FC'05
Financial Cryptography
and Data Security

Preliminary Program

The following is a tentative schedule.


Sunday, February 27
6:00PM
Registration opens
Fort Young Hotel Terrace
6:00-
8:00
Welcome Reception
Enjoy cocktails while feasting on delightful appetizers. The event will take place at the Fort Young Hotel's Terrace overlooking the ocean.

Monday, February 28
8:30
Registration desk opens
Fort Young Hotel conference room.
7:00
Buffet Breakfast
Restaurant adjacent to conference room.
9:00
Opening remarks
9:30
Threat and Attacks (Session Chair: Avi Rubin)

Fraud within Asymmetric Multi-Hop Cellular Networks
Gildas Avoine (EPFL, Lausanne, Switzerland)


Protecting Secret Data from Insider Attacks
David Dagon and Wenke Lee and Richard Lipton (Georgia Institute of Technology)


Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling
P.C. van Oorschot (Carleton University) and S. Stubblebine (Stubblebine Research Labs)
11:00
Break
11:30
First Keynote (Session Chair: Moti Yung)
Trust and Swindling on the Internet
Bezalel Gavish (Southern Methodist University)

Professor Gavish will present preliminary survey results to counter claims by online auction site operators that fraudulent activity is negligible and to make a case for more extensive research on Internet fraud. (abstract)
12:30
Lunch
1:30
Digital Signing Methods (Session Chair: Giovanni Di Crescenzo)

Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures)
Fangguo Zhang (Sun Yat Sen University, P.R.China) and Yi Mu and Willy Susilo (University of Wollongong, Australia)


Time Capsule Signature
Yevgeniy Dodis (NYU) and Dae Hyun Yum (POSTECH)


Policy-Based Cryptography and Applications
Walid Bagga and Refik Molva (Eurecom)
3:00
Break
3:30
Panel: Phishing

Organizer: Steve Myers
Tentative panelists: Drew Dean, Stuart Stubblebine, Richard Clayton, Steve Myers, Mike Szydlo
5:00
Adjourn

Tuesday, March 1
7:00
Buffet Breakfast
9:00
Privacy (Session Chair: David Pointcheval)

A Privacy Protecting Coupon System
Liqun Chen (HP Laboratories) and Matthias Enzmann (Fraunhofer SIT) and Ahmad-Reza Sadeghi (University of Bochum) and Markus Schneider (Fraunhofer SIT) and Michael Steiner (IBM T.J. Watson)


Testing Disjointness of Private Datasets
Aggelos Kiayias (University of Connecticut) and Antonina Mitrofanova (Rutgers University)
10:00
Break
10:30
Hardware Oriented Mechanisms (Session Chair: Jacques Traore)

RFID Traceability A Multilayer Problem
Gildas Avoine and Philippe Oechslin (EPFL Lausanne Switzerland)


Information-Theoretic Security Analysis of Physical Uncloneable Functions
P. Tuyls and B. Skoric and S. Stallinga and A.H. Akkermans and W. Ophey (Philips Research Laboratories, The Netherlands)
11:30
Supporting Financial Transactions (Session Chair: Liqun Chen)

Risk Assurance for Hedge Funds using Zero Knowledge Proofs
Michael Szydlo


Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Stanislaw Jarecki (UC Irvine) and Vitaly Shmatikov (UT Austin)
12:30
Lunch
1:30
Systems, Applications, and Experiences (Session Chair: Lynne Coventry)

Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
Simson L. Garfinkel and Jeffrey I. Schiller and Erik Nordlander (MIT) and David Margrave (Amazon.com) and Robert C. Miller (MIT)


Securing Sensitive Data with the Ingrian DataSecure Platform
Andrew Koyfman (Ingrian Networks)


Ciphire Mail Email Encryption and Authentication
Lars Eilebrecht (Ciphire Labs)
3:00
Adjourn
7:00
IFCA General Meeting
8:00
Banquet
Sponsored by Interactive Investor

Wednesday, March 2
7:00
Buffet Breakfast
9:00
Second Keynote (Session Chair: Andrew Patrick)
Usable Security: A conundrum?
Lynne Coventry (NCR)
10:00
Break
10:30
Message Authentication (Session Chair: Yuliang Zheng)

A User-Friendly Approach to Human Authentication of Messages
Jeff King and Andre dos Santos (Georgia Institute of Technology)


Approximation in Message Authentication and Biometric Entity Authentication
Giovanni Di Crescenzo and Richard Graveman (Telcordia) and Renwei Ge and Gonzalo Arce (U Delaware)
11:30
Exchanges and Contracts (Session Chair: Vitaly Shmatikov)

Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model
Steve Kremer and Aybek Mukhamedov and Eike Ritter (School of Computer Science, University of Birmingham, UK)


Achieving Fairness in Private Contract Negotiation
Keith Frikken and Mikhail Atallah (Purdue University)
12:30
Lunch
1:30
Auctions and Voting (Session Chair: Yvo Desmedt)

Small Coalitions Cannot Manipulate Voting
Edith Elkind (Princeton University) and Helger Lipmaa (Helsinki University of Technology)


Efficient Privacy-Preserving Protocols for Multi-Unit Auctions
Felix Brandt and Tuomas Sandholm (Carnegie Mellon University)


Event Driven Private Counters
Eujin Goh (Stanford University) and Philippe Golle (Palo Alto Research Center)
3:00
Adjourn
8:30 (PM)
Work in Progress (Rump) Session
Chair: Ari Juels

Works in Progress Papers:
Secure Distributed Human Computation
Craig Gentry and Zulfikar Ramzan (DoCoMo Labs) and Stuart Stubblebine (Stubblebine Research Labs)


Secure Multi-Attribute Procurement Auction
Koutarou Suzuki (NTT) and Makoto Yokoo (Kyushu University)


Audit File Reduction Using N-Gram Models
Fernando Godinez (ITESM-Monterrey) and Dieter Hutter (Saarbrucken University) and Raul Monroy (ITESM-Estado de Mexico)

Thursday, March 3
7:00
Buffet Breakfast
9:00
User Authentication (Session Chair: Mike Szydlo)

Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Michel Abdalla and David Pointcheval (Ecole Normale Superieure)


Secure Biometric Authentication for Weak Computational Devices
Mikhail J. Atallah and Keith B. Frikken (Purdue) and Michael T. Goodrich (UC Irvine) and Roberto Tamassia (Brown)
10:00
Break
10:30
Panel: Financial Technology in the Developing World
Organizer: Allan Friedman
Tentative panelists: H William Burdett, Jr., Allan Friedman
12:00
Closing remarks
12:30
Lunch
1:30
Adjourn