Preliminary Program

All events take place at Paradise Cove unless otherwise noted.
Sunday, February 26, 2006

5:00pm-7:00pm Registration reception
poolside Paradise Cove
Monday, February 27, 2006

7:30am-8:30am Breakfast and Registration

8:30am-8:45am Welcome, Victor Banks, Minister of Finance

8:45am-9:00am Conference opening, Conference Chairs

9:00am-10:00am
Keynote Address

Ron Rivest - Perspectives on Financial Cryptography Revisited

10:00am-10:30am Break

10:30am-12:00pm
Technical Paper Session
Authentication and Fraud Detection

Session Chair: Sven Dietrich

Phoolproof phishing prevention, Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon University)

A Protocol For Secure Public Instant Messaging, Mohammad Mannan and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada)

Using Automated Banking Certificates to Detect Unauthorized Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and A. Carpenter, (Univerisity of Manchester)


12:00pm-1:00pm Lunch

1:00pm-2:30pm Panel: Ten Years of Financial Cryptography, Moderator: Moti Yung

2:30pm-3:00pm Break

3:00pm-4:30pm
Technical Paper Session
Privacy

Session Chair: Mike Szydlo

Privacy in encrypted content distribution using private broadcast encryption, Adam Barth and Dan Boneh (Stanford University) and Brent Waters (SRI International)

A Private Stable Matching Algorithm, Philippe Golle (Palo Alto Research Center)

Private Policy Negotiation, Klaus Kursawe and Gregory Neven (Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research Eindhoven)


4:30pm Adjourn

6:00pm-9:00pm Reception
Location: Dune Preserve
Tuesday, February 28, 2006

7:30am-8:30am Breakfast

8:30am-10:00am
Technical Paper Session
Reputation and Mix-Nets

Session Chair: Yacov Yacobi

Uncheatable Reputation for Distributed Computation Markets, Bogdan Carbunar (Purdue University) and Radu Sion (Stony Brook University)

An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun Furukawa and Kazue Sako (NEC Corporation, Japan)

Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi (Indiana University at Bloomington) and Philippe Golle (Palo Alto Research Center) and Markus Jakobsson (Indiana University at Bloomington)


10:00am-10:30am Break

10:30am-12:00pm
Short Technical Paper Session
Session Chair: Gene Tsudik

A Practical Implementation of Secure Auctions based on Multiparty Integer Computation, Peter Bogetoft (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Ivan Damgård (Dept. of Computer Science, University of Aarhus) and Thomas Jakobsen (Dept. of Computer Science, University of Aarhus) and Kurt Nielsen (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Jakob Pagter (Dept. of Computer Science, University of Aarhus) and Tomas Toft (Dept. of Computer Science, University of Aarhus)

Defeating Malicious Servers in a Blind Signatures Based Voting System, Sebastien Canard and Matthieu Gaud and Jacques Traore (France Telecom R&D, France)

Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information Security, Department of Computer Science, University College London) and Tanja Lange (Technical University of Denmark)

Credit transfer within market-based resource allocation infrastructure, Tyler Close (HP Palo Alto)

A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions, Michael Szydlo (RSA Laboratories)

Cryptanalysis of a partially blind signature scheme or "How to make 100$ bills with 1$ and 2$ ones", Gwenaëlle Martinet and Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France)

An Efficient Group Signature with Concurrently-Secure Joining (work in progress), by I. Teranishi and J. Furukawa (NEC corporation)


12:00pm Adjourn - Box Lunches Available

8:00pm-9:00pm IFCA General Meeting, Location: Chandeliers

9:00pm-12:00am Rump Session
Location: Chandeliers
Session Chair: Moti Yung
Wednesday, March 1, 2006

7:30am-8:30am Breakfast

8:30am-10:30pm
Technical Paper Session
Conditional Financial Cryptography

Session Chair: Ray Hirschfeld

A Generic Construction for Token-Controlled Public Key Encryption, David Galindo (Radboud University Nijmegen) and Javier Herranz (INRIA Futurs-Laboratoire d'Informatique (LIX))

Authenticated Key-Insulated Public-Key Encryption and Time-Release Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National Univ., Korea) and Nick Hopper and Yongdae Kim and Ivan Osipkov (Dept. of Computer Science and Eng., University of Minnesota-Twin Cities)

Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov (Dept. Comp. Sci. University of Toronto)

Revisiting Oblivious Signature-Based Envelopes: New Constructs and Properties, Samad Nasserian (RWTH Aachen University) and Gene Tsudik (University of California, Irvine)


10:30am-11:00am Break

11:00am-12:30pm
Technical Paper Session
Payment Systems

Session Chair: Jean Camp

Provably Secure Electronic Cash based on Blind Multisignature Schemes, Yoshikazu Hanatani (The University of Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and Kazuo Ohta (The University of Electro-Comunications) and Noboru Kunihiro (The University of Electro-Comunications)

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun Yat-sen University, China) and Yi Mu and Willy Susilo (University of Wollongong, Australia)

Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT Centre, Australia)


12:30pm-1:30pm Lunch

1:30pm-3:00pm Panel: Identity Management, Moderator: Frank Trotter

3:00pm-3:30pm Sponsor Presentation: nCipher: Nicko van Someren

3:30pm Adjourn

6:00pm-9:00pm Beach BBQ
Location: Anguilla Great House

10:00pm-?? Live music at Dune Preserve
Thursday, March 2, 2006

7:30am-8:30am Breakfast

8:30am-10:00am
Invited Talk --- Michael Froomkin

Title: Are We All Cypherpunks Yet?

Ten years ago we said "cypherpunks write code". Many, many lines of code later, cypherpunks often wear suits and answer to titles like Vice-President or CTO. The US has loosened its controls on crypto export, but we're still waiting for a large scale deployment of digital cash. Tim May's infopocalypse has yet to arrive, although his Four Horsemen, the "terrorists, child pornographers, money launderers, and drug dealers" have been joined by a powerful fifth entrant, the evil content pirate.

Ten years ago law enforcement was scrambling to catch up with new technology. Today they have their sights firmly on key physical, legal, and social chokepoints in the information infrastructure. And it remains true that from the point of view of intermediaries trying to acquire content, an encrypted message bearing value usually is indistinguishable from one carrying star warez, Star Wars(tm), or the plans for star wars, the weapon system. And strong end-to-end crypto still doesn't come with Windows(tm).

Today, even if the details remain a little murky, we now know (instead of just fearing) that the NSA isn't just spying outside the US -- it's spying on US citizens too. What is more, the current US administration asserts that its powers to eavesdrop exist independent not only of Congressional authorization, but Constitutionally superior to any Congressional effort to stop it.

Meanwhile the President of the Untied States asserts the authority to arrest anyone, anywhere (including domestically), to hold them for as long as he wishes, and -- if they are non-US citizens captured abroad -- to subject them to treatment most people would not hesitate to call torture. Here too, the administration sometimes suggests that its powers are plenary and subject to neither international law nor even Congressional diminution.

Are we all cypherpunks yet? And is it too late to matter?


10:00am-10:30am Break

10:30am-12:00pm
Technical Paper Session
Efficient Protocols

Session Chair: Tatsuaki Okamoto

Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea)

Efficient Correlated Action Selection, Mikhail Atallah and Marina Blanton and Keith Frikken and Jiangtao Li (Department of Computer Science, Purdue University)

Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination, Aggelos Kiayias (University of Connecticut) and Moti Yung (RSA Labs & Columbia Univ.)


12:00pm-1:00pm Conference closing/Lunch, Conference Chairs