smith-dossier-nov-2009x - Department of Computer Science ...

belchertownshuffleΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 9 μήνες)

103 εμφανίσεις

Smith

1

DATA SHEET


NAME
: Adam Smith


DATE OF BIRTH
: September 8, 1977


DATE OF APPOINTMENT TO PENN STATE
: January 2007


APPOINTMENT TO GRADUATE FACULTY
: January 2007


TENURE
:

APPOINTMENT/PROMOTIONS
:

Second Year Review:

Assistant Professor: January 2007



Fourth Year Review:

Associate Professor:



Sixth Year Review:

Professor:



Tenured:



LEAVE OF ABSENCE
:



Smith

2



EDUCATION:



1999

B.Sc., Mathematics and Computer Science, McGill University



2001

M.S., Computer Science, Massachusetts Institute of

Technology



2004

Ph.D., Computer Science, Massachusetts Institute of Technology



Thesis Advisor:
Madhu Sudan



Thesis Title: Maintaining Secrecy when Information Leakage is Unavoidable


EXPERIENCE:



1998
-
99
(Summer)

Research
Assistant, McGill University



9/99
-
9/04

Graduate Research Assistant, Massachusetts Institute of Technology



2000 (Summer)

Research Intern, Telcordia Technologies



2002 (Summer)

Research Intern, Microsoft Research, Silicon Valley



2003 (Summer)

Research Intern, Microsoft Research, Redmond, WA



10/04
-
8/06

Post
-
doctoral Researcher, Weizmann Institute of Science



9/06
-
12/06

Visiting Fellow, Inst. For Pure and Applied Mathematics, UCLA



1/07
-

Assistant Professor, Computer Science and
Engineering, Penn State University


RESEARCH INTERESTS
:


Cryptography, data privacy, quantum computing, discrete mathematics.


Smith
-

Teaching

A
-
1

Chapter A


I.
THE SCHOLARSHIP OF TEACHING AND LEARNING

A. Record of Instructional and Advising Activities.

Resident Instruction.
*



Course




Enroll
-

Class Hrs

Course

Semester

No.

Sec.

Cr.

Title

ment ^

Per Week

Assistance









Sp07

CSE 465**

1

3

Data
Structures

30

3

TA

Sp07

CSE 465**

2

3

Data Structures

29

3

TA

Fa07

CSE 598A

1

3

Cryptography

11

3


Fa07

CSE 598D/

STAT 598B+

1

3

Data Privacy

7

3


Sp08

CSE 597B

1

1.5

Theory Seminar

1

2


Fa08

CSE 565

1

3

Algorithm Anly

42

3

TA

Sp09

CSE 546

1

3

C
ry
ptography

20

3


Sp09

CSE 597C

1

1.5

Theory Seminar

3

2


Fa09

CMPSC 465

1

3

Data Structures

47

3

TA

Fa09

CMPSC 465

2

3

Data Structures

47

3

TA


ˆEnrollment figures are obtained after semester ends to reflect final course enrollment.

*Figures for such
courses as CSE 494, 496, 591, 594, 596, and the 600's are not listed here, but are
taught on a regular basis.

**Taught with Dr. Raskhodnikova

+Taught with Dr. Slavkovic


Continuing Education Instruction
.








Extra



Enroll
-

Duration

Program


Compen
-

Semester

Course Title

ment

Wks & Hrs/wks

Funding

Clientele

sation?









Correspondence Course Instruction.








Extra


Course

Units


No. of

No. of

Compen
-

Semester

No.

or Cr.

Title

Students

Assignments

sation?









International
Programs.








Extra


Course

Units


No. of

No. of

Compen
-

Semester

No.

or Cr.

Title

Students

Assignments

sation?










Smith
-

Teaching

A
-
2

Advising Responsibilities.


Semester

No. of

Undergrad

Advisees

Avg.

Hrs/Wk

No. of

Graduate

Advisees

Avg.

Hrs/Wk






Su 07

-

-

1

3

Fa 07

-

-

2

6

Sp 08

-

-

2

6

Su 08

-

-

2

6

Fa 08

Advising ctr

3

3

9

Sp 09

1

2

2

6

Su 09

-

-

2

6

Fa 09

-

-

3

9


ˆAdvising Center


B. Teaching Evaluations by Students in Promotion and Tenure Dossiers.


1.

Teaching Evaluation
from the SRTE.

SRTE results should be shown in the format provided. Do not provide raw data or SRTE
forms. The score for SRTE questions 3 and 4 for each course taught by the instructor should
be listed on the form. The score is the average of all the stud
ent evaluations for the course.

2.

Other Teaching Evaluations and Comments.

3.

Summary of Student Comments (if appropriate).


C.
Faculty Input Concerning the Evaluation of Teaching Effectiveness.

(Actual signed internal
peer evaluations of teaching effect
iveness should be included in this section.)


D.
Any Statements from Administrators which Attest to the Candidate's Teaching and Advising

Effectiveness.


E.
Other Evidence of Resident and/or Outreach
-
Based Teaching and Advising Effectiveness
(e.g.,
perform
ance of students in subsequent courses, teaching awards, tangible results and benefits
derived by clientele).



Smith
-

Teaching

A
-
3

SUMMARY OF STUDENT RATINGS OF TEACHING EFFECTIVENESS (SRTE)

Faculty Member:
A. Smith

Title:
Assistant Professor of Computer Scienc
e and Engineering


Course/Num.

Section

Enroll
-

Ment

Elective

%

Semester/

Year

Number of

Respondents

%

Overall Quality

Of Course

*

Overall Quality

Of Instruction

*

CSE 465.1

33

0%

Sp07

24 (73%)

5.04

5.54

CSE 465.2

31

5%

Sp07

19 (61%)

5.58

6.00

CSE 598A
.1

11

0%

Fa07

8 (73%)

6.13

6.25

CSE 598D/

STAT 598B+

5

43%

Fa07

7 (140%)**

6.14

6.74

CSE 565.1

42

28%

Fa08

32 (76%)

5.88

6.22

CSE 546.1

20

17%

Sp09

18 (90%)

5.83

5.83

*Mean Score

+Cross listed with CSE 598D

Number of SRTEs exceeds enrollment because the
class also includes STAT students, but they are not counted as
respondents.

Smith
-

Teaching

A
-
4


F.
Graduate and Undergraduate Honors Theses Supervised.

(List only those theses/[papers]
actually chaired, co
-
chaired or supervised by the candidate.) Supervision of graduate and

undergraduate dissertations, theses, projects, monographs, performances, productions, and
exhibitions; types of degrees and years granted. For current students, list
anticipated

graduation
month and year.




Date





Degree


Faculty


Type of

Granted


Member's

Student Name


Degree

(Mo/Yr)

Title of Thesis

Role






Graduated:






Laxman Vembar

MS/CSE

8/08

Target Re
-
identification in Anonymized
Social Networks Graphs

Supervisor






Ashwinkumar
Gopalrathnam

MS/EE

8/08

Deniable

Authentication (with J.
Metzner)

Co
-
Supervisor






Srivatsava Ranjit
Ganta

PhD/CSE

5/09

Fusion
-
Aware Privacy and

Warehousing for Healthcare Databases
(with R. Acharya)

Co
-
supervisor






In Progress:
















Youngtae Youn

MEng/CSE

12/09

Tag
-
based Encryption and Its
Application (with S. Hallgren) (Def.
7/09)

Co
-
supervisor






Youngtae Youn

PhD/CSE

5/11


Supervisor






Abhradeep Guha
Thakurta

PhD/CSE

5/12


Supervisor













G.
Supervision of other undergraduate research
.


Honors thesis of Carl Sutherland (
B.Sc.
Mathematics
)
.

Date: 5/09

Title:
Counting Primitive Normal Bases in Finite Fields

Co
-
supervised with
Gary Mullen


H.
Supplementary Materials Including Such Items as Case
Studies, Teaching Portfolios,
Assessment Tools, Etc.



Smith
-

Teaching

A
-
5

I
.

Membership on Graduate Degree Candidates' Committees
. [Do not repeat those listed in F,
above.]


Student

Type of

Student

Type of

Name

Degree

Name

Degree





Shiva Kasivisanathan

PhD/CSE/Fa08

Andreas Artemiou

PhD/S
TAT

Sergey Orshanskiy

PhD/MATH (12/09)

He Xiang

PhD/EE

Weina Ge

PhD/CSE (Cmp. 5/09)

Sandra Julieta Rueda
Rodriguez

PhD/CSE (Cmp. 9/09)

Smith
-

Research

B
-
1

Chapter B


II. THE SCHOLARSHIP OF RESEARCH AND
CREATIVE ACCOMPLISHMENTS

[Citations must include beginning and ending page numbers or total number of pages, where
appropriate; for multiple
-
authored works, the contribution of the candidate should be clearly indicated
(e.g., principal author, contributing

author, etc.); for multi
-
authored work indicate by an asterisk (*)
any co
-
authors who are graduate students supervised by the candidate.
Electronic journals should be
listed in appropriate categories with documentation as outlined in the Administrative G
uidelines,
III.C.7.b.
NOTE: Items in this section should be
listed in standard bibliographic form with the most
recent date first. Do not include material contained in other sections
. If work reported in a publication
was performed prior to the candidat
e's appointment at Penn State, indicate location at the time the work
was performed.]


A.
Research and/or Scholarly Publications.


1.

Refereed publications.


a. Articles published in refereed journals.




While at Penn State:


Naor, M. G. Segev, A. Smith.
June 2008.
Tight Bounds for Unconditional Authentication
Protocols in the Manual Channel and Shared Key Models.
IEEE Transactions on Information
Theory

54(6):2408
-
2425
. (
P
eer

reviewed)


Dodis
, Y.
, R. Ostrovsky, L. Reyzin
,
A.
Smith.
March 2008.
Fuzzy Extractors: How to
Generate Strong Keys from

Biometrics and Other Noisy Data.
SIAM Journal on Computing

38(1):97
-
139.
(Peer reviewed)


Raskhodnikova, S., D. Ron, A. S
hpilka, A. Smith. Strong Lower Bounds for Approximating
Distribution Support Size and the Distinct Elements Problem. SIAM
Journal on Computing
(SICOMP)
,
39(3), p. 813
-
842 (2009)

(Peer reviewed)



b. Articles published in refereed proceedings.
(All paper
s in this section are peer reviewed)



While at Penn State:


Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On
-
Line
De
niability of Authentication. In O. Reingold, ed.,
Theory of Cryptography Conference
(TCC) 2009. Springer,
2009, pages

146
-
162
.


E
nck
,
W.,
K. Butler, T. Richardson,
P. McDaniel,

A
.

Smith. December
2008.
Defending
Against Attacks on Main Memory Persistence.
Proceedings of the T
wenty
-
Fourth
Annual
Computer Security

Applications Conference (ACSAC 2008)
.
pp. 65
-
74.
Anaheim, CA.



Kasiviswanathan, S., H. Lee, K. Nissim, S. Raskhodnikova, A. Smith. November 2008.
What Can We Learn Privately?
Proceedings of the Forty
-
Ninth Annual IEEE Symposium
on Foundations of Computer Science (FOCS 2008)
. pp. 559
-
569. Atlanta, GA.


Ganta
*
, S.
R., S. P. Kasiviswanathan, A. Smith. August 2008. Composition Attacks and
Auxiliary Information in Data Privacy.
Proceedings of the Fourteenth Annual ACM

Smith
-

Research

B
-
2

SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD
2008)
.

pp.
265
-
273.

L
as Vegas, NV.

(First author co
-
supervised by candidate)



Damgård, I., Y. Ishai, M. Krøigaard, J. B. Nielsen, A. Smith. August 2008. Scalable
Multiparty Computation with Nearly Optimal Work and Resilience.
Proceedings of the
Twenty
-
Eighth
International Cryptology Conference (CRYPTO 2008)
. Springer
-
Verlag
LNCS 5157:241
-
261. Santa Barbara, CA.


Goyal, V., P. Mohassel, A. Smith. April 2008. Efficient Two
-

and Multi
-
party Computation
Protocols for Covert Adversaries. Proceedings of the Twent
y
-
Seventh Annual International
Conference on Theory and Applications of Cryptographic Techniques,
Advances in
Cryptology

(EUROCRYPT 2008). Springer
-
Verlag LNCS 4965:289
-
306. Istanbul, Turkey.


Raskhodnikova
, S.
, D
.
Ron, A
.
Shpilka, A
.
Smith
. October 2007
.
Strong Lower Bounds
for Approximating Distribution Support Size and the Distinct Elements Problem
.
Proceedings of the Forty
-
Eighth Annual IEEE Symposium on Foundations of Computer
Science (FOCS 2007)
. pp.
559
-
569
. Providence, RI.


Raskhodnikova, S.,
D.
Ron,

R. Rubinfeld,
A.
Smith
.
August 2007. Sublinear Algorithms
for Approximating String Compressibility.
Proceedings of the Eleventh
International
Workshop on Randomization and Computation (RANDOM 2007)
.
pp. 609
-
623.
Princeton,
NJ.


Nissim, K.,
S.
Ras
khodnikova,

A.

Smith. June 2007. Smooth Sensitivity and Sampling in
Private Data Analysis.
Proceedings of the Thirty
-
Ninth
Annual ACM Symposium on Theory
of Computing (STOC 2007).

pp. 75
-
84.
San Diego, CA.


Smith
, A. January 2007.
Scrambling Errors Usi
ng Few Random Bits: Optimal Information
Reconciliation and Better

Private Codes.
Proceedings of the Eighteenth
Annual ACM
Symposium on Discrete Algorithms (SODA

2007
)
.
p. 472
-
479.

New Orleans, LA.


While at Other Institutions:


Ben
-
Or
, M.
, C. Cr
é
peau, D. Gottesman, A. Hassidim, A. Smith.
October 2006.
Secure
Multiparty Quantum Computation

with (Only) a Strict Honest Majority.
Proceedings of the
Forty
-
Seventh
Annual IEEE Symposium on Foundations of Computer

Science (FOCS
2006)
. pp. 249
-
260. Berk
eley, CA. (While at
Weizmann Institute of Science)


Dodis
, Y.
, J. Katz, L. Reyzin
,
A. Smith.
August 2006.
Robust Fuzzy Extractors and
Authenticated Key Agreement

from Close Secrets.
Proceedings of the Twenty
-
Sixth Annual
International
Cryptology

Conferenc
e (
CRYPTO 2006
)
.
Springer
-
Verlag LNCS
4117(1):
232
-
250.

Santa Barbara, CA.
(While at
Weizmann Institute of Science)


Naor
, M.
, G. Segev
,
A. Smith.
August 2006.
Tight Bounds for Unconditional
Authentication Protocols in the Manual

Channel and Shared Key
Models.
Proceedings of
the Twenty
-
Sixth Annual International
Cryptology

Conference (
CRYPTO 2006
)
.
Springer
-
Verlag LNCS 4117(1):
2
14
-
2
31
.

Santa Barbara, CA.
(While at
Weizmann Institute of
Science)


Dwork
, C.
, F. McSherry, K. Nissim
,
A. Smith.
March 2006.
Calibrating Noise to
Sensitivity in Private Data Analysis.

Proceedings of the Third Theory of Cryptography
Smith
-

Research

B
-
3

Conference (TCC 2006)
.
Springer
-
Verlag

LNCS 3876
(1):
265
-
284.

New York, NY.
(While at
Weizmann Institute of Science)


Cr
é
peau,
C.,
D.
Gottesman
,
A. Smith.
May 2005.
Approximate Quantum Error
-
Correcting
Codes and Secret
-
Sharing Schemes.
Proceedings of the Twenty
-
Fourth Annual
International Conference on Theory and Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYP
T 2005
)
.
Springer
-
Verlag

LNCS 3494
(1):
285
-
301.

Aarhus, Denmark.
(While at
Weizmann Institute of Science)


Boyen
, X.
, Y. Dodis, J. Katz, R. Ostrovsky
,
A. Smith.
May 2005.
Secure Remote
Authentication Using Biometrics.

Proceedings of the Twenty
-
Fourth A
nnual International
Conference on Theory and Applications of Cryptographic Techniques,
Advances in
Cryptology
(
EUROCRYPT 2005
)
.
Springer
-
Verlag

LNCS 3494
(1):
147
-
163.

Aarhus,
Denmark.
(While at
Weizmann Institute of Science)



Dodis, Y.,
A. Smith.
May 2005.
Correcting Errors without Leaking Partial Information.
Proceedings of the Thirty
-
Seventh
Annual ACM

Symposium on Theory of Computing
(STOC

2005
)
.
p
p
. 654
-
663.

Baltimore, MD.
(While at
Weizmann Institute of Science)


Dodis
, Y.,
A. Smith.
Febru
ary 2005.
Entropic Security and the Encryption of High Entropy
Messages.
Proceedings of

the
Second Theory of Cryptography Conference

(
TCC 2005
)
.
Springer
-
Verlag
LNCS 3378
(1):556
-
577
.

Cambridge, MA.
(While at
Weizmann Institute
of Science)


Chawla
, S.
,
C. Dwork, F. McSherry, A. Smith
,
H.

Wee.
February 2005.
Toward Privacy in
Public Databases.
Proceedings of

the
Second Theory of Cryptography Conference

(
TCC
2005
)
.
Springer
-
Verlag
LNCS 3378
(1):
363
-
385.

Cambridge, MA.
(While at
Weizmann
Institute of Sci
ence)


Ambainis
, A.,
A. Smith.
August 2004.
Small Pseudo
-
Random Families of Matrices:
Derandomizing Approximate

Quantum Encryption.
Proceedings of the Eighth
International
Workshop on Randomization and Computation (RANDOM

2004
)
. Springer
-
Verlag LNCS
3122(1):249
-
260. Cambridge, MA. (While at

Massachusetts Institute of Technology)


Ostrovsky
, R.
, C. Rackoff
,
A. Smith.

July 2004.
Efficient Consistency Proofs for General
Queries on a Committed

Database.
Proceedings of the Thirty
-
First
International
Co
lloquium on Automata, Languages and Complexity (ICALP

2004
)
. Springer
-
Verlag
LNCS 3142
(1):
1041
-
1053.

Turku,

Finland
.
(While at

Massachusetts Institute of
Technology)


Dodis
, Y.
, L. Reyzin and A. Smith.
May 2004.
Fuzzy Extractors: How to Generate Strong

Keys from Biometrics and

Other Noisy Data.
Proceedings of the International Conference
on Theory and Applications of Cryptographic Techniques,
Advances in Cryptology

(
EUROCRYPT 2004
)
.
Springer
-
Verlag

LNCS 3027
(1):
523
-
540.

Interlaken, Switzerland.
(While at

Massachusetts Institute of Technology)


Dwork
, C.
, R. Shaltiel, A. Smith
,
L. Trevisan.
February 2004.
List
-
Decoding of Linear
Functions and Analysis of

a Two
-
Round Zero
-
Knowledge Argument.
Proceedings of the
Smith
-

Research

B
-
4

First Theory
of Cryptography
Conferen
ce (TCC
2004
)
.
Springer
-
Verlag
LNCS
2951
(1):
101
-
120.

Cambridge, MA.
(While at

Massachusetts Institute of Technology)


Katz
, J.
, R. Ostrovsky, A. Smith.
May 2003.
Round Efficiency of Multi
-
party Computation
with a Dishonest

Majority.
Proceedings of the I
nternational Conference on Theory and
Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 2003
)
.
Springer
-
Verlag
LNCS 2656
(1):
578
-
595.

Warsaw, Poland.
(While at

Massachusetts
Institute of Technology)


Peikert
, C.
, A. Shelat
,
A. Sm
ith.

January 2003.
Lower Bounds for Collusion
-
Secure
Fingerprinting.
Proceedings of the Fourteenth
Annual

ACM Symposium on Discrete
Algorithms (SODA

2003
)
. pp. 472
-
479. Baltimore, MD
.

(While at

Massachusetts Institute
of Technology)


Barnum
, H., C. Cré
peau, D. Gottesman, A. Smith
,
A. Tapp.
November 2002.
Authentication of Quantum Messages.
Proceedings of the Forty
-
Second
Annual Symposium
on Foundations of Computer Science (FOCS

2002
)
.
p
p
. 449
-
458.


Vancouver, BC, Canada.

(While at

Massachusetts Instit
ute of Technology)


Fitzi
, M.
, D. Gottesman, M. Hirt, T. Holenstein
,
A. Smith.
July 2002.
Detectable Byzantine
Agreement Secure

Against Faulty Majorities.
Proceedings of the Twenty
-
First
Annual ACM
Symposium on Principles of Distributed Computing

(PODC

20
02
)
.
p
p
. 118
-
126.

Monterey, CA.
(While at

Massachusetts Institute of Technology)


Ambainis
, A.
, A. Smith
,
K. Yang.

May 2002.
Extracting Quantum Entanglement.
Proceedings of the Seventeenth
Annual IEEE Conference

on Computational Complexity
(CCC

2002
)
.
p
p
. 103
-
112.

Montréal, Québec, Canada.

(While at

Massachusetts Institute of
Technology)


Cr
é
peau
, C.
, D. Gottesman
,
A. Smith.
May 2002.
Secure Multi
-
party Quantum
Computation.
Proceedings of the Thirty
-
Fourth
Annual

ACM Symposium on Theory of
Computin
g (STOC

2002
)
.
p
p
. 643
-
652.

Montréal, Québec, Canada.

(While at

Massachusetts Institute of Technology)


Liskov
, M.
, A. Lysyanskaya, S. Micali, L. Reyzin
,
A. Smith.

December 2001.
Mutually
Independent Commitments.
Proceedings of the Seventh Internationa
l Conference on the
Theory of Application of Cryptology and Information Security,
Advances in Cryptology
(
ASIACRYPT 2001
)
.
Springer
-
Verlag
LNCS 2248
(1):
385
-
401.

(While at

Massachusetts
Institute of Technology)


Dodis
, Y.
, A. Sahai
,
A. Smith.
May 2001.
On

Perfect and Adaptive Security in Exposure
-
Resilient Cryptography.

Proceedings of the International Conference on Theory and
Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 200
1)
.
Springer
-
Verlag

LNCS 2045
(1):
301
-
324.

Innsbru
ck, Austria.

(While at

Massachusetts
Institute of Technology)


Di Crescenzo
, G.
, J. Katz, R. Ostrovsky
,
A. Smith.
May 2001.
Efficient and Non
-
interactive Non
-
malleable

Commitment.

Proceedings of the International Conference on
Theory and Applications of C
ryptographic Techniques,
Advances in Cryptology
Smith
-

Research

B
-
5

(
EUROCRYPT 200
1)
.
Springer
-
Verlag

LNCS 2045
(1):
40
-
59.

Innsbruck, Austria.

(While
at

Massachusetts Institute of Technology)


c. Refereed letters and other papers.



d. Papers refereed by abstract.



(1)
Proceedings.


(2) Other papers.


2. Books.


3. Parts of books.


Dodis
, Y.
, L. Reyzin
,
A. Smith.

2008.
Fuzzy Extractors
.
Security with Noisy Data
: On Private
biometrics, Secure Key Storage, and Anti
-
Counterfeiting
. pp. 79
-
99.
P. Tuyls,
B. Skoric, T.
Kevenaar, Eds.
Springer
-
Verlag.

(Book chapter)


4. Book reviews.


5. Articles published in nonrefereed journals [and conference proceedings].


C. Dwork and A. Smith. Differential Privacy and Statistics:
Statistics: What we Know and What we
Want to Learn. In Alan Karr, ed.,
NCHS/CDC Data Confidentiality Workshop
,
Hyattvile, MD,
May
2008.


A. Smith.
What Can Cryptography Do For Coding Theory?
Invited paper
.
In International
Conference on Information
-
Theoretic Security,
Shizuoka, Japan, December
2009.


A. Smith.
Differential Privacy and Statistical Inference

Invited paper
.
In
International Conference
on Cryptography and Network Security,
Kanazawa, Japan, Dece
mber

2009.


6. Articles in in
-
house organs.


7. Research reports to sponsor.



NSF Annual Reports for active awards (listed below)


8. Manuscripts accepted for publication (substantiated by letter of acceptance [includes
conditional acceptances, based on
appropriate revisions]). Indicate if peer reviewed and
number of pages of manuscript.


Kasiviswanathan
, S.,
H
.
Lee
,
K
.
Nissim
,
S
.
Raskhodnikova
, A.
Smith
.
What Can We Learn

P
rivately? Accepted October 2009 to
SIAM Journal on Computing
. Currently under
final revision.


9. Manuscripts submitted for publication, with an indication of where submitted and when;
indicate if peer reviewed and number of pages of manuscript.




Smith
-

Research

B
-
6

9a. Manuscripts with a completed review suggesting revisions and resubmission (must be
substantiated by letter).


Raskhodnikova, S.,
D.
Ron,

R. Rubinfeld, A.
Smith
.
August
2007. Sublinear Algorithms for
Approximating String Compressibility.




10
. Manuscripts in progress
(second
-

and fourth
-
year reviews only).


N/A



11. Cooperative extension service bulletins and circulars.


B.
Creative Accomplishments.

Smith
-

Research

B
-
7

C.
Papers Presented at Technical and Professiona
l Meetings.

(Meeting and paper titles,
listed in
standard bibliographic form
. Indicate if the candidate was the presenter.) [Indicate by an asterisk
(*) any co
-
authors who are graduate students supervised by the candidate.]


While at Penn State:


Yevgeniy
Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On
-
Line De
niability
of Authentication. In O. Reingold, ed.,
Theory of Cryptography Conference
(TCC) 2009. Springer,
2009, pages

146
-
162
.

(Walfish presented)



Enck
,
W.,
K. Butler, T. Richardson,
P. McDaniel,

A
.

Smith. December
2008.
Defending Against
Attacks on Main Memory Persistence.
Proceedings of the T
wenty
-
Fourth
Annual Computer Security

Applications Conference (ACSAC 2008)
.
pp. 65
-
74.
Anaheim, CA.

(
Enck
prese
nted)


Kasiviswanathan, S., H. Lee, K. Nissim, S. Raskhodnikova, A. Smith. November 2008. What Can We
Learn Privately? Proceedings of the Forty
-
Ninth Annual IEEE Symposium on Foundations of
Computer Science (FOCS 2008). pp. 559
-
569. Atlanta, GA.

(
Kas
iviswanathan

presented)


Ganta
*
, S. R., S. P. Kasiviswanathan, A. Smith. August 2008. Composition Attacks and Auxiliary
Information in Data Privacy.
Proceedings of the Fourteenth Annual ACM SIGKDD International
Conference on Knowledge Discovery and Data

Mining (KDD 2008)
.

pp.
265
-
273.

Las Vegas, NV.

(
Ganta
presented)



Damgård, I., Y. Ishai, M. Krøigaard, J. B. Nielsen, A. Smith. August 2008. Scalable Multiparty
Computation with Nearly Optimal Work and Resilience.
Proceedings of the Twenty
-
Eighth
International Cryptology Conference (CRYPTO 2008)
. Springer
-
Verlag LNCS 5157:241
-
261. Santa
Barbara, CA. (Krøigaard presented)


Goyal, V., P. Mohassel, A. Smith. April

2008.
Efficient Two
-

and Multi
-
party Computation Protocols
for Covert Adversaries.
Proceedings of the Twenty
-
Seventh Annual International Conference on Theory
and Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 200
8)
. Springer
-
Verlag LNCS 4965:289
-
306. Istanbul, Turkey.
(
Mohassel

presented)


Raskhodnikova
, S
.
, D
.
Ron, A
.
Shpilka, A
.
Smith
. October 2007.
Strong Lower Bounds for
Approximating Distribution Support Size and the Distinct Elements Problem
.
Proceedings of the Forty
-
Eighth Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007)
. pp.
559
-
569
.
Providence, RI.
(
Smith
presented)


Raskhodnikova, S.,
D.
Ron,

A.
Smith
.
August 2007. Sublinear Algorithms for Approximating String
Compressibility.
Proceedings of the Eleventh
International Workshop on Randomization and
Computation (RANDOM
2007)
.
pp. 609
-
623.
Princeton, NJ.


(
Raskhodnikova
presented)


Nissim, K.,
S.
Raskhodnikova,

A.

Smith. June 2007. Smooth Sensitivity and Sampling in Private Data
Analysis.
Proceedings of the Thirty
-
Ninth
Annual ACM Symposium on Theory of Computing (STOC
2
007).

pp. 75
-
84.
San Diego, CA.

(
Raskhodnikova
presented)


Smith
-

Research

B
-
8

Smith
, A. January 2007.
Scrambling Errors Using Few Random Bits: Optimal Information
Reconciliation and Better

Private Codes.
Proceedings of the Eighteenth
Annual ACM Symposium on
Discrete Algor
ithms (SODA

2007
)
.
p. 472
-
479.

New Orleans, LA. (Smith presented)

While at Other Institutions:


Ben
-
Or
, M.
, C. Cr
é
peau, D. Gottesman, A. Hassidim, A. Smith.
October 2006.
Secure Multiparty
Quantum Computation

with (Only) a Strict Honest Majority.
Proceedings of the Forty
-
Seventh
Annual
IEEE Symposium on Foundations of Computer

Science (FOCS 2006)
. pp. 249
-
260. Berkeley, CA.


Dodis
, Y.
, J. Katz, L. Reyzin
,
A. Smith.
August 2006.
Robust Fuzzy Extractors and Authenticated Key
Agreement

from Close
Secrets.
Proceedings of the Twenty
-
Sixth Annual International
Cryptology

Conference (
CRYPTO 2006
)
.
Springer
-
Verlag LNCS 4117(1):
232
-
250.

Santa Barbara, CA.


Naor
, M.
, G. Segev
,
A. Smith.
August 2006.
Tight Bounds for Unconditional Authentication Protoco
ls
in the Manual

Channel and Shared Key Models.
Proceedings of the Twenty
-
Sixth Annual International
Cryptology

Conference (
CRYPTO 2006
)
.
Springer
-
Verlag LNCS 4117(1):
2
14
-
2
31
.

Santa Barbara, CA.


Dwork
, C.
, F. McSherry, K. Nissim
,
A. Smith.
March 2006.
Calibrating Noise to Sensitivity in Private
Data Analysis.

Proceedings of the Third Theory of Cryptography Conference (TCC 2006)
.
Springer
-
Verlag

LNCS 3876
(1):
265
-
284.

New York, NY. (Smith presented)


Cr
é
peau,
C.,
D. Gottesman
,
A. Smith.
May 2005.
Appro
ximate Quantum Error
-
Correcting Codes and
Secret
-
Sharing Schemes.
Proceedings of the Twenty
-
Fourth Annual International Conference on Theory
and Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 2005
)
.
Springer
-
Verlag

LNCS 3494
(1
):
285
-
301.

Aarhus, Denmark.



Boyen
, X.
, Y. Dodis, J. Katz, R. Ostrovsky
,
A. Smith.
May 2005.
Secure Remote Authentication Using
Biometrics.

Proceedings of the Twenty
-
Fourth Annual International Conference on Theory and
Applications of Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 2005
)
.
Springer
-
Verlag

LNCS 3494
(1):
147
-
163.

Aarhus, Denmark.



Dodis, Y.,
A. Smith.
May 2005.
Correcting Errors without Leaking Partial Information.
Proceedings of
the Thirty
-
Seventh
Annual ACM

Symposium on Theory of Computing (STOC

2005
)
.
p
p
. 654
-
663.

Baltimore, MD. (Smith presented)


Dodis
, Y.,
A. Smith.
February 2005.
Entropic Security and t
he Encryption of High Entropy Messages.
Proceedings of

the
Second Theory of Cryptography Conference

(
TCC 2005
)
.
Springer
-
Verlag
LNCS
3378
(1):556
-
577
.

Cambridge, MA. (Smith presented)


Chawla
, S.
, C. Dwork, F. McSherry, A. Smith
,
H.

Wee.
February 2005.
T
oward Privacy in Public
Databases.
Proceedings of

the
Second Theory of Cryptography Conference

(
TCC 2005
)
.
Springer
-
Verlag
LNCS 3378
(1):
363
-
385.

Cambridge, MA.



Ambainis
, A.,
A. Smith.
August 2004.
Small Pseudo
-
Random Families of Matrices:
Derandomizing
Approximate

Quantum Encryption.
Proceedings of the Eighth
International Workshop on
Randomization and Computation (RANDOM

2004
)
. Springer
-
Verlag LNCS 3122(1):249
-
260.
Cambridge, MA. (Smith presented)


Smith
-

Research

B
-
9

Ostrovsky
, R.
, C. Rackoff
,
A. Smith.

July 2004.
Efficient Consistency Proofs for General Queries on a
Committed

Database.
Proceedings of the Thirty
-
First
International Colloquium on Automata,
Languages and Complexity (ICALP

2004
)
. Springer
-
Verlag
LNCS 3142
(1):
1041
-
1053.

Turku,

Finland
.



D
odis
, Y.
, L. Reyzin and A. Smith.
May 2004.
Fuzzy Extractors: How to Generate Strong Keys from
Biometrics and

Other Noisy Data.
Proceedings of the International Conference on Theory and
Applications of Cryptographic Techniques,
Advances in Cryptology

(
EUR
OCRYPT 2004
)
.
Springer
-
Verlag

LNCS 3027
(1):
523
-
540.

Interlaken, Switzerland.



Dwork
, C.
, R. Shaltiel, A. Smith
,
L. Trevisan.
February 2004.
List
-
Decoding of Linear Functions and
Analysis of

a Two
-
Round Zero
-
Knowledge Argument.
Proceedings of the First Theory
of Cryptography
Conference (TCC
2004
)
.
Springer
-
Verlag
LNCS 2951
(1):
101
-
120.

Cambridge, MA. (Smith presented)


Katz
, J.
, R. Ostrovsky, A. Smith.
May 2003.
Round Efficiency of Multi
-
party Computation with a
Dishonest

Major
ity.
Proceedings of the International Conference on Theory and Applications of
Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 2003
)
.
Springer
-
Verlag
LNCS
2656
(1):
578
-
595.

Warsaw, Poland. (Smith presented)


Peikert
, C.
, A. Shelat
,
A. Smith.

January 2003.
Lower Bounds for Collusion
-
Secure Fingerprinting.
Proceedings of the Fourteenth
Annual

ACM Symposium on Discrete Algorithms (SODA

2003
)
. pp. 472
-
479. Baltimore, MD
.



Barnum
, H., C. Cré
peau, D. Gottesman, A. Smith
,
A. Tapp.
November 2002.

Authentication of
Quantum Messages.
Proceedings of the Forty
-
Second
Annual Symposium on Foundations of Computer
Science (FOCS

2002
)
.
p
p
. 449
-
458.


Vancouver, BC, Canada.



Fitzi
, M.
, D. Gottesman, M. Hirt, T. Holenstein
,
A. Smith.
July 2002.
Detectable

Byzantine Agreement
Secure

Against Faulty Majorities.
Proceedings of the Twenty
-
First
Annual ACM Symposium on
Principles of Distributed Computing

(PODC

2002
)
.
p
p
. 118
-
126.

Monterey, CA. (Smith presented)


Ambainis
, A.
, A. Smith
,
K. Yang.

May 2002.
Ex
tracting Quantum Entanglement.
Proceedings of the
Seventeenth
Annual IEEE Conference

on Computational Complexity (CCC

2002
)
.
p
p
. 103
-
112.

Montréal, Québec, Canada.



Cr
é
peau
, C.
, D. Gottesman
,
A. Smith.
May 2002.
Secure Multi
-
party Quantum Computation.

Proceedings of the Thirty
-
Fourth
Annual

ACM Symposium on Theory of Computing (STOC

2002
)
.
p
p
.
643
-
652.

Montréal, Québec, Canada.

(Smith presented)


Liskov
, M.
, A. Lysyanskaya, S. Micali, L. Reyzin
,
A. Smith.

December 2001.
Mutually Independent
Commitments.
Proceedings of the Seventh International Conference on the Theory of Application of
Cryptology and Information Security,
Advances in Cryptology
(
ASIACRYPT 2001
)
.
Springer
-
Verlag
LNCS 2248
(1):
385
-
401.



Dodis
, Y.
, A. Saha
i
,
A. Smith.
May 2001.
On Perfect and Adaptive Security in Exposure
-
Resilient
Cryptography.

Proceedings of the International Conference on Theory and Applications of
Cryptographic Techniques,
Advances in Cryptology
(
EUROCRYPT 200
1)
.
Springer
-
Verlag

LNCS

2045
(1):
301
-
324.

Innsbruck, Austria.

(Smith presented)


Di Crescenzo
, G.
, J. Katz, R. Ostrovsky
,
A. Smith.
May 2001.
Efficient and Non
-
interactive Non
-
malleable

Commitment.

Proceedings of the International Conference on Theory and Applications of
Smith
-

Research

B
-
10

Crypt
ographic Techniques,
Advances in Cryptology
(
EUROCRYPT 200
1)
.
Springer
-
Verlag

LNCS
2045
(1):
40
-
59.

Innsbruck, Austria.



Smith
-

Research

B
-
11

D.
Record of Participation in, and Description of, Seminars and Workshops
(Indication of role in
seminar or workshop, e.g., student, invited participant, etc.
Do not list conference papers in this
section. They should be listed in Section C.)



Seminar/Workshop Title

Dates

Sponsor

Your Role


IPAM Workshop on Statistical And
Learnin
g
Theoretic Challenges in Data
Privacy



2/22/2010
-
2/26/2010


NSF


Organizer

Joint Statistical Meetings, Washington, D.C.

Title: Integrating Differential Privacy with

Statistical Theory

8/1/09
-

8/6/09

JSM

Presenter, Co
-
organizer


Joint France
-
US

Young Scientists and Engi
n
eers
Symposium
, Washington D.C.



7/7
-
7/9/09


NSF


P
resenter

Steklov Mathematical Institute Research Seminar,
Moscow, Russia

Title: Differential Privacy and Statistical Theory

6/8/09

Steklov
Mathematical
Institute

Presenter





St. Petersburg Computer Science Club Seminar,
Moscow, Russia

Title: Pinning Down Privacy

6/7/09

St. Petersburg
University

Presenter





Forty
-
First ACM Symposium on Theory of
Computing (STOC 2009), Bethesda, MD

5/31/09
-
6/2/09

ACM

Attendee





Theory Seminar, Penn State, CSE Department

T
itle: Pinning Down “Privacy” in Statistical
Databases

9/29/08

Penn State, CSE
Department

Invited Presenter





Center for Discrete Mathematics & Theoretical
Computer Science (DIMACS) Workshop on Data
Privacy,
Rutgers University, Piscataway, NJ

Tutorial Title: Pinning Down Privacy

2/4/08
-

2/7/08

DIMACS

Invited Tutorial
Presenter





M.I.T. Cryptography and Information Security Seminar,
Cambridge, MA

Title: What Can We Learn Privately?

2/29/08

M.I.T.

Invited
Presenter





Theory Seminar, Penn State, CSE Department

Title:
The Distinct Elements Problem (or
Approximating the Support Size of a Distribution)

1/15/08

Penn State, CSE
Department

Invited Presenter





Microsoft
-
CMU Mindswap on Data Privacy,
Pittsburgh, PA

Title: What Can We Learn Privately?

10/22/07

Microsoft, CMU

Invited Presenter





Theory Seminar, Penn State, CSE Department

Title: C
alibrating Noise to Sensitivity in Private
Data Analysis

1/23/07

Penn State, CSE
Department

Invited
Presenter





Smith
-

Research

B
-
12

Institute for Pure & Applied Mathematics (IPAM)
Workshop on Foundations of Zero
-
Knowledge and
Multi
-
party Computation, UCLA, Los Angeles, CA

Title: Cryptography with Quantum Data

11/27/06

IPAM

Presenter







Smith
-

Research

B
-
13

Institute for Pure & Applied

Mathematics (IPAM)
Workshop on Locally Decodable Codes and Privacy
-
Preserving Data Mining, UCLA, Los Angeles, CA

Title: Interaction and Local Storage in Private Data
Analysis

10/28/06

IPAM

Presenter





Workshop on Data Privacy, Weizmann Institute of
S
cience, Israel

Title: Pinning Down Privacy

7/6/06

Weizmann

Tutorial Presenter





Classical and Quantum Information Security
Workshop, Pasadena, CA

Title: Evolving Notions of Security for Quantum
Protocols

12/17/05

NSF/Caltech

Tutorial Presenter





C.S.
-
Statistics Workshop on Privacy and
Confidentiality, Bertinoro, Italy

Title: Privacy of Statistical Databases and
Sensitivity of Functions

7/10/05

NSF/Microsoft

Presenter





Workshop on Secure Multiparty Protocols,
Amsterdam, The Netherlands:

Title: Toward Privacy in Public Databases

10/7/04

Ecrypt (E.U.)

Presenter





Center for Discrete Mathematics & Theoretical
Computer Science (DIMACS) Workshop on Data
Privacy, Rutgers University, Piscataway, NJ

Title: Fuzzy Extractors: Generating
Strong Keys
from Biometric Data

3/15/04
-
3/16/04

DIMACS

Invited Presenter





M.I.T. Cryptography and Information Security
Seminar, Boston, MA

Title: Secrecy of High
-
Entropy Sources


Protecting
all Partial Information

9/5/03

M.I.T.

Invited Presenter





M.I.T. Cryptography and Information Security
Seminar, Boston, MA

Title: Round Efficiency of Multi
-
party Computation
with a Dishonest Majority

12/6/02

M.I.T.

Invited Presenter





Barbados Workshop on Quantum Cryptography,
Barbados

Title: Secure
Multi
-
party Quantum Computation

5/10/02

McGil
l

University

Presenter





Fifth Workshop on Quantum Information Processing
(QIP 2002), Yorktown Heights, NY

Title: Secure Multi
-
party Quantum Computation

1/14/02
-
1/17/02

IBM

Presenter





M.I.T.
Cryptography and Information Security
Seminar, Boston, MA

Title: Quantum and Classical Secret
-
Sharing

12/3/99

M.I.T.

Invited Presenter





The NEC Workshop on Quantum Cryptography,
12/13/99
-
NEC Corp.

Presenter

Smith
-

Research

B
-
14

Princeton, NJ

Title: Secure Multi
-
party Quantum Computation

12
/15/99


E.
Description of Outreach or Other Activities in which There Was Significant Use of Candidate's

Expertise

([paid] consulting, speaking engagements, services to government agencies when the
candidate is called upon because of his/her scholarly expertise in a particular area, professional
and industrial associations, educational institutions, paper reviewing, p
roposal reviewing,
editorships, etc.)
[service to the profession] offices held, committee work, and other responsibilities in
professional societies are reported in III.C.1.).

[Service as a representative of the University is reported
in III.C.1.);
be sure

to indicate date when activity began].


Consulting:



7/07
-
10/07

Consulting for MITRE Corporation on Key Agreement from Phase Error in Optical Signals


Speaking Engagements:


U.S. Universities



9/24/09

Carnegie
-
Mell
on University, Algorithms and Co
mbinatorics Seminar Series, Pit
t
sburgh, PA

Title: Lower Bounds for Private Data Analysi
s and the Spectra of Random Ma
trices



3/12/09

University of Virginia, Department of Computer Science Colloquium, Charlottesville, VA

Title: Pinning Down Privacy
(Invited)



1/
31
/08

Penn State, Department of Statistics, University Park, PA

Title: Pinning Down Privacy (Invited)



4/13/07

Carnegie Mellon University, Pittsburgh, PA

Title:
Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



11
/28/06

California Institute of Technology, Pasadena, CA

Title: Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



3/24/06

Massachusetts Institute of Technology

Title: Calibrating Noise to Sensitivity in Private Data Analysis
(Invited)



3/17/06

Harvard University, Cambridge, MA

Title: Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



3/28/06

University of Michigan, Ann Arbor, MI

Title: Cryptography with Noisy Secrets (Invited)



3/31/06

Stanford
Research Institute, Menlo Park, CA

Title: Cryptography with Noisy Secrets (Invited)



2/24/06

Penn State University, University Park, PA

Title: Cryptography with Noisy Secrets (Invited)



5/17/05

Princeton University, Princeton, NJ

Title: Correcting

Errors without Leaking Partial Information (Invited)



2/12/05

New York University, New York

Title: Toward Privacy in Public Databases
(Invited)



Smith
-

Research

B
-
15

2/17/05

Boston University, Boston, MA

Title: Toward Privacy in Public Databases
(Invited)



12/3/02

Massachusetts Institute of Technology, Cambridge, MA

Round Efficiency of Multi
-
Party Computation with a Dishonest Majority (Invited)



12/3/99

Massachusetts Institute of Technology, Cambridge, MA

Quantum and Classical Secret
-
Sharing (Invited)


Universities Outside the U.S.



5/2/09

University of Montreal, Fifth Workshop on Computer Privacy in Electronic Commerce,
Quebec, Canada

Title: Pinning Down “Privacy” (Invited)



4/4/06

Federal Institute of Technology (ETH), Zürich, Switzerland

Title:

Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



3/8/06

University of Waterloo, Canada

Title: Cryptography with Noisy Secrets (Invited)



2/20/06

University of British Columbia, Canada

Title: Cryptography with Noisy Secrets
(Invited)



2/17/06

Simon Fraser University, Canada

Title: Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



1/12/06

Tel Aviv University, Israel

Title: Calibrating Noise to Sensitivity in Private Data Analysis (Invited)



4/26/05

Weizmann Institute of Science, Rehovot, Israel

Title: Correcting Errors without Leaking Partial Information (Invited)



3/20/05

Technion (Israel Institute of Technology), Haifa, Israel

Title: Correcting Errors without Leaking Partial Informatio
n (Invited)



3/16/05

Bar
-
Ilan University, Israel

Title: Fuzzy Extractors: Generating Strong Keys from Biometric Data (Invited)



3/4/05

Haifa University, Haifa, Israel

Title: Correcting Errors without Leaking Partial Information (Invited)



1/18/05

Hebrew University of Jerusalem, Israel

Title: Toward Privacy in Public Databases
(Invited)



11/12/04

Tel
-
Aviv University, Israel

Title: Toward Privacy in Public Databases
(Invited)



11/2/04

Ben
-
Gurion University, Be'er Sheva, Israel

Title: Toward Privacy in Public Databases
(Invited)



5/20/04

University of Toronto, Ontario, Canada

Title: Fuzzy Extractors: Generating Strong Keys from Biometric Data (Invited)



5/17/04

University of Montreal, Quebec, Canada

Smith
-

Research

B
-
16

Title: Fuzzy Extract
ors: Generating Strong Keys from Biometric Data (Invited)



4/12/04

Tel
-
Aviv University, Israel

Title: Fuzzy Extractors: Generating Strong Keys from Biometric Data (Invited)



3/16/04

University of Victoria, BC, Canada

Title: Fuzzy Extractors:
Generating Strong Keys from Biometric Data (Invited)



2/17/04

University of Waterloo, Ontario, Canada

Title: Fuzzy Extractors: Generating Strong Keys from Biometric Data (Invited)



11/28/03

Weizmann Institute of Science, Rehovot, Israel

Title: Sec
recy of High
-
Entropy Sources


Protecting all Partial Information (Invited)



11/14/03

Hebrew University of Jerusalem, Israel

Title: Secrecy of High
-
Entropy Sources


Protecting all Partial Information (Invited)



11/1/03

Tel
-
Aviv University, Israel

Title: Secrecy of High
-
Entropy Sources


Protecting all Partial Information (Invited)



10/6/03

McGill University, Montreal, Canada

Title: Secrecy of High
-
Entropy Sources


Protecting all Partial Information (Invited)



12/18/01

McGill University,
Montreal, Canada

Title: Efficient and Non
-
Interactive Non
-
Malleable Commitment (Invited)


Government/Industry



3/18/08

Google Research, New York, NY

Title: Pinning Down “Privacy” in Statistical Databases



6/27/07

Perimeter Institute for
Theoretical Physics, Canada

Title: Cryptography with Quantum Data (Invited)



3/8/06

Bell Labs (Lucent Technologies), NJ

Title: Cryptography with Noisy Secrets (Invited)



5/27/05

Microsoft Research SVC, Mountain View, CA

Title: Cryptography with No
isy Secrets (Invited)



3/16/04

Intel Research, Berkeley, CA

Title: Fuzzy Extractors: Generating Strong Keys from Biometric Data (Invited)



3/4/04

Toyota Technological Institute, Chicago, IL

Title: Fuzzy Extractors: Generating Strong Keys from
Biometric Data (Invited)



8/20/02

Microsoft Research SVC, Mountain View, CA

Title: List
-
Decoding and Two
-
Round Zero
-
Knowledge (Invited)



7/3/02

Microsoft Research SVC, Mountain View, CA

Title: Detectable Byzantine Agreement Secure Against a Faculty

Majority (Invited)



8/16/00

Telcordia Technologies, Morristown, NJ

Title: Range Queries on a Committed Database (Invited)



Smith
-

Research

B
-
17

7/12/00

Telcordia Technologies, Morristown, NJ

Title: On Perfect and Adaptive Security in Exposure
-
Resilient Cryptography
(Invited)

Service to Government Agencies [expertise; not as a representative of the University]:




Service to Professional and Industrial Associations:




Service to Educational Institutions:




Referee/Reviewer (date indicates when first
started reviews):



Journals:




7/09

IEEE Transactions on Information Forensics and Security

9/06

Journal of Privacy Technology

10/05

SIAM Journal on Computing

6/05

Journal of Quantum Information and computing

9/04

IEEE Transactions on Information

Theory

12/03

Journal of the ACM

9/03

ACM Transactions on Algorithms

6/02

Physics Letters A

6/02

SIAM Journal on Discrete Mathematics

6/01

Journal of Cryptology



Conferences:




4/05

Random

11/03

TCC

7/03

SODA

10/02

STOC

4/02

FOCS

11/01

Eurocrypt

3/00

Crypto


Editorial Activities:



4/06

Associate Editor, Journal of Privacy and Confidentiality




Research Collaboration:




F.
Research Projects, Grants, Commissions, and Contracts.

(Insert in the following order: date,
title, submitted to, amount, your involvement in research project, e.g., PI.) The percent of the
project or dollars representing the candidate's share of the funding must be indicated. (See items
II.N. and II.O.)


1.
Research projects completed.








2. Research projects in progress.


12/2009
-
12/2014

CTA: Networking Science Collaborative
ARL

???

Co
-
PI

Smith
-

Research

B
-
18

Technology Alliance






9/1/08
-
8/31/10

CPATH: CDP: Integrating Biology and
Computing: Empowering Future Computer
Engineers (with Narayanan, Acharya, Albert,
Lesk, Irwin)

NSF/CNS

$149,028

Sr. Personnel






9/1/08
-
8/31/13

CAREER: Foundations of Data Privacy:
Rigorous Guarantees and Resistance to

Strong Attacks

NSF

$400,000

PI/100%






10
/1/07
-
9
/
30
/10

REU Supplement:
Algorithms for Private
Data Analysis (with

Raskhodnikova)

NSF/CCF

$6,000

PI/50%






10
/1/07
-
9
/
30
/10

Algorithms for Private Data Analysis (with

S.

Raskhodnikova)

NSF/CCF

$276,428

PI/50%


3. Research projects awarded but not yet
started.







4. Research proposals submitted which are pending.


7/1/10
-
6/30/13

II
-
NEW: Malleable Systems for Cyber
Enabled Discovery

(with Acharya, Kandemir,
Raghavan, Raskhodnikova, Urgaonkar)

NSF/CNS


Senior
Personnel






1/1/10
-
12/31/11

CPATH:
II: Empowering Biological Sciences
with Computational Thinking (with
Narayanan, Acharya, Albert, Cyr)

NSF/CNS

$
79
9,999

Senior
Personnel






9/1/09
-
8/31/13

CDI
-
Type II: Collaborative Research:
Integrating Statistical and Computational
Approaches to
Privacy (with Slavkovic,

Raskhodnikova)

NSF/OIA

$2,743,964

Co
-
PI/33%


5. Research proposals submitted which were declined.


8/1/08
-
7/31/12

CDI
-
Type II: Integrating Statistical and
Computational Approaches to Privacy (with
Slavkovic, Raskhodnikova)

NSF/DMS

$1,
532,748

Co
-
PI/33%












G.
Other Evidence of Research or Creative Accomplishment.

(Identify patents, new product
development, new art forms, citation index analysis, etc.)


H.
Record of Pursuit of Advanced Degrees and/or Further Academic Studies

(e.g. P.E., etc.).


I.
Record of Membership in Professional and Learned Societies.

Dates mu
st be included (list
memberships only).
[Offices held, committee work, and other service to the candidate's profession
should be reported in section III.C. of the dossier. Paper reviewing and editorship duties should be
reported under "Description of Outre
ach..." in item II.E.]


Smith
-

Research

B
-
19

Memberships:



2007
-

Member, Association for Computing Machinery (ACM)



Smith
-

Research

B
-
20

J.
Description of New Courses and/or Programs Developed, Including Service Learning and
Outreach Courses.

[Indicate role and contribution of candidate; indicate date for initial offering.]


CSE 598A


Introduction to Cryptography


This course provides an introduction to the theory and techniques of modern cryptography, with
emphasis on rigorous analysis and m
athematical foundations. First offered Fall 2007.



CSE 598D/STAT 598B


Privacy in Statistical Databases (with
Aleksandra Slavkovic
,
Statistics)


Introduction to techniques for anonymization and disclosure limitation in large databases. A survey of
appr
oaches from statistics and computer science. First offered Fall 2007.



K.
Description of New Computer Software Programs Developed.

[Indicate role and contribution
of candidate in developing new software; if this was a joint effort, identify other persons involved;
indicate applications and use of
this

software.]*


L.
Description of New Methods of Teaching Established Courses and/or P
rograms
. [Indicate role
and contribution of candidate; indicate course
(s)

and date
for initial

use of new method
s
.]


M.
List of Honors or Awards for Scholarship or Professional Activity.


Date

Honors and Awards



2009

Presidential Early Career Award for
Scientists and Engineers (PECASE)



2006

Runner
-
up, Privacy
-
Enhancing Technology of the Year Award (PET 2006)



2003
-
04

Microsoft Graduate Fellowship



1999
-
00

NTT Entrance Fellowship, Massachusetts Institute of Technology



1999

Governor General's

Medal (top undergraduate academic award), McGill University



1999

Edward Rosenthall Mathematics Prize,
McGill University



1998

SHL Systemhouse President's Award,
McGill University



1998

Corporate Software & Technology Scholarships,
McGill
University



1998

H.J. Brennan Mathematics Scholarship,
McGill University



1997

Edward Beatty Memorial Mathematics Scholarship, McGill University



1997

Corporate Software & Technology Scholarships,
McGill University



1996

Edwards Woods Entrance
Scholarship, McGill University


N.
List of Grants and Contracts
Awarded

for Improvement of Instruction or
for

Training
Programs with an Indication of the candidate's role in preparing and administering the grants
and contracts
.


Smith
-

Research

B
-
21

O.
List of Grants for
Equipment, Facilities, or Other Purposes that Do Not Provide Salary
Support for Faculty Members or Graduate Students.


P.
Applications of Research Scholarships in the Field Including New Applications Developed and
Tested; New or Enhanced Systems and
Procedures Demonstrated or Evaluated Government
Agencies, Professional and Industrial Associations, Educational Institutions, Etc.


Q.
Technology Transferred or Adapted in the Field.


Technology developed for private data analysis is currently being deplo
yed by Microsoft for internal
control of dissemination of sensitive information (reference: Dwork, McSherry, Nissim and Smith,
“Calibrating Noise to Sensitiv
ity in Private Data Analysis”). (2005
-
present)


R.
Technical Assistance Provided.


S.
Other evide
nce of Impact in Society of Research Scholarship and Creative Accomplishments.



Invited as panelist for CSIS Wor
king group on biometric privacy (7/2008)



Guest lecturer in Penn State course
AEREC/RSOC

590 on ethics and data management (seminar for
graduate researchers in Agricultural Economics and Rural Sociology
). 11/2/2009
Smith
-

Service

C
-
1

Chapter C


III. SERVICE AND THE SCHOLARSHIP OF SERVICE TO THE UNIVERSITY,
SOCIETY, AND THE PROFESSION


A. Service to the University. (I
nclude dates.)


1. Record of committee work on campus, college, department, and University levels.


Department

Date

Committee



2007
-
08

Personnel Committee

Colloquium Chairman



2008
-
09

Personnel Committee



2009
-
10

Climate/Social Committee

Personnel Committee


College



Date

Committee



2008

Engineering Advising Center (Fa08)




University



Date

Committee




Campus



Date

Committee



2. Participation in Campus and/or University
-
wide governance bodies and related activities.


3. Record of administrative support work (college representative, faculty mentoring,

assessment activities, etc.).



4. Record of contributions to the University's programs to enhance equal opportunity and
cultural diversity.







5. Assistance to student organizations.







6. Other.






Smith
-

Service

C
-
2

B.
Service to Society as a Representative of the
University

(
Include dates and do

not repeat
activities listed in II.E. of the Research section) Limited to those activities that use the candidate's
professional expertise. Limit the list to those activities
other than paid consulting and speaking
engagements (see II.E.)

that use the candidate's professional expertise)



1. Participation in community affairs.




2.

Service to governmental agencies at the international, federal, state, and local levels.


(Service to government agencies
should be listed here when the candidate is serving


in the capacity of his or her responsibilities as a faculty member at the University).



3. Service to business and industry.



4. Service to public and private organizations.



Participated in
Center for Strategic and Internation
al

Studies (
CSIS)
working group
meeting on biometric privacy (7/2008)



5. Service to citizen/client groups.



6. Testifying as an expert witness.



7. Other (e.g., participation in task forces, authorities, meetings, etc., of public, nonprofit, or


private organizations).


C.
Service to the Profession.

(Include dates.)

1.

O
rganizing conferences, service on conference committees.


2005

Program Committee Member, Twenty
-
Fifth Annual International Cryptology Conference
(Crypto 2005), Santa Barbara, CA (August)



2006

Program Committee Member, Theory of Cryptography Conference (TCC 2006), New
York, NY (March)



2007

Program Committee
Member, RSA Conference, 2007, Cryptographers' Track (CT
-
RSA
2007), San Francisco, CA (February)



2007

Program Committee Member, ACM Conference on Electronic Commerce (EC'07), San
Diego, CA (June)



2007

Program Committee Member, Twenty
-
Seventh Annual
International Cryptology
Conference (Crypto 2007), Santa Barbara, CA (August)



2008

Program Committee Member, Third Workshop on Theory of Quantum Computation,
Communication, and Cryptography (TQC 2008), Tokyo, Japan (January
-
February)



2008

Program C
ommittee Member, World Wide Web Conference (WWW 2008), Beijing,
China (April)



2008

Program Committee Member, Twenty
-
Eighth International Cryptology Conference
(CRYPTO 2008), Santa Barbara, CA (August)



2008

Program Committee Member, Sixth Conference

on Security and Cryptography for
Smith
-

Service

C
-
3

Networks (SCN 2008), Amalfi, Italy (September)



2008

Program Committee Member, Eleventh Workshop on Quantum Information Processing
(QIP 2008), New Delhi, India (December)



2009

Program Committee Member and Session C
hair,
Twentieth Annual ACM
-
SIAM
Symposium on Discrete Algorithms, (SODA 2009),
New York, NY

(January)



2009

Program Committee Member, Twenty
-
Ninth International Cryptology Conference
(CRYPTO 2009), Santa Barbara, CA (August) (Program Comm
ittee Meeting


4/26/09)



2009

Program Committee Member, Theory of Cryptography Conference 2010,
Zurich
Switzerland

(
February 2010
)



2009

Program Committee Member, International Conference on Cryptography and Network
Security 2009.
Kanazawa, Japan
(
December 2009
)



2010

Co
-
organizer, IPAM workshop on Statistical and Information
-
Theoretic Challenges in
Data Privacy, Los Angeles, CA (February 2010)



2009

Co
-
organizer, O’Privacy, Where Art Thou? Mapping the Landscape of Data
Confidentiality and Ri
gorous Foundations of Data Confidentiality in Statistical Databases,
Joint Statistical Meetings, Washington, D.C. (August)


2.

Active participation in professional and learned societies (e.g., offices held, committee


work, and other responsibilities; paper reviewing and editorships are reported in


item II.E.).


Professional Participation







Smith
-

Letters

D
-
1

Chapter D


IV. EXTERNAL LETTERS OF ASSESSMENT

A.
Sample letter of
request to external evaluators
.


B.
Identification of those who have written assessments, including a brief statement of the
evaluator's standing in his/her discipline
. Indicate whether the reviewer is the candidate's choice
or the Department Head's choic
e.



C.
Description of the procedure for selecting external evaluators
.



D.
List of materials sent to external evaluators (e.g., copies of publications, vita, narrative
statement, etc.)



E.
A log showing the date on which each external letter was
requested by the Department, and the
date the letter was received (use Form 4.21d). All requests should be entered regardless of
whether a response was obtained
.



F.
Letters of reference from external evaluators
.



Smith
-

Evaluation

E
-
1

Chapter E


STATEMENTS OF EVALUATION OF THE CANDIDATE BY REVIEW COMMITTEES AND
ADMINISTRATOR




Smith
-

Signature

F
-
1

Chapter F


















CANDIDATE SIGNATURE STATEMENT


I have reviewed the contents of
my dossier,

with the exception of confidential materials,

as defined in the HR
-
23 Guidelines.



__________________________________ __________________


Candidate's Signature Date
of Signature