[fc-announce] Financial Cryptography and Data Security '06 - Call for Participation
Patrick McDaniel
mcdaniel@cse.psu.edu
Mon, 30 Jan 2006 08:51:58 -0500
Financial Cryptography and Data Security '06
February 2nd -- March 2nd, 2006
Anguilla, British West Indies
http://fc06.ifca.ai
EARLY REGISTRATION DATE: FEB 3, 2006
*** Call for Participation and Program ***
At its 10th year edition, Financial Cryptography and Data Security
(FC'06) is a well established and major international forum for
research, advanced development, education, exploration, and debate
regarding security in the context of finance and commerce. Kicking off
this the 10th year festivities is our Keynote Address by the renowned
cryptographer Ron Rivest. One of the most influential figures in
cryptography, Ron will review some of his past predictions and lessons
learned over the last 10 years, and prognosticate directions for the
next decade. The conference will also feature an invited talk by
Michael Froomkin, "Are We All Cypherpunks Yet?", about the current
legal landscape of Financial Cryptography.
Registration for Financial Cryptography 2006 is now open; details and
online registration can be found at http://fc06.ifca.ai along with
information about discounted hotel accommodation and travel.
Financial Cryptography is organized by the International Financial
Cryptography Association (IFCA). More information can be obtained from
the IFCA web site at http://www.ifca.ai or by contacting the
conference general chair, Patrick McDaniel, at mcdaniel@cse.psu.edu.
** Invited Speakers **
Ron Rivest (Keynote)
Michael Froomkin
** Panels **
Ten Years of Financial Cryptography, Moderator: Moti Young
Identity Management, Moderator: Frank Trotter
** Main Conference Program **
Authentication and Fraud Detection
Authentication and Fraud Detection Phoolproof phishing prevention,
Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon
University)
A Protocol For Secure Public Instant Messaging, Mohammad Mannan
and Paul C. van Oorschot (School of Computer Science, Carleton
University, Canada)
Using Automated Banking Certificates to Detect Unauthorized
Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and
A. Carpenter (University of Manchester)
Privacy
Privacy in encrypted content distribution using private broadcast
encryption, Adam Barth and Dan Boneh (Stanford University) and
Brent Waters (SRI International)
A Private Stable Matching Algorithm, Philippe Golle (Palo Alto
Research Center)
Private Policy Negotiation, Klaus Kursawe and Gregory Neven
(Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research
Eindhoven)
Reputation and Mix-Nets
Uncheatable Reputation for Distributed Computation Markets, Bogdan
Carbunar (Purdue University) and Radu Sion (Stony Brook
University)
An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun
Furukawa and Kazue Sako (NEC Corporation, Japan)
Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi
(Indiana University at Bloomington) and Philippe Golle (Palo Alto
Research Center) and Markus Jakobsson (Indiana University at
Bloomington)
Conditional Financial Cryptography
A Generic Construction for Token-Controlled Public Key Encryption,
David Galindo (Radboud University Nijmegen) and Javier Herranz
(INRIA Futurs-Laboratoire d'Informatique (LIX))
Authenticated Key-Insulated Public-Key Encryption and Time-Release
Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National
Univ., Korea) and Nick Hopper and Yongdae Kim and Osipkov
(Dept. of Computer Science and Eng., University of Minnesota-Twin
Cities)
Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian
F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov
(Dept. Comp. Sci. University of Toronto)
Revisiting Oblivious Signature-Based Envelopes: New Constructs and
Properties, Samad Nasserian (RWTH Aachen University) and Gene
Tsudik (University of California, Irvine)
Payment Systems
Provably Secure Electronic Cash based on Blind Multisignature
Schemes, Yoshikazu Hanatani (The University of
Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and
Kazuo Ohta (The University of Electro-Comunications) and Noboru
Kunihiro (The University of Electro-Comunications)
Efficient Provably Secure Restrictive Partially Blind Signatures
from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun
Yat-sen University, China) and Yi Mu and Willy Susilo (University
of Wollongong, Australia)
Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT
Centre, Australia)
Efficient Protocols
Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong
Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea)
Efficient Correlated Action Selection, Mikhail Atallah and Marina
Blanton and Keith Frikken and Jiangtao Li (Department of Computer
Science, Purdue University)
Efficient Cryptographic Protocols Realizing E-Markets with Price
Discrimination, Aggelos Kiayias (University of Connecticut) and
Moti Yung (RSA Labs & Columbia Univ.)
** Short Papers **
A Practical Implementation of Secure Auctions based on Multiparty
Integer Computation, Peter Bogetoft (Food and Resources Economic
Institute, The Royal Veterinary and Agricultural University,
Denmark) and Ivan Damgaard (Dept. of Computer Science, University
of Aarhus) and Thomas Jakobsen (Dept. of Computer Science,
University of Aarhus) and Kurt Nielsen (Food and Resources
Economic Institute, The Royal Veterinary and Agricultural
University, Denmark) and Jakob Pagter (Dept. of Computer Science,
University of Aarhus) and Tomas Toft (Dept. of Computer Science,
University of Aarhus)
Defeating Malicious Servers in a Blind Signatures Based Voting
System, Sebastien Canard and Matthieu Gaud and Jacques Traore
(France Telecom R&D, France)
Pairing Based Threshold Cryptography Improving on
Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information
Security, Department of Computer Science, University College
London) and Tanja Lange (Technical University of Denmark)
Credit transfer within market-based resource allocation
infrastructure, Tyler Close (HP Palo Alto)
A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions,
Michael Szydlo (RSA Laboratories)
Cryptanalysis of a partially blind signature scheme or "How to
make 100$ bills with 1$ and 2$ ones", Gwenalle Martinet and
Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France)
An Efficient Group Signature with Concurrently-Secure Joining
(invited), by I. Teranishi and J. Furukawa (NEC corporation)
** Additional Events **
In addition to the formal conference sessions, there will be an
evening Rump Session of informal results and works-in-progress, an
afternoon session of presentations by some of our sponsors (including
Stefan Roever of Navio and Nicko van Someren of nCipher), and a
program of social events (see the conference website for details).
----
We wish to thank the conference sponsors for their invaluable
assistance in making this conference possible: Bibit, Everbank,
Google, Navio, nCipher, Offshore Information Services.
We would also like to thank Telcordia for their technical assistance
with the online submission and review process.
-