Preliminary Program
All events take place at Paradise Cove unless otherwise noted. | |
Sunday, February 26, 2006 | |
5:00pm-7:00pm | Registration reception poolside Paradise Cove |
Monday, February 27, 2006 | |
7:30am-8:30am | Breakfast and Registration |
8:30am-8:45am | Welcome, Victor Banks, Minister of Finance |
8:45am-9:00am | Conference opening, Conference Chairs |
10:00am-10:30am | Break |
10:30am-12:00pm |
Authentication and Fraud Detection Session Chair: Sven Dietrich Phoolproof phishing prevention, Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon University) A Protocol For Secure Public Instant Messaging, Mohammad Mannan and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada) Using Automated Banking Certificates to Detect Unauthorized Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and A. Carpenter, (Univerisity of Manchester) |
12:00pm-1:00pm | Lunch |
1:00pm-2:30pm | Panel: Ten Years of Financial Cryptography, Moderator: Moti Yung |
2:30pm-3:00pm | Break |
3:00pm-4:30pm |
Privacy Session Chair: Mike Szydlo Privacy in encrypted content distribution using private broadcast encryption, Adam Barth and Dan Boneh (Stanford University) and Brent Waters (SRI International) A Private Stable Matching Algorithm, Philippe Golle (Palo Alto Research Center) Private Policy Negotiation, Klaus Kursawe and Gregory Neven (Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research Eindhoven) |
4:30pm | Adjourn |
6:00pm-9:00pm | Reception Location: Dune Preserve |
Tuesday, February 28, 2006 | |
7:30am-8:30am | Breakfast |
8:30am-10:00am |
Reputation and Mix-Nets Session Chair: Yacov Yacobi Uncheatable Reputation for Distributed Computation Markets, Bogdan Carbunar (Purdue University) and Radu Sion (Stony Brook University) An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun Furukawa and Kazue Sako (NEC Corporation, Japan) Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi (Indiana University at Bloomington) and Philippe Golle (Palo Alto Research Center) and Markus Jakobsson (Indiana University at Bloomington) |
10:00am-10:30am | Break |
10:30am-12:00pm |
Session Chair: Gene Tsudik A Practical Implementation of Secure Auctions based on Multiparty Integer Computation, Peter Bogetoft (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Ivan Damgård (Dept. of Computer Science, University of Aarhus) and Thomas Jakobsen (Dept. of Computer Science, University of Aarhus) and Kurt Nielsen (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Jakob Pagter (Dept. of Computer Science, University of Aarhus) and Tomas Toft (Dept. of Computer Science, University of Aarhus) Defeating Malicious Servers in a Blind Signatures Based Voting System, Sebastien Canard and Matthieu Gaud and Jacques Traore (France Telecom R&D, France) Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information Security, Department of Computer Science, University College London) and Tanja Lange (Technical University of Denmark) Credit transfer within market-based resource allocation infrastructure, Tyler Close (HP Palo Alto) A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions, Michael Szydlo (RSA Laboratories) Cryptanalysis of a partially blind signature scheme or "How to make 100$ bills with 1$ and 2$ ones", Gwenaëlle Martinet and Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France) An Efficient Group Signature with Concurrently-Secure Joining (work in progress), by I. Teranishi and J. Furukawa (NEC corporation) |
12:00pm | Adjourn - Box Lunches Available |
8:00pm-9:00pm | IFCA General Meeting, Location: Chandeliers |
9:00pm-12:00am | Rump Session Location: Chandeliers Session Chair: Moti Yung |
Wednesday, March 1, 2006 | |
7:30am-8:30am | Breakfast |
8:30am-10:30pm |
Conditional Financial Cryptography Session Chair: Ray Hirschfeld A Generic Construction for Token-Controlled Public Key Encryption, David Galindo (Radboud University Nijmegen) and Javier Herranz (INRIA Futurs-Laboratoire d'Informatique (LIX)) Authenticated Key-Insulated Public-Key Encryption and Time-Release Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National Univ., Korea) and Nick Hopper and Yongdae Kim and Ivan Osipkov (Dept. of Computer Science and Eng., University of Minnesota-Twin Cities) Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov (Dept. Comp. Sci. University of Toronto) Revisiting Oblivious Signature-Based Envelopes: New Constructs and Properties, Samad Nasserian (RWTH Aachen University) and Gene Tsudik (University of California, Irvine) |
10:30am-11:00am | Break |
11:00am-12:30pm |
Payment Systems Session Chair: Jean Camp Provably Secure Electronic Cash based on Blind Multisignature Schemes, Yoshikazu Hanatani (The University of Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and Kazuo Ohta (The University of Electro-Comunications) and Noboru Kunihiro (The University of Electro-Comunications) Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun Yat-sen University, China) and Yi Mu and Willy Susilo (University of Wollongong, Australia) Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT Centre, Australia) |
12:30pm-1:30pm | Lunch |
1:30pm-3:00pm | Panel: Identity Management, Moderator: Frank Trotter |
3:00pm-3:30pm | Sponsor Presentation: nCipher: Nicko van Someren |
3:30pm | Adjourn |
6:00pm-9:00pm | Beach BBQ Location: Anguilla Great House |
10:00pm-?? | Live music at Dune Preserve |
Thursday, March 2, 2006 | |
7:30am-8:30am | Breakfast |
8:30am-10:00am |
Title: Are We All Cypherpunks Yet? Ten years ago we said "cypherpunks write code". Many, many lines of code later, cypherpunks often wear suits and answer to titles like Vice-President or CTO. The US has loosened its controls on crypto export, but we're still waiting for a large scale deployment of digital cash. Tim May's infopocalypse has yet to arrive, although his Four Horsemen, the "terrorists, child pornographers, money launderers, and drug dealers" have been joined by a powerful fifth entrant, the evil content pirate. Ten years ago law enforcement was scrambling to catch up with new technology. Today they have their sights firmly on key physical, legal, and social chokepoints in the information infrastructure. And it remains true that from the point of view of intermediaries trying to acquire content, an encrypted message bearing value usually is indistinguishable from one carrying star warez, Star Wars(tm), or the plans for star wars, the weapon system. And strong end-to-end crypto still doesn't come with Windows(tm). Today, even if the details remain a little murky, we now know (instead of just fearing) that the NSA isn't just spying outside the US -- it's spying on US citizens too. What is more, the current US administration asserts that its powers to eavesdrop exist independent not only of Congressional authorization, but Constitutionally superior to any Congressional effort to stop it. Meanwhile the President of the Untied States asserts the authority to arrest anyone, anywhere (including domestically), to hold them for as long as he wishes, and -- if they are non-US citizens captured abroad -- to subject them to treatment most people would not hesitate to call torture. Here too, the administration sometimes suggests that its powers are plenary and subject to neither international law nor even Congressional diminution. Are we all cypherpunks yet? And is it too late to matter? |
10:00am-10:30am | Break |
10:30am-12:00pm |
Efficient Protocols Session Chair: Tatsuaki Okamoto Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea) Efficient Correlated Action Selection, Mikhail Atallah and Marina Blanton and Keith Frikken and Jiangtao Li (Department of Computer Science, Purdue University) Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination, Aggelos Kiayias (University of Connecticut) and Moti Yung (RSA Labs & Columbia Univ.) |
12:00pm-1:00pm | Conference closing/Lunch, Conference Chairs |