Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Topics on Privacy and Public Auditability — Event 5

Featured topics: identity-based encryption (IBE), attribute-based encryption (ABE) and broadcast encryption

Structure: welcome; 3 invited talks; panel conversation.

Date and time: February 9th (Thursday), 2023, 12:00–15:50 EST

Location/format: virtual event over Webex video conference

Attendance: open and free to the public, upon registration (attendees can pose questions via chat / Q&A functionality)

Registration direct link:

Event schedule, Eastern Standard Time (GMT-5):

List of invited speakers or panelists:

  • Dan Boneh (Stanford University)
  • Melissa Chase (Microsoft Research)
  • Tanya Verma (Cloudflare)
  • Hoeteck Wee (NTT Research)

List of bios (provided by the speakers/panelists):

  • Dr. Boneh is a Professor of Computer Science at Stanford University where he heads the applied cryptography group and co-directs the Computer Security Lab.  Dr. Boneh's research focuses on applications of cryptography to computer security and blockchains.  He is the author of over 200 publications in the field, and is a recipient of the 2014 ACM prize and the 2013 Godel prize.  In 2016 he was elected to the National Academy of Engineering.
  • Melissa Chase is a principal researcher in the Cryptography and Privacy group at Microsoft Research Redmond. Her research focuses on defining and constructing and analyzing cryptographic protocols and primitives, with an emphasis on privacy-motivated applications. She has been at Microsoft for nearly 15 years; before that she received a B.S. in Computer Science and Mathematics from Harvey Mudd College, and an M.S. and Ph.D. in Computer Science from Brown University. She has worked in a variety of areas within cryptography and privacy, including anonymous credentials, electronic cash, attribute based encryption, and most recently problems in identity, transparency, and encrypted messaging.
  • Tanya Verma is a Research Engineer at Cloudflare, working as a systems engineer on projects involving applied cryptography engineering and privacy preserving protocols. Over the last two years, she has worked on a key management solution for Cloudflare that leverages Attribute Based Encryption to geographically restrict where keys can be accessed. Previously, she has worked on the design and implementation of Oblivious DNS over HTTPS. Recently, she has been working on privacy preserving federated learning, threshold signatures for TLS and delegated credentials. She has a B.S. in Computer Science from University of Illinois Urbana Champaign.
  • Hoeteck Wee is a cryptographer as well as a senior scientist at NTT Research and a CNRS researcher at ENS, Paris. He is the recipient of the NSF CAREER Award, Humboldt Research Fellowship, Google Faculty Award, and a ERC Starting Grant, as well as a contributor to the TLS 1.3 standard.

About STPPA: In the "Special Topics on Privacy and Public Auditability" series, the NIST privacy-enhancing cryptography (PEC) project hosts talks on various interconnected topics related to privacy and public auditability. The goal is to convey basic technical background, incite curiosity, suggest research questions and discuss applications, with an emphasis on the role of cryptographic tools.

Selected Presentations
February 9, 2023 Type
12:00 PM STPPA5 Welcome
Luís T. A. N. Brandão - NIST/Strativia

A brief presentation introducing the context of the PEC project and the STPPA series, and then giving details about the STPPA5 event: motivating the featured topics, presenting the schedule, and describing some logistic details about the virtual webinar.

[Slides] [Video]

12:10 PM Identity Based Encryption: an Overview
Dan Boneh - Stanford University

Identity Based Encryption: an Overview

[Slides] [Video]

1:00 PM Attribute-Based Encryption, Variants, and Pairing-Based Instantiations
Melissa Chase - Microsoft Research

Abstract: In traditional public key encryption systems, a message is encrypted under a particular public key, with the guarantee that it can only be decrypted by the party holding the corresponding secret key. Attribute based encryption (ABE), introduced by Sahai and Waters, instead allows us to use attributes to determine who has the power to decrypt. This talk will describe ABE and some of it’s variants along with the current state of the art in pairing-based instantiations.

[Slides] [Video]

2:10 PM Attribute-Based and Broadcast Encryption from Lattices
Hoeteck Wee - NTT Research

Abstract. I will provide a quick overview of the state-of-the-art lattice-based ABE and broadcast encryption schemes.

[Slides] [Video]

3:00 PM STPPA5 panel conversation on IBE, ABE and broadcast encryption
Dan Boneh - Stanford University
Luís T. A. N. Brandão - NIST/Strativia
Melissa Chase - Microsoft Research
René Peralta - NIST
Angela Robinson - NIST
Tanya Verma - Cloudflare
Hoeteck Wee - NTT Research

Panelists: Dan Boneh (Stanford University), Melissa Chase (Microsoft Research), Tanya Verma (Cloudflare), Hoeteck Wee (NTT Research).

Moderators: The NIST-PEC team: Luís Brandão, René Peralta, Angela Robinson.

Abstract. The panel conversation builds on the three invited talks at STPPA5, whose featured topics included identity-based encryption (IBE), attribute-based encryption (ABE) and broadcast encryption. The panel allows a further dive on reflections of use-cases for privacy and public auditability, feasibility and adoptability, quantum resistance versus unsafety, and challenges and opportunities for future development of recommendations, guidelines or standards.

[Slide] [Video]


Event Details

Starts: February 09, 2023 - 12:00 PM EST
Ends: February 09, 2023 - 04:00 PM EST

Format: Virtual Type: Webinar


Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other

Parent Project

See: Privacy-Enhancing Cryptography

Related Topics

Security and Privacy: cryptography

Created December 28, 2022, Updated March 01, 2023