[fc-announce] FC'04: Call for Participation

Hinde ten Berge hinde@xs4all.nl
Tue, 16 Dec 2003 19:56:27 +0100

            Financial Cryptography '04
                9-12 February 2004
              Key West, Florida, USA

              Call for Participation

Financial Cryptography is the premier international
forum for education, exploration, and debate at the
heart of one theme: Money and trust in the digital
world. Dedicated to the relationship between cryptography
and data security and cutting-edge financial and payment
technologies and trends, the conference brings together
top data-security specialists and scientists with
economists, bankers, implementers, and policy makers. 

Financial Cryptography includes a program of invited
talks, academic presentations, technical demonstrations,
and panel discussions. These explore a range of topics
in their full technical and interdisciplinary complexity:
Emerging financial instruments and trends, legal
regulation of financial technologies and privacy issues,
encryption and authentication techologies, digital cash,
and smartcard payment systems -- among many others. 

The conference proceedings containing all accepted
submissions will be published in the Springer-Verlag
Lecture Notes in Computer Science (LNCS) series after
the conference. A pre-proceedings containing preliminary
versions of the papers will be distributed at the

More information on the invited speakers is available
on the web site, as well as the list of accepted papers
and the preliminary schedule (see below as well).

Registration for Financial Cryptography 2004 is now open;
details and online registration can be found at
http://fc04.ifca.ai along with information about
discounted hotel accommodation and travel.

Financial Cryptography is organized by the International
Financial Cryptography Association (IFCA). More
information can be obtained from the IFCA web site at
http://www.ifca.ai or by contacting the conference
general chair, Hinde ten Berge, at hinde@xs4all.nl.

            Financial Cryptography '04
               Preliminary Schedule

Sunday February 8

[tba] Registration and Welcome Reception

Monday February 9

08:45-09:00     Opening Remarks

09:00-10:00     Keynote Speaker: Jack Selby 

10:00-11:00     Keynote Speaker: Ron Rivest

11:00-11:30     Coffee Break

11:30-12:30     Loyalty and Micropayment Systems

    Microcredits for Verifiable Foreign Service 
    Provider Metering
    Craig Gentry and Zulfikar Ramzan

    A Privacy-Friendly Loyalty System Based on Discrete 
    Logarithms over Elliptic Curves
    Matthias Enzmann, Marc Fischlin, and Markus Schneider

12:30-14:00     Lunch

14:00-15:00     User Authentication

    Addressing Online Dictionary Attacks with Login 
    Histories and Humans-in-the-Loop
    S. Stubblebine and P.C. van Oorschot

    Call Center Customer Verification by Query-Directed 
    Lawrence O’Gorman, Smit Begga, and John Bentley

Tuesday February 10

09:00-10:00     Keynote Speaker: Jacques Stern 
                (Session Chair: Moti Yung)

10:00-11:00     Keynote Speaker: Simon Pugh 
                (Session Chair: Moti Yung)

11:00–11:30     Coffee Break

11:30-12:30     E-voting 
                (Session Chair: Helger Lipmaa)

    The Vector-Ballot E-Voting Approach
    Aggelos Kiayias and Moti Yung

    Efficient Maximal Privacy in Voting and Anonymous 
    Jens Groth

12:30-14:00     Lunch

14:00-15:00     Panel: Building Usable Security Systems
                Moderator: Andrew Patrick

    Usability and Acceptablity of Biometric Security
    Andrew Patrick, National Research Council of Canada

    Risk Perception Failures in Computer Security
    L. Jean Camp, Harvard University
    Visualization Tools for Security Administrators
    Bill Yurcik, NCSA, Univeristy of Illinois

20:00-21:00     General meeting

21:00-          Rump session

Wednesday February 11

09:00-10:00     Keynote Speaker: Jon Peha

10:00-10:30     Coffee Break

10:30-12:30     Auctions and Lotteries 
                (Session Chair: Roger Dingledine)

    Interleaving Cryptography and Mechanism Design: The
    Case of Online Auctions
    Edith Elkind and Helger Lipmaa

    Secure Generalized Vickrey Auction without Third-Party 
    Makoto Yokoo and Koutarou Suzuki

    Electronic National Lotteries
    Elisavet Konstantinou, Vasiliki Liagokou, Paul
    Spirakis, Yannis C. Stamatiou, and Moti Yung

    Identity-based Chameleon Hash and Applications
    Giuseppe Ateniese and Breno de Medeiros

12:30-14:00     Lunch

Thursday February 12

09:00–10:30     Game Theoretic and Cryptographic Tools

    Selecting Correlated Random Actions
    Vanessa Teague

    An Efficient and Usable Multi-Show Non-Transferable 
    Anonymous Credential System
    Pino Persiano and Ivan Visconti

    The Ephemeral Pairing Problem
    Jaap-Henk Hoepman

10:30–11:00     Coffee Break

11:00–13:00     Mix Networks and Anonymous Communications 
                (Session Chair: Masayuki Abe)

    Mixminion: Strong Anonymity for Financial Cryptography
    Nick Mathewson and Roger Dingledine

    Practical Anonymity for the Masses with MorphMix
    Marc Rennhard and Bernhard Plattner

    Stopping Timing Attacks in Low-Latency Mix-Based
    Brian N. Levine, Michael K. Reiter, and Chenxi Wang

    Provable Unlinkability Against Traffic Analysis
    Ron Berman, Amos Fiat, and Amnon Ta-Shma