[fc-announce] Financial Cryptography and Data Security '06 - Call for Participation

R. A. Hettinga rah at shipwright.com
Mon Jan 30 10:40:02 PST 2006


--- begin forwarded text


  From: Patrick McDaniel <mcdaniel at cse.psu.edu>
  To: fc-announce at ifca.ai
  Subject: [fc-announce] Financial Cryptography and Data Security '06 -
Call for Participation
  Sender: fc-announce-admin at ifca.ai
  Date: Mon, 30 Jan 2006 08:51:58 -0500


               Financial Cryptography and Data Security '06
                     February 2nd -- March 2nd, 2006
                      Anguilla, British West Indies
                           http://fc06.ifca.ai
                   EARLY REGISTRATION DATE: FEB 3, 2006

                *** Call for Participation and Program ***


  At its 10th year edition, Financial Cryptography and Data Security
  (FC'06) is a well established and major international forum for
  research, advanced development, education, exploration, and debate
  regarding security in the context of finance and commerce. Kicking off
  this the 10th year festivities is our Keynote Address by the renowned
  cryptographer Ron Rivest.  One of the most influential figures in
  cryptography, Ron will review some of his past predictions and lessons
  learned over the last 10 years, and prognosticate directions for the
  next decade.  The conference will also feature an invited talk by
  Michael Froomkin, "Are We All Cypherpunks Yet?", about the current
  legal landscape of Financial Cryptography.

  Registration for Financial Cryptography 2006 is now open; details and
  online registration can be found at http://fc06.ifca.ai along with
  information about discounted hotel accommodation and travel.

  Financial Cryptography is organized by the International Financial
  Cryptography Association (IFCA). More information can be obtained from
  the IFCA web site at http://www.ifca.ai or by contacting the
  conference general chair, Patrick McDaniel, at mcdaniel at cse.psu.edu.


  			** Invited Speakers **

  Ron Rivest (Keynote)

  Michael Froomkin

  			     ** Panels **

  Ten Years of Financial Cryptography, Moderator: Moti Young

  Identity Management, Moderator: Frank Trotter


  		    ** Main Conference Program **

  Authentication and Fraud Detection

      Authentication and Fraud Detection Phoolproof phishing prevention,
      Bryan Parno and Cynthia Kuo and Adrian Perrig (Carnegie Mellon
      University)

      A Protocol For Secure Public Instant Messaging, Mohammad Mannan
      and Paul C. van Oorschot (School of Computer Science, Carleton
      University, Canada)

      Using Automated Banking Certificates to Detect Unauthorized
      Financial Transactions, C. Corzo, F. Corzo S., N. Zhang, and
      A. Carpenter (University of Manchester)

  Privacy

      Privacy in encrypted content distribution using private broadcast
      encryption, Adam Barth and Dan Boneh (Stanford University) and
      Brent Waters (SRI International)

      A Private Stable Matching Algorithm, Philippe Golle (Palo Alto
      Research Center)

      Private Policy Negotiation, Klaus Kursawe and Gregory Neven
      (Katholieke Universiteit Leuven) and Pim Tuyls (Philips Research
      Eindhoven)

  Reputation and Mix-Nets

      Uncheatable Reputation for Distributed Computation Markets, Bogdan
      Carbunar (Purdue University) and Radu Sion (Stony Brook
      University)

      An Efficient Publicly Verifiable Mix-net for Long Inputs, Jun
      Furukawa and Kazue Sako (NEC Corporation, Japan)

      Auditable Privacy: On Tamper-evident Mix Networks, Jong Youl Choi
      (Indiana University at Bloomington) and Philippe Golle (Palo Alto
      Research Center) and Markus Jakobsson (Indiana University at
      Bloomington)

  Conditional Financial Cryptography

      A Generic Construction for Token-Controlled Public Key Encryption,
      David Galindo (Radboud University Nijmegen) and Javier Herranz
      (INRIA Futurs-Laboratoire d'Informatique (LIX))

      Authenticated Key-Insulated Public-Key Encryption and Time-Release
      Cryptography, Jung Hee Cheon (Dept. of Mathematics, Seoul National
      Univ., Korea) and Nick Hopper and Yongdae Kim and Osipkov
      (Dept. of Computer Science and Eng., University of Minnesota-Twin
      Cities)

      Conditional Encrypted Mapping and Comparing Encrypted Numbers, Ian
      F. Blake (Dept. ECE University of Toronto) and Vladimir Kolesnikov
      (Dept. Comp. Sci. University of Toronto)

      Revisiting Oblivious Signature-Based Envelopes: New Constructs and
      Properties, Samad Nasserian (RWTH Aachen University) and Gene
      Tsudik (University of California, Irvine)

  Payment Systems

      Provably Secure Electronic Cash based on Blind Multisignature
      Schemes, Yoshikazu Hanatani (The University of
      Electro-Comunications) and Yuichi Komano (Toshiba Corporation) and
      Kazuo Ohta (The University of Electro-Comunications) and Noboru
      Kunihiro (The University of Electro-Comunications)

      Efficient Provably Secure Restrictive Partially Blind Signatures
      from Bilinear Pairings, Xiaofeng Chen and Fangguo Zhang (Sun
      Yat-sen University, China) and Yi Mu and Willy Susilo (University
      of Wollongong, Australia)

      Privacy-Protecting Coupon System Revisited, Lan Nguyen (CSIRO ICT
      Centre, Australia)

  Efficient Protocols

      Efficient Broadcast Encryption Scheme with Log-Key Storage, Yong
      Ho Hwang and Pil Joong Lee (Dept. of EEE, POSTECH, Pohang, Korea)

      Efficient Correlated Action Selection, Mikhail Atallah and Marina
      Blanton and Keith Frikken and Jiangtao Li (Department of Computer
      Science, Purdue University)

      Efficient Cryptographic Protocols Realizing E-Markets with Price
      Discrimination, Aggelos Kiayias (University of Connecticut) and
      Moti Yung (RSA Labs & Columbia Univ.)


  			  ** Short Papers **

      A Practical Implementation of Secure Auctions based on Multiparty
      Integer Computation, Peter Bogetoft (Food and Resources Economic
      Institute, The Royal Veterinary and Agricultural University,
      Denmark) and Ivan Damgaard (Dept. of Computer Science, University
      of Aarhus) and Thomas Jakobsen (Dept. of Computer Science,
      University of Aarhus) and Kurt Nielsen (Food and Resources
      Economic Institute, The Royal Veterinary and Agricultural
      University, Denmark) and Jakob Pagter (Dept. of Computer Science,
      University of Aarhus) and Tomas Toft (Dept. of Computer Science,
      University of Aarhus)

      Defeating Malicious Servers in a Blind Signatures Based Voting
      System, Sebastien Canard and Matthieu Gaud and Jacques Traore
      (France Telecom R&D, France)

      Pairing Based Threshold Cryptography Improving on
      Libert-Quisquater and Baek-Zheng, Yvo Desmedt (Information
      Security, Department of Computer Science, University College
      London) and Tanja Lange (Technical University of Denmark)

      Credit transfer within market-based resource allocation
      infrastructure, Tyler Close (HP Palo Alto)

      A Note on Chosen-Basis Decisional Diffe-Hellman Assumptions,
      Michael Szydlo (RSA Laboratories)

      Cryptanalysis of a partially blind signature scheme or "How to
      make 100$ bills with 1$ and 2$ ones", Gwenalle Martinet and
      Guillaume Poupard and Philippe Sola (DCSSI Crypto Lab - France)

      An Efficient Group Signature with Concurrently-Secure Joining
      (invited), by I. Teranishi and J. Furukawa (NEC corporation)


  		       ** Additional Events **

  In addition to the formal conference sessions, there will be an
  evening Rump Session of informal results and works-in-progress, an
  afternoon session of presentations by some of our sponsors (including
  Stefan Roever of Navio and Nicko van Someren of nCipher), and a
  program of social events (see the conference website for details).

  ----

  We wish to thank the conference sponsors for their invaluable
  assistance in making this conference possible: Bibit, Everbank,
  Google, Navio, nCipher, Offshore Information Services.

  We would also like to thank Telcordia for their technical assistance
  with the online submission and review process.

  -

  _______________________________________________
  fc-announce mailing list
  fc-announce at ifca.ai
  http://mail.ifca.ai/mailman/listinfo/fc-announce

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





More information about the cypherpunks-legacy mailing list