Conference Program
Apr 16 (Mon) | Apr 17 (Tue) | Apr 18 (Wed) | Apr 19 (Thu) | Apr 20 (Fri) | |
---|---|---|---|---|---|
8:00-9:00 Breakfast |
/ | Breakfast/ Registration/ Opening Remarks |
Breakfast/ Registration |
Breakfast/ Registration |
Excursion |
9:00-10:40 (4 talks) |
Signatures I | Signatures II | Protocols II | ||
10:40-11:00 Break |
Coffee Break | ||||
11:00-12:00 (1 talk) |
Invitied Talk I | Invited Talk II | Invited Talk III | ||
12:00-14:00 Lunch |
Lunch | ||||
14:00-15:15 (3 talks) |
Cryptanalysis | Multivariate Cryptosystems | Number Theoretic Techniques | ||
15:15-15:45 Break |
Coffee Break | ||||
15:45-17:00 (3 talks) |
Registration* | Protocols I | Encryption | Public-Key Infrastructure ** | |
18:00-20:00 Dinner |
/ | Reception Dinner | Banquet Dinner | Conference Adjourns |
* The registration time is 16:00-18:00
** 2 talks
Detailed Information
Monday, 16 April
- 16:00-18:00 Registration (FIT Building)
Tuesday, 17 April
- 7:00-8:00 Breakfast and Registration
- 8:00-9:00 Welcome and Opening Ceremony
- 9:00-10:40
Signatures I (Chair: Xiaoyun Wang)
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures by
- A Direct Anonymous Attestation Scheme for Embedded Devices by
- Anonymous Signatures Made Easy by
- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures by
- 10:40-11:00 Coffee Break: 2nd floor, FIT Building
- 11:00-12:00
Invited Talk I (Chair: Andrew Yao)
- Cryptanalysis of Non-Standard Key Agreement Protocols by
- 12:00-14:00 Lunch (Jinchun Garden)
- 14:00-15:15
Cryptanalysis (Chair: Jacques Stern)
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Godlfeld Key Exchange Protocol by
- New Chosen-Ciphertext Attacks on NTRU by
- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 by
- 15:15-15:45 Coffee Break: 2nd floor, FIT Building
- 15:45-17:00
Protocols I (Chair: Juan Garay)
- Optimistic Fair Exchange in a Multi-User Setting by
- Multi-party Stand-alone and Setup-free Verifiably Committed Signatures by
- Knowledge-Binding Commitments with Applications in Time-Stamping by
- 18:00-19:30 Reception Dinner (Friendship Hotel)
Wednesday, 18 April
- 8:00-9:00 Breakfast and Registration
- 9:00-10:40
Signatures II (Chair: Dingyi Pei)
- Efficient Ring Signatures Without Random Oracles by
- Traceable Ring Signature by
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles by
- Improved On-Line/Off-Line Threshold Signatures by
- 10:40-11:00 Coffee Break: 2nd floor, FIT Building
- 11:00-12:00
Invited Talk II (Chair: Xiaoyun Wang)
- Risk Measures and a New Central Limit Theorem under Nonlinear Expectation by
- 12:00-14:00 Lunch (Jinchun Garden)
- 14:00-15:15
Multivariate Cryptosystems (Chair: Jun Hee Cheon)
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems by
- Cryptanalysis of HFE with Internal Perturbation by
- $\ell$-Invertible Cycles for Multivariate Quadratic Public Key Cryptography by
- 15:15-15:45 Coffee Break: 2nd floor, FIT Building
- 15:45-17:00
Encryption (Chair: Rafail Ostrovsky)
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman by
- Parallel Key-Insulated Public Key Encryption Without Random Oracles by
- Multi-Bit Cryptosystems Based on Lattice Problems by
- 18:00-20:00 Banquet Dinner (Quanjude)
Thursday, 19 April
- 8:00-9:00 Breakfast and Registration
- 9:00-10:40
Protocols II (Chair: Moti Yung)
- Practical and Secure Solutions for Integer Comparison by
- Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol by
- Identity-Based Traitor Tracing by
- Verifiable Shuffle of Large Size Ciphertexts by
- 10:40-11:00 Coffee Break: 2nd floor, FIT Building
- 11:00-12:00
Invited Talk III (Chair: Tatsuaki Okamoto)
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications by
- 12:00-14:00 Lunch (Jinchun Garden)
- 14:00-15:15
Number Theoretic Techniques (Chair: Yvo Desmedt)
- Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA by
- Efficient Pseudorandom Generators Based on the DDH Assumption by
- Fast Batch Verification of Multiple Signatures by
- 15:15-15:45 Coffee Break: 2nd floor, FIT Building
- 15:45-17:00
Public-Key Infrastructure (Chair: Feng Bao)
- A Closer Look at PKI: Security and Efficiency by
- Self-Generated-Certificate Public Key Encryption without Pairing by
- 17:00 Conference Adjourns
Friday, 20 April
- Full Day Excursion