[fc-announce] Financial Cryptography and Data Security '06 - Call for Participation
--- begin forwarded text From: Patrick McDaniel <mcdaniel@cse.psu.edu> To: fc-announce@ifca.ai Subject: [fc-announce] Financial Cryptography and Data Security '06 - Call for Participation Sender: fc-announce-admin@ifca.ai Date: Mon, 30 Jan 2006 08:51:58 -0500 Financial Cryptography and Data Security '06 February 2nd -- March 2nd, 2006 Anguilla, British West Indies http://fc06.ifca.ai EARLY REGISTRATION DATE: FEB 3, 2006 *** Call for Participation and Program *** At its 10th year edition, Financial Cryptography and Data Security (FC'06) is a well established and major international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. Kicking off this the 10th year festivities is our Keynote Address by the renowned cryptographer Ron Rivest. One of the most influential figures in cryptography, Ron will review some of his past predictions and lessons learned over the last 10 years, and prognosticate directions for the next decade. The conference will also feature an invited talk by Michael Froomkin, "Are We All Cypherpunks Yet?", about the current legal landscape of Financial Cryptography. Registration for Financial Cryptography 2006 is now open; details and online registration can be found at http://fc06.ifca.ai along with information about discounted hotel accommodation and travel. Financial Cryptography is organized by the International Financial Cryptography Association (IFCA). More information can be obtained from the IFCA web site at http://www.ifca.ai or by contacting the conference general chair, Patrick McDaniel, at mcdaniel@cse.psu.edu. ** Invited Speakers ** Ron Rivest (Keynote) Michael Froomkin ** Panels ** Ten Years of Financial Cryptography, Moderator: Moti Young Identity Management, Moderator: Frank Trotter ** Main Conference Program ** Authentication and Fraud Detection Authentication and Fraud Detection Phoolproof phishing prevention, Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon University) A Protocol For Secure Public Instant Messaging, Mohammad Mannan and Paul C. van Oorschot (School of Computer Science, Carleton University, Canada) Using Automated Banking Certificates to Detect Unauthorized Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and A. Carpenter (University of Manchester) Privacy Privacy in encrypted content distribution using private broadcast encryption, Adam Barth and Dan Boneh (Stanford University) and Brent Waters (SRI International) A Private Stable Matching Algorithm, Philippe Golle (Palo Alto Research Center) Private Policy Negotiation, Klaus Kursawe and Gregory Neven (Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research Eindhoven) Reputation and Mix-Nets Uncheatable Reputation for Distributed Computation Markets, Bogdan Carbunar (Purdue University) and Radu Sion (Stony Brook University) An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun Furukawa and Kazue Sako (NEC Corporation, Japan) Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi (Indiana University at Bloomington) and Philippe Golle (Palo Alto Research Center) and Markus Jakobsson (Indiana University at Bloomington) Conditional Financial Cryptography A Generic Construction for Token-Controlled Public Key Encryption, David Galindo (Radboud University Nijmegen) and Javier Herranz (INRIA Futurs-Laboratoire d'Informatique (LIX)) Authenticated Key-Insulated Public-Key Encryption and Time-Release Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National Univ., Korea) and Nick Hopper and Yongdae Kim and Osipkov (Dept. of Computer Science and Eng., University of Minnesota-Twin Cities) Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov (Dept. Comp. Sci. University of Toronto) Revisiting Oblivious Signature-Based Envelopes: New Constructs and Properties, Samad Nasserian (RWTH Aachen University) and Gene Tsudik (University of California, Irvine) Payment Systems Provably Secure Electronic Cash based on Blind Multisignature Schemes, Yoshikazu Hanatani (The University of Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and Kazuo Ohta (The University of Electro-Comunications) and Noboru Kunihiro (The University of Electro-Comunications) Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun Yat-sen University, China) and Yi Mu and Willy Susilo (University of Wollongong, Australia) Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT Centre, Australia) Efficient Protocols Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea) Efficient Correlated Action Selection, Mikhail Atallah and Marina Blanton and Keith Frikken and Jiangtao Li (Department of Computer Science, Purdue University) Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination, Aggelos Kiayias (University of Connecticut) and Moti Yung (RSA Labs & Columbia Univ.) ** Short Papers ** A Practical Implementation of Secure Auctions based on Multiparty Integer Computation, Peter Bogetoft (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Ivan Damgaard (Dept. of Computer Science, University of Aarhus) and Thomas Jakobsen (Dept. of Computer Science, University of Aarhus) and Kurt Nielsen (Food and Resources Economic Institute, The Royal Veterinary and Agricultural University, Denmark) and Jakob Pagter (Dept. of Computer Science, University of Aarhus) and Tomas Toft (Dept. of Computer Science, University of Aarhus) Defeating Malicious Servers in a Blind Signatures Based Voting System, Sebastien Canard and Matthieu Gaud and Jacques Traore (France Telecom R&D, France) Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information Security, Department of Computer Science, University College London) and Tanja Lange (Technical University of Denmark) Credit transfer within market-based resource allocation infrastructure, Tyler Close (HP Palo Alto) A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions, Michael Szydlo (RSA Laboratories) Cryptanalysis of a partially blind signature scheme or "How to make 100$ bills with 1$ and 2$ ones", Gwenalle Martinet and Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France) An Efficient Group Signature with Concurrently-Secure Joining (invited), by I. Teranishi and J. Furukawa (NEC corporation) ** Additional Events ** In addition to the formal conference sessions, there will be an evening Rump Session of informal results and works-in-progress, an afternoon session of presentations by some of our sponsors (including Stefan Roever of Navio and Nicko van Someren of nCipher), and a program of social events (see the conference website for details). ---- We wish to thank the conference sponsors for their invaluable assistance in making this conference possible: Bibit, Everbank, Google, Navio, nCipher, Offshore Information Services. We would also like to thank Telcordia for their technical assistance with the online submission and review process. - _______________________________________________ fc-announce mailing list fc-announce@ifca.ai http://mail.ifca.ai/mailman/listinfo/fc-announce --- end forwarded text -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
participants (1)
-
R. A. Hettinga