[mcdaniel at cse.psu.edu: Financial Cryptography and Data Security '06 - Call for Participation]

R. Hirschfeld ray at unipay.nl
Mon Jan 30 09:14:23 EST 2006

From: Patrick McDaniel <mcdaniel at cse.psu.edu>
Subject: Financial Cryptography and Data Security '06 - Call for Participation
To: fc-announce at ifca.ai
Date: Mon, 30 Jan 2006 08:51:58 -0500

              Financial Cryptography and Data Security '06
                    February 2nd -- March 2nd, 2006
                     Anguilla, British West Indies
                  EARLY REGISTRATION DATE: FEB 3, 2006

               *** Call for Participation and Program ***

At its 10th year edition, Financial Cryptography and Data Security
(FC'06) is a well established and major international forum for
research, advanced development, education, exploration, and debate
regarding security in the context of finance and commerce. Kicking off
this the 10th year festivities is our Keynote Address by the renowned
cryptographer Ron Rivest.  One of the most influential figures in
cryptography, Ron will review some of his past predictions and lessons
learned over the last 10 years, and prognosticate directions for the
next decade.  The conference will also feature an invited talk by
Michael Froomkin, "Are We All Cypherpunks Yet?", about the current
legal landscape of Financial Cryptography.

Registration for Financial Cryptography 2006 is now open; details and
online registration can be found at http://fc06.ifca.ai along with
information about discounted hotel accommodation and travel.

Financial Cryptography is organized by the International Financial
Cryptography Association (IFCA). More information can be obtained from
the IFCA web site at http://www.ifca.ai or by contacting the
conference general chair, Patrick McDaniel, at mcdaniel at cse.psu.edu.

			** Invited Speakers **

Ron Rivest (Keynote)

Michael Froomkin

			     ** Panels **

Ten Years of Financial Cryptography, Moderator: Moti Young

Identity Management, Moderator: Frank Trotter

		    ** Main Conference Program **

Authentication and Fraud Detection

     Authentication and Fraud Detection Phoolproof phishing prevention,
     Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon

     A Protocol For Secure Public Instant Messaging, Mohammad Mannan
     and Paul C. van Oorschot (School of Computer Science, Carleton
     University, Canada)

     Using Automated Banking Certificates to Detect Unauthorized
     Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and
     A. Carpenter (University of Manchester)


     Privacy in encrypted content distribution using private broadcast
     encryption, Adam Barth and Dan Boneh (Stanford University) and
     Brent Waters (SRI International)

     A Private Stable Matching Algorithm, Philippe Golle (Palo Alto
     Research Center)

     Private Policy Negotiation, Klaus Kursawe and Gregory Neven
     (Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research

Reputation and Mix-Nets

     Uncheatable Reputation for Distributed Computation Markets, Bogdan
     Carbunar (Purdue University) and Radu Sion (Stony Brook

     An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun
     Furukawa and Kazue Sako (NEC Corporation, Japan)

     Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi
     (Indiana University at Bloomington) and Philippe Golle (Palo Alto
     Research Center) and Markus Jakobsson (Indiana University at

Conditional Financial Cryptography

     A Generic Construction for Token-Controlled Public Key Encryption,
     David Galindo (Radboud University Nijmegen) and Javier Herranz
     (INRIA Futurs-Laboratoire d'Informatique (LIX))

     Authenticated Key-Insulated Public-Key Encryption and Time-Release
     Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National
     Univ., Korea) and Nick Hopper and Yongdae Kim and Osipkov
     (Dept. of Computer Science and Eng., University of Minnesota-Twin

     Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian
     F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov
     (Dept. Comp. Sci. University of Toronto)

     Revisiting Oblivious Signature-Based Envelopes: New Constructs and
     Properties, Samad Nasserian (RWTH Aachen University) and Gene
     Tsudik (University of California, Irvine)

Payment Systems

     Provably Secure Electronic Cash based on Blind Multisignature
     Schemes, Yoshikazu Hanatani (The University of
     Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and
     Kazuo Ohta (The University of Electro-Comunications) and Noboru
     Kunihiro (The University of Electro-Comunications)

     Efficient Provably Secure Restrictive Partially Blind Signatures
     from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun
     Yat-sen University, China) and Yi Mu and Willy Susilo (University
     of Wollongong, Australia)

     Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT
     Centre, Australia)

Efficient Protocols

     Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong
     Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea)

     Efficient Correlated Action Selection, Mikhail Atallah and Marina
     Blanton and Keith Frikken and Jiangtao Li (Department of Computer
     Science, Purdue University)

     Efficient Cryptographic Protocols Realizing E-Markets with Price
     Discrimination, Aggelos Kiayias (University of Connecticut) and
     Moti Yung (RSA Labs & Columbia Univ.)

			  ** Short Papers **

     A Practical Implementation of Secure Auctions based on Multiparty
     Integer Computation, Peter Bogetoft (Food and Resources Economic
     Institute, The Royal Veterinary and Agricultural University,
     Denmark) and Ivan Damgaard (Dept. of Computer Science, University
     of Aarhus) and Thomas Jakobsen (Dept. of Computer Science,
     University of Aarhus) and Kurt Nielsen (Food and Resources
     Economic Institute, The Royal Veterinary and Agricultural
     University, Denmark) and Jakob Pagter (Dept. of Computer Science,
     University of Aarhus) and Tomas Toft (Dept. of Computer Science,
     University of Aarhus)

     Defeating Malicious Servers in a Blind Signatures Based Voting
     System, Sebastien Canard and Matthieu Gaud and Jacques Traore
     (France Telecom R&D, France)

     Pairing Based Threshold Cryptography Improving on
     Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information
     Security, Department of Computer Science, University College
     London) and Tanja Lange (Technical University of Denmark)

     Credit transfer within market-based resource allocation
     infrastructure, Tyler Close (HP Palo Alto)

     A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions,
     Michael Szydlo (RSA Laboratories)

     Cryptanalysis of a partially blind signature scheme or "How to
     make 100$ bills with 1$ and 2$ ones", Gwenalle Martinet and
     Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France)

     An Efficient Group Signature with Concurrently-Secure Joining
     (invited), by I. Teranishi and J. Furukawa (NEC corporation)

		       ** Additional Events **

In addition to the formal conference sessions, there will be an
evening Rump Session of informal results and works-in-progress, an
afternoon session of presentations by some of our sponsors (including
Stefan Roever of Navio and Nicko van Someren of nCipher), and a
program of social events (see the conference website for details).

- ----

We wish to thank the conference sponsors for their invaluable
assistance in making this conference possible: Bibit, Everbank,
Google, Navio, nCipher, Offshore Information Services.

We would also like to thank Telcordia for their technical assistance
with the online submission and review process.

- -

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list