6月1日 | 7:30 - 8:30 | 论坛注册 | |
| 8:30 - 8:45 | 论坛合影 | |
| 8:45 - 9:00 | Opening & Welcome | Zhan Qin & Bingsheng Zhang |
| 9:00 - 9:50 | A brief introduction to secure multiparty computation | Chaoping Xing |
| 9:50 - 10:40 | The Techniques of Secure Computation in Big Data | Zhenfu Cao |
| 10:40 - 11:10 | Tea Break | |
| 11:10 - 12:00 | Into the New Privacy Era: Hardware Assisted Large-Scale Secure Computing | Xiaofeng Wang |
| 12:00 - 14:00 | Lunch | |
| 14:00 - 14:50 | Communication-efficient federated learning | Yaochu Jin |
| 14:50 - 15:40 | End-to-Same-End Encryption: Designing Modular, Efficient, and Portable Blind Cloud Storage | Qiang Tang |
| 15:40 - 16:10 | Tea Break | |
| 16:10 - 17:00 | Practical Quantum Private Query | Fei Gao |
| 18:00 - 20:00 | Dinner | |
| | | |
6月2日 | | | |
| 9:00 - 9:50 | TPM and its host platform - a special case of two-party computation | Liqun Chen |
| 9:50 - 10:40 | Leakage Deterring Authenticated Secret Sharing and Application to Secure Cloud Computing
| Qiuliang Xu |
| 10:40 - 11:10 | Tea Break | |
| 14:50 - 15:40 | 分布式共识机制 | Lei Wang |
| 12:00 - 14:00 | Lunch | |
| 14:00 - 14:50 | Card-based Majority Voting Protocols with Three Inputs Using Three Cards | Kazuo Ohta |
| 11:10 - 12:00 | Cloud-assisted Secure Computing for IoT | Bo Luo |
| 15:40 - 16:10 | Tea Break | |
| 16:10 - 17:00 | Efficient Secure String-Comparison from Custom Garbing | Yan Huang |
| 18:00 - 20:00 | Dinner | |