Financial Cryptography '04 9-12 February 2004 Key West, Florida, USA Call for Participation Financial Cryptography is the premier international forum for education, exploration, and debate at the heart of one theme: Money and trust in the digital world. Dedicated to the relationship between cryptography and data security and cutting-edge financial and payment technologies and trends, the conference brings together top data-security specialists and scientists with economists, bankers, implementers, and policy makers. Financial Cryptography includes a program of invited talks, academic presentations, technical demonstrations, and panel discussions. These explore a range of topics in their full technical and interdisciplinary complexity: Emerging financial instruments and trends, legal regulation of financial technologies and privacy issues, encryption and authentication techologies, digital cash, and smartcard payment systems -- among many others. The conference proceedings containing all accepted submissions will be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series after the conference. A pre-proceedings containing preliminary versions of the papers will be distributed at the conference. More information on the invited speakers is available on the web site, as well as the list of accepted papers and the preliminary schedule (see below as well). Registration for Financial Cryptography 2004 is now open; details and online registration can be found at http://fc04.ifca.ai along with information about discounted hotel accommodation and travel. Financial Cryptography is organized by the International Financial Cryptography Association (IFCA). More information can be obtained from the IFCA web site at http://www.ifca.ai or by contacting the conference general chair, Hinde ten Berge, at hinde@xs4all.nl. Financial Cryptography '04 Preliminary Schedule Sunday February 8 [tba] Registration and Welcome Reception Monday February 9 08:45-09:00 Opening Remarks 09:00-10:00 Keynote Speaker: Jack Selby 10:00-11:00 Keynote Speaker: Ron Rivest 11:00-11:30 Coffee Break 11:30-12:30 Loyalty and Micropayment Systems Microcredits for Verifiable Foreign Service Provider Metering Craig Gentry and Zulfikar Ramzan A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves Matthias Enzmann, Marc Fischlin, and Markus Schneider 12:30-14:00 Lunch 14:00-15:00 User Authentication Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop S. Stubblebine and P.C. van Oorschot Call Center Customer Verification by Query-Directed Passwords Lawrence OGorman, Smit Begga, and John Bentley Tuesday February 10 09:00-10:00 Keynote Speaker: Jacques Stern (Session Chair: Moti Yung) 10:00-11:00 Keynote Speaker: Simon Pugh (Session Chair: Moti Yung) 11:0011:30 Coffee Break 11:30-12:30 E-voting (Session Chair: Helger Lipmaa) The Vector-Ballot E-Voting Approach Aggelos Kiayias and Moti Yung Efficient Maximal Privacy in Voting and Anonymous Broadcast Jens Groth 12:30-14:00 Lunch 14:00-15:00 Panel: Building Usable Security Systems Moderator: Andrew Patrick Usability and Acceptablity of Biometric Security Systems Andrew Patrick, National Research Council of Canada Risk Perception Failures in Computer Security L. Jean Camp, Harvard University Visualization Tools for Security Administrators Bill Yurcik, NCSA, Univeristy of Illinois 20:00-21:00 General meeting 21:00- Rump session Wednesday February 11 09:00-10:00 Keynote Speaker: Jon Peha 10:00-10:30 Coffee Break 10:30-12:30 Auctions and Lotteries (Session Chair: Roger Dingledine) Interleaving Cryptography and Mechanism Design: The Case of Online Auctions Edith Elkind and Helger Lipmaa Secure Generalized Vickrey Auction without Third-Party Servers Makoto Yokoo and Koutarou Suzuki Electronic National Lotteries Elisavet Konstantinou, Vasiliki Liagokou, Paul Spirakis, Yannis C. Stamatiou, and Moti Yung Identity-based Chameleon Hash and Applications Giuseppe Ateniese and Breno de Medeiros 12:30-14:00 Lunch Thursday February 12 09:0010:30 Game Theoretic and Cryptographic Tools Selecting Correlated Random Actions Vanessa Teague An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System Pino Persiano and Ivan Visconti The Ephemeral Pairing Problem Jaap-Henk Hoepman 10:3011:00 Coffee Break 11:0013:00 Mix Networks and Anonymous Communications (Session Chair: Masayuki Abe) Mixminion: Strong Anonymity for Financial Cryptography Nick Mathewson and Roger Dingledine Practical Anonymity for the Masses with MorphMix Marc Rennhard and Bernhard Plattner Stopping Timing Attacks in Low-Latency Mix-Based Systems Brian N. Levine, Michael K. Reiter, and Chenxi Wang Provable Unlinkability Against Traffic Analysis Ron Berman, Amos Fiat, and Amnon Ta-Shma _______________________________________________ fc-announce mailing list fc-announce@ifca.ai http://mail.ifca.ai/mailman/listinfo/fc-announce --- end forwarded text -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'