Technical Program

December 12, 2009
 
9:20 – 10:00 Registration
10:00 – 10:10 Welcoming Remarks
 
Session 1 – Cryptographic Protocol and Schemes; Chair: Mark Manulis
10:10 – 10:35 Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov, Ahmad-Reza Sadeghi and Thomas Schneider
10:35 – 11:00 Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary and Pandu Rangan C
11:00 – 11:25 On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Marc Joye
 
Invited Talk (1); Chair: Juan A. Garay
11:25 – 12:25 A Cryptographer's-eye View of Privacy in Statistical Databases
Adam Smith (Penn State University, US)
 
12:25 – 14:25 Lunch and Excursion at Kenrokuen Garden, Photo shoot
 
Session 2 – Cryptanalysis I; Chair: Mitsuru Matsui
14:30 – 14:55 Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Chong Hee Kim and Gildas Avoine
14:55 – 15:15 Saturation Attack on the Block Cipher HIGHT
Peng Zhang, Bing Sun and Chao Li
15:15 – 15:40 Extensions of the Cube Attack based on Low Degree Annihilators
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei and Josef Pieprzyk
15:40 – 16:05 An Analysis of the Compact XSL Attack on BES and Embedded SMS4
Jiali Choy, Huihui Yap and Khoongming Khoo
 
16:05 – 16:30 Coffee break
 
Session 3 – Wireless and Sensor Network Security; Chair: Isao Echizen
16:30 – 16:55 RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
Chong Hee Kim and Gildas Avoine
16:55 – 17:15 Anonymizer-Enabled Security and Privacy for RFID
Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann
17:15 – 17:40 Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Nitesh Saxena and Md. Borhan Uddin
17:40 – 18:05 DepenDNS: Dependable Mechanism against DNS Cache Poisoning
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang and Yue-Hsun Lin
 
18:30 – 21:00 Banquet at Kanazawa Excel Hotel Tokyu
 
 
December 13, 2009
 
Session 4 – Privacy and Anonymity; Chair: Ahmad-Reza Sadeghi
09:30 – 09:55 Privacy-Preserving Relationship Path Discovery in Social Networks
Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos
09:55 – 10:20 Verifying Anonymous Credential Systems in Applied Pi Calculus
Xiangxi Li, Yu Zhang and Yuxin Deng
10:20 – 10:45 Transferable Anonymous Constant-Size Fair E-Cash
Georg Fuchsbauer, David Pointcheval and Damien Vergnaud
 
10:45 – 11:05 Coffee break
 
Session 5 – Functional and Searchable Encryption; Chair: Seny Kamara
11:05 – 11:30 A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wan
11:30 – 11:55 Private-Key Hidden Vector Encryption with Key Privacy
Carlo Blundo, Vincenzo Iovino and Giuseppe Persiano
Invited Talk (2) Chair: Akira Otsuka
11:55 – 12:55 Building Secure Networked Systems with Code Attestations
Adrian Perrig (CMU, US)
 
12:55 – 14:15 Lunch
 
Session 6 – Authentication/Block Cipher Design; Chair: Vlad Kolesnikov
14:15 – 14:40 Stronger Password Authentication against Cross-Site Impersonation
Xavier Boyen
14:40 – 15:05 An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards
Wen-Ting Jin and Jing Xu
15:05 – 15:30 Ensuring Authentication of Digital Information using Cryptographic Accumulators
Christophe Tartary
15:30 – 15:55 MIBS: A New Lightweight Block Cipher
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki
 
15:55 – 16:15 Coffee break
 
Session 7 – Cryptanalysis II; Chair: Josef Pieprzyk
16:15 – 16:40 Distinguishing and Second-Preimage Attack on CBC-like MACs
Keting Jia, Xiaoyun Wang, Zheng Yuan and Guangwu Xu
16:40 – 17:05 Improving the Rainbow Attack by Reusing Colours
Martin Agren, Thomas Johansson and Martin Hell
17:05 – 17:30 Side Channel Cube Attack on PRESENT
Lin Yang, Meiqin Wang and Siyuan Qiao
17:30 – 17:55 Algebraic Attack on the MQQ Public Key Cryptosystem
Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding and Johannes Buchmann
 
18:00 – 22:00 Dinner (Wadaya, a traditional Kanazawa cuisine)
 
 
December 14, 2009
 
Session 8 – Algebraic and Number-Theoretic Schemes; Chair: Jorge Nakahara
09:30 – 09:55 Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu
09:55 – 10:20 Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari and Francisco Rodriguez-Henriquez
10:20 – 10:45 On the Complexity of Computing Discrete Logarithms over Algebraic Tori
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki and Hiroki Shizuya
 
10:45 – 11:05 Coffee break
 
Session 9 – Wireless and Sensor Network Security II; Chair: Benoit Libert
11:05 – 11:30 On the Usability of Secure Association of Wireless Devices Based On Distance Bounding
Mario Cagalj, Nitesh Saxena and Ersin Uzun
11:30 – 11:55 Short Hash-based Signatures for Wireless Sensor Networksy
Erik Dahmen and Christoph Kraus
Invited Talk(3); Chair: Atsuko Miyaji
11:55 – 12:55 Computing on Encrypted Data
Craig Gentry (IBM Research, US)
 
12:55 – 14:15 Lunch
 
Session 10 – Cryptographic Protocol and Schemes II; Chair: TBA
14:15 – 14:30 Fully Robust Tree-Diffie-Hellman Group Key Exchange
Mark Manulis, Emmanuel Bresson and Timo Brecher
14:30 – 14:55 Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Modelm
Benoit Libert and Damien Vergnaude
14:55 – 15:30 Relinkable Ring Signature
Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi
15:30 – 15:40 Closing

[back]