Main Page Call for Papers Contact Info Program Local Info Registration Rump Session BoFs


 

CRYPTO 2005

Program

Preliminary - subject to change

All events in Campbell Hall
(unless otherwise noted)

IACR logo

Sunday, August 14, 2005
17:00   -   20:00 Registration, Anacapa Formal Lounge
17:30 - 21:30 Evening Reception, Anacapa/Santa Cruz Ocean Lawn
Monday, August 15, 2005
09:00 - 09:10 Opening Remarks
Stuart Haber, General Chair
Session 1     Hash Functions
Chair     Victor Shoup
09:10 - 09:35 Efficient Collision Search Attacks on SHA-0
Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin  
09:35 - 10:00 Finding Collisions in the Full SHA-1
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu  
10:00 - 10:30 Morning Break
Session 2     Theory
Chair     Stanislaw Jarecki
10:30 - 10:55 Pebbling and Proofs of Work
Cynthia Dwork, Moni Naor, and Hoeteck Wee  
10:55 - 11:20 Composition Does Not Imply Adaptive Security
Krzysztof Pietrzak Presentation
Session 3     IACR Distinguished Lecture
Chair     Andrew Clark
11:20 - 12:20 The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology
Ralph Merkle  
12:30 - 13:45 Lunch - DeLaGuerra Commons
Session 4     Cryptanalysis
Chair     Arjen Lenstra
14:00 - 14:25 On the Discrete Logarithm Problem on Algebraic Tori
Robert Granger and Fréderik Vercauteren Presentation
14:25 - 14:50 A Practical Attack on a Braid Group Based Cryptographic Protocol
Alexei Myasnikov, Vladimir Shpilrain, and Alexander Ushakov  
14:50 - 15:15 The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Yi Lu, Willi Meier, and Serge Vaudenay Presentation
15:15 - 15:45 Afternoon Break
Session 5     Zero Knowledge
Chair     Louis Salvail
15:45 - 16:10 Unconditional Characterizations of Non-Interactive Zero-Knowledge
Rafael Pass and abhi shelat  
16:10 - 16:35 Impossibility and Feasibility Results for Zero Knowledge with Public Keys
Joël Alwen, Giuseppe Persiano, and Ivan Visconti Presentation
16:35 - 17:00 Communication-Efficient Non-Interactive Proofs of Knowledge with Online Extractors
Marc Fischlin  
Nightlife
19:00 - 22:00 Evening Reception, Anacapa/Santa Cruz Ocean Lawn
Tuesday, August 16, 2005
Session 6     Anonymity
Chair     Alice Silverberg
09:00 - 09:25 A Formal Treatment of Onion Routing
Jan Camenisch and Anna Lysyanskaya  
09:25 - 09:50 Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
Kun Peng, Colin Boyd, and Ed Dawson  
09:50 - 10:15 Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi Presentation
10:15 - 10:45 Morning Break
Session 7     Privacy
Chair     Jonathan Katz
10:45 - 11:10 Private Searching on Streaming Data
Rafail Ostrovsky and William Skeith  
11:10 - 11:35 Privacy-Preserving Set Operations
Lea Kissner and Dawn Song Presentation
Session 8     Broadcast Encryption
Chair     Alexandra Boldyreva
11:35 - 12:00 Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Dan Boneh, Craig Gentry, and Brent Waters  
12:00 - 12:25 Generic Transformation for Scalable Broadcast Encryption Schemes
Jung Yeon Hwang, Dong Hoon Lee, and Jongin Lim Presentation
12:30 - 13:45 Lunch - DeLaGuerra Commons
Free Afternoon
Tourism - Santa Barbara
14:00 - 17:00 Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby
Soccer - Lawn
17:45 - 19:30 Dinner - DeLaGuerra Commons
Rump Session
Chair     Phong Nguyen
19:30 - 23:00 Snacks and Open Bar - University Center
19:30 - Late Rump Session - University Center
Wednesday, August 17, 2005
Session 9     Human-oriented Cryptography
Chair     Leonid Reyzin
09:00 - 09:25 Authenticating Pervasive Devices with Human Protocols
Ari Juels and Stephen A. Weis Presentation
09:25 - 09:50 Secure Communications over Insecure Channels Based on Short Authenticated Strings
Serge Vaudenay Presentation
09:50 - 10:20 Morning Break
Session 10     Secret Sharing
Chair     Amos Beimel
10:20 - 10:45 On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimégnez Urroz, Gregor Leander, Jaume Martí-Farré, and Carles Padró Presentation
10:45 - 11:10 Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
Ronald Cramer, Serge Fehr, and Martijn Stam Presentation
Session 11     Invited Talk
Chair     Victor Shoup
11:10 - 12:10 Bilinear Maps in Cryptography
Dan Boneh  
12:30 - 13:45 Lunch - DeLaGuerra Commons
Session 12     Multi-party Computation
Chair     Rebecca Wright
14:00 - 14:25 Secure Computation without Authentication
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, and Tal Rabin  
14:25 - 14:50 Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Ivan Damgård and Yuval Ishai Presentation
14:50 - 15:15 Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Omer Barkol and Yuval Ishai Presentation
15:15 - 15:45 Afternoon Break
Session 13     Random Oracles
Chair     Craig Gentry
15:45 - 16:10 Analysis of Random Oracle Instantiation Scenarios for OAEP and other Practical Schemes
Alexandra Boldyreva and Marc Fischlin  
16:10 - 16:35 Merkle-Damgård Revisited : How to Construct a Hash Function
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, and Prashant Puniya Presentation
16:35 - 17:00 On the Generic Insecurity of the Full-Domain Hash
Yevgeniy Dodis, Roberto Oliveira, and Krzysztof Pietrzak  
IACR Business Meeting
Chair     Andrew Clark, IACR President
17:05 - 17:50 IACR Membership meeting - Campbell Hall
Nightlife
18:00 - 20:15 Beach Barbecue - Goleta Beach
20:00 - 22:30 Crypto Café - Santa Cruz Formal Lounge
Thursday, August 18, 2005
Session 14     Information Theoretic Security
Chair     Ilya Mironov
09:00 - 09:25 New Monotones and Lower Bounds in Unconditional Two-Party Computation
Stefan Wolf and Juerg Wullschleger  
09:25 - 09:50 One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Thomas Holenstein and Renato Renner Presentation
09:50 - 10:15 A Quantum Cipher with Near Optimal Key-Recycling
Ivan Damgård, Thomas B. Pedersen, and Louis Salvail Presentation
10:15 - 10:45 Morning Break
Session 15     Primitives and Protocols
Chair     Moni Naor
10:45 - 11:10 An Efficient CDH-based Signature Scheme with a Tight Security Reduction  
Benoît Chevallier-Mames Presentation
11:10 - 11:35 Improved Security Analyses for CBC MACs
Mihir Bellare, Krzysztof Pietrzak, and Phillip Rogaway Presentation
11:35 - 12:00 HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk Presentation
12:00 Conference Adjourns
12:15 - 13:30 Lunch - DeLaGuerra Commons