize himself with the prior work in this area,\u201d said Rosulek. \u201cHe developed a great intuition about the nature of the problem and had some very productive insights that eventually led to the final result.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Harvey Mudd College student Amzi Jeffs \u201916 presented his research on cryptography at the 10th annual Theory of Cryptography\u00a0Conference (TCC [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[30],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-students"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":0,"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hmc.edu\/about\/wp-json\/wp\/v2\/categories?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}