Program

 
Financial Cryptography and Data Security 2017

International Financial Cryptography Association logo

Twenty-First International Conference
April 3–7, 2017
The Palace Hotel
Malta

Please note, this program is provisional and subject to change.

All events take place in the Royal Hall at The Palace Hotel unless otherwise indicated.
Sunday, April 2, 2017

16:00–18:00 Registration Reception
Location: State Hall foyer
Monday, April 3, 2017

08:30–09:00 Registration

09:00–09:10 Opening Remarks

09:10–10:10
Session 1: Opening Keynote
Silvio Micali
Massachusetts Institute of Technology

ALGORAND: A New Public Ledger

A public ledger is a tamperproof sequence of data that can be read and augmented by everyone. Shared public ledgers stand to revolutionize the way a democratic society operates. They secure all kinds of traditional transactions—such as payments, asset transfers, titling—in the exact order in which they occur; and enable totally new transactions—such as cryptocurrencies and smart contracts. They can remove intermediaries and usher in a new paradigm for trust. As currently implemented, however, public ledgers cannot achieve their enormous potential.

Algorand is a quite alternative, truly democratic, and very efficient way to implement a public ledger. Unlike prior implementations based on proof of work, it requires a negligible amount of computation, and generates a transaction history that will not "fork" with overwhelmingly high probability.


10:10–10:40 Break

10:40–12:20
Session 2: Privacy and Identity Management

Sietse Ringers, Eric Verheul and Jaap-Henk Hoepman. An efficient self-blindable attribute-based credential scheme

Sherman S. M. Chow, Haibin Zhang and Tao Zhang. Real Hidden Identity-Based Signatures

Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. BehavioCog: An Observation Resistant Authentication Scheme

Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner and Anja Lehmann. Updatable Tokenization: Formal Definitions and Provably Secure Constructions


12:20–14:00 Lunch
Location: The Tabloid

14:00–15:15
Session 3: Privacy and Data Processing

Qian Wang, Kui Ren, Minxin Du and Aziz Mohaisen. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates

Gabriel Kaptchuk, Matthew Green and Aviel Rubin. Outsourcing Medical Dataset Analysis: A Possible Solution

David Derler, Sebastian Ramacher and Daniel Slamanig. Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation


15:15–15:45 Break

15:45–17:25
Session 4: Cryptographic Primitives and API's

Ryan Stanley-Oakes. A Provably Secure PKCS#11 Configuration Without Authenticated Attributes

Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev. A Post-Quantum Digital Signature Scheme based on Supersingular Isogenies

Helger Lipmaa. Optimally Sound Sigma Protocols Under DCRA

Reihaneh Safavi-Naini, Viliam Lisy and Yvo Desmedt. Economically Optimal Variable Tag Length Authentication


19:00–21:30 Welcome Reception and Poster Session (Sponsored by Blockstream)
Location: TemptAsian / Pool Deck

Peter Todd and Harry Halpin. OpenTimestamps: Securing Software Updates using the Bitcoin Blockchain

Anirban Basu, Joshua Jeeson Daniel, Sushmita Ruj, Mohammad Shahriar Rahman, Theo Dimitrakos, and Shinsaku Kiyomoto. Accountability and integrity for data management using blockchains

Zhan Chen and Wenquan Bi. 11-Round Impossible Differential Attack on Midori64

Mohammad Shahriar Rahman, Anirban Basu, and Shinsaku Kiyomoto. Broker-mediated Trade Finance with Blockchains

S. Matthew English, Ehsan Nezhadian. Application of Bitcoin Data-Structures & Design Principles to Supply Chain Management

Tuesday, April 4, 2017

09:00–10:15
Session 5: Vulnerabilities and Exploits, I

Ajaya Neupane, Md Lutfor Rahman and Nitesh Saxena. PEEP: Passively Eavesdropping Private Input via Brainwave Signals

Michael Schwarz, Clémentine Maurice, Daniel Gruss and Stefan Mangard. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript

Gunnar Hartung. Attacks on Secure Logging Schemes


10:15–10:45 Break

10:45–12:40
Session 6: Blockchain Technology

Steven Goldfeder, Joseph Bonneau, Rosario Gennaro and Arvind Narayanan. Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin

Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. TrustIsRisk: A Decentralized Financial Trust Platform

Patrick McCorry, Siamak Shahandashti and Feng Hao. A Smart Contract for Boardroom Voting with Maximum Voter Privacy

Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy and Sasha Ivanov. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies

Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer. Short Paper: Service-Oriented Sharding for Blockchains


15:00–19:30 Excursion (Sponsored by IOHK)

Transfer to Valetta with classic Maltese buses, walking tour of the city, Upper Barrakka Gardens, private opening of St. John's Co-Cathedral, return to Sliema harbour by wooden gullet including on-board buffet.

Note: the timing of the excursion might be changed, perhaps even last-minute depending on weather conditions, to leave immediately after the morning session and provide lunch at the beginning instead of dinner at the end. Please try to leave flexibility in your plans if you intend to participate.


20:30–21:30 IFCA General Meeting
Location: Royal Hall

21:30–00:00 Rump Session
Location: Royal Hall
Wednesday, April 5, 2017

09:00–09:50
Session 7: Security of Internet Protocols

Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner and Sharon Goldberg. The Security of NTP's Datagram Protocol

Pawel Szalachowski, Adrian Perrig. Short Paper: On Deployment of DNS-based Security Enhancements


09:50–10:40
Session 8: Blind signatures

Albrecht Petzoldt, Alan Szepieniec and Mohamed Saied Emam Mohamed. A Practical Multivariate Blind Signature Scheme

Essam Ghadafi. Efficient Round-Optimal Blind Signatures in the Standard Model


10:40–11:10 Break

11:10–12:25
Session 9: Searching and Processing Private Data

Bernardo Portela, Manuel Barbosa, Guillaume Scerri, Bogdan Warinschi, Raad Bahmani, Ferdinand Brasser and Ahmad-Reza Sadeghi. Secure Multiparty Computation from SGX

Wakaha Ogata and Kaoru Kurosawa. Efficient No-dictionary Verifiable SSE

Anamaria Costache, Nigel P. Smart and Srinivas Vivek. Faster Homomorphic Evaluation of Discrete Fourier Transforms


12:25–14:00 Lunch
Location: The Tabloid

14:00–15:30
Session 10: Secure Channel Protocols

Nayanamana Samarasinghe and Mohammad Mannan. Short Paper: TLS Ecosystems in Networked Devices vs Web Servers

Yevgeniy Dodis and Dario Fiore. Unilaterally-Authenticated Key Exchange

Karthikeyan Bhargavan, Antoine Delignat-Lavaud and Nadim Kobeissi. Formal Modeling and Verification for Domain Validation and ACME

Tom Chothia, Flavio Garcia, Christopher Heppel and Christopher McMahon-Stone. Why Banker Bob (still) can't get TLS right: A Security Analysis of TLS in Leading UK Banking Apps


18:00–22:00 Maltese Evening (Sponsored by Thales e-Security)
Location: Bacchus Restaurant, Mdina

Transfer to the old capital of Mdina, short walking tour of the city followed by a buffet dinner of traditional Maltese specialties.

Thursday, April 6, 2017

09:00–09:50
Session 11: Privacy in Data Storage and Retrieval

Cecylia Bocovich, John A. Doucette and Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage

Helger Lipmaa and Kateryna Pavlyk. A Simpler Rate-Optimal CPIR Protocol


09:50–10:45
Session 12: Vulnerabilities and Exploits, II

Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic. Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS

Vincent Taylor and Ivan Martinovic. Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store

Markus Jakobsson. Short Paper: Addressing Sophisticated Email Attacks


10:45–11:15 Break

11:15–12:35
Session 13: Panel
Moderator: William Scannell
Panelists: Tarah Wheeler, Saender Clark, and others TBA

When Cash & Crypto Collide

Fiat currencies around the world are beginning to transition to a purely digital form. One need look no further than Venezeula's move to demonetize their 100 bolivar bill; or India's 500 and 1000 rupee note demonetization. These are both clear signals that fiat currency is about to mean something very different in the coming decade. With a purely digital fiat currency, governments expect to expose black market monetary stockpiles, increase the number of participants in the banking system, and improve fiscal efficiency. There will of course be unintended side effects. As money ceases to have any form but ones and zeroes, the role of the security services providers guaranteeing the safe transmission of money around the world is going to increase.

As currency is transmitted in the black box form of secure encrypted tokens, will security guarantors step into the role of monetary authorities?


12:35–12:40 Closing Remarks

12:40–14:00 Lunch
Location: The Tabloid

14:00–18:30 Free Afternoon with Activities
(sign-up sheets will be available)

A: Blue Grotto, Hagar Qim temples, Marsaxlokk fishing village

B: Three Cities (walking tour), Dghasja cruise, Inquisitor's Palace

C: Ta' Qali crafts village, Meridiana wine estate (including tasting)

D: Harbour cruise (on your own, ticket provided)


19:00–21:00 Workshop Reception (for workshop registrants)
Location: Royal Hall foyer
Friday, April 7, 2017

09:00–12:30
Morning Workshops

Note: the timing of the lunch and breaks is coordinated among all of the workshops, but some workshops might start earlier in the morning or end later in the afternoon. See their individual programs for details. Workshop registrants can attend any of the workshops and can switch between them as desired.

BITCOIN'17: 4th Workshop on Bitcoin and Blockchain Research
Location: State Hall

TA'17: 1st Workshop on Targeted Attacks
Location: Royal Hall Part 2

VOTING'17: 2nd Workshop on Advances in Secure Electronic Voting Schemes
Location: Royal Hall Part 1

WAHC'17: 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Location: Palazzo Capua


10:30–11:00 Break

12:30–14:00 Lunch
Location: The Tabloid

14:00–17:30
Afternoon Workshops

BITCOIN'17 (continued): 4th Workshop on Bitcoin and Blockchain Research
Location: State Hall

VOTING'17 (continued): 2nd Workshop on Advances in Secure Electronic Voting Schemes
Location: Royal Hall Part 1

WAHC'17 (continued): 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Location: Palazzo Capua

WTSC'17: 1st Workshop on Trusted Smart Contracts
Location: Royal Hall Part 2


15:30–16:00 Break

 

 

 

This conference is organized annually by the International Financial Cryptography Association.