Workshop On Multi-Party Secure Protocols June 16--18th, Ziskind Building, Room 1 Weizmann Institute of Science PRELIMINARY PROGRAM OF WORKSHOP All talks will be held at Room Number 1, Ziskind Building, Weizmann Institute. Tuesday, June 16th ---------------- 9:30--10:00 Registeration and Coffee 10:00--11:00 Shafi Goldwasser, Birds Eye View of Multi Party Secure Protocols 11:00--11:30 Coffee Break 11:30--1:00 Ran Canetti, On the Fundamentals of secure multiparty protocols I: Definitions of Security and Compositions 1:00--2:30 Lunch (Served near lecture hall for Invitees) 2:30--3:30 Ran Canetti, On the Foundamentals of secure multiparty protocols II: Constructions of Secure Multi-Party Protocols in Information Theoretic Setting 3:30--4:20 Mike Reiter, Toward Survivable Systems 4:25--4:55 Coffee Break 4:55--5:45 Ran Canetti, On the Foundamentals of secure multiparty protocols III: Construnctions of Secure Multi-Party Protocols in Computational Setting 6:00 Cocktail Party Wednesday, June 17th -------------------- 10:00--10:50 Silvio Micali, Secure Protocols with Invisible Trusted Parties 10:50--11:20 Coffee Break 11:20--12:10 Michael Ben Or, Secure Multiparty Computation and Fault-Tolerant Quantum Computation 12:10--1:00 Claude Creapau, Ups and Downs of Quantum Cryptographic Protocols 1:00--2:30 Lunch (Served near lecture hall for Invitees) 2:30--3:20 Adi Shamir, Multiuser Steganographic File Systems 3:20--4:00 Benny Pinkas, Distributed Key Distribution Center 4:00--4:30 Coffee Break 4:30-5:30 Amir Herzberg, Applications of Crypto and Multi-Party Computations to E-Commerce 7:30 Dinner at Taboon in Jaffa Port (a bus will leave from San Martin at 6:30) Thursday, June 18th ------------------- 10:00--10:50 Ronald Cramer, Span Programs with Multiplication 10:50--11:20 Coffee Break 11:20--12:10 Ivan Damgaard, Multi-Computations against Non-Threshold Adversaries 12:10--1:00 Michael Waidner, Extensions to Multi-Party Computations 1:00--2:30 Lunch (Served near lecture hall for Invitees) 2:30--3:20 Erez Petrank, Zero Knowledge on the Net 3:20--3:50 Martin Hirt, Trading Correctness for Privacy 3:50--4:20 Coffee Break 4:20--4:50 Moti Yung, Distributed Robust RSA key generation. 4:50--5:40 Moni Naor, The Timing Model for Designing Concurrent Protocols