This site is hosted by
Institute for Infocomm Research (I2R)
|
2004 International Workshop on Practice and Theory in Public Key Cryptography
1-4 March, 2004,
Singapore
Preliminary Conference Program
2:00 PM-6:00 PM |
|
Registration Open |
|
8:30AM-6:00PM |
|
Registration Open
|
|
9:15AM-9:30AM |
Opening Remarks
|
|
|
Robert
DENG (General Chair) and Feng
BAO (Program Committee Chair)
(Institute for Infocomm Research, Singapore)
|
9:30AM-10:30AM |
Session
1: Invited Speech (Session Chair: Rei Safavi-Naini)
|
|
|
- Personal Privacy in the Public Key Setting: The Next
Frontier
Moti Yung (Columbia
University, USA)
|
10:30AM-11:00AM |
Refreshment
Break
|
11:00AM-12:30PM |
Session 2 (Session Chair: Serge Vaudenay)
|
|
|
- Faster Scalar Multiplication on Koblitz Curves combining Point
Halving with the Frobenius Endomorphism
Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica (Mount Allison
University, Canada)
- Application of Montgomery's Trick to Scalar Multiplication for
Elliptic and Hyperelliptic Curves Using a Fixed Base Point
Pradeep Kumar Mishra and Palash Sarkar (Indian Statistical Institute,
India)
-
Fast arithmetic on Jacobians of Picard curves
Stephane Flon and Roger Oyono (
Universitaet Bonn and Universitaet Essen, Germany)
|
12:30PM-2:00PM |
Conference
Lunch
|
2:00PM-3:30PM |
Session
3 (Session Chair: Ronald Cramer)
|
|
|
- Undeniable Signatures Based on Characters
Jean Monnerat, Serge Vaudenay (EPFL - I&C - LASEC (Laboratory of
Security and Cryptography), Switzerland )
- Efficient Extension of Standard Schnorr/RSA signatures into
Universal Designated-Verifier Signatures
Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk (Macquarie
University, Australia)
- Constructing Committed Signatures From Strong-RSA Assumption In
The Standard Complexity Model
Huafei Zhu (Institute for Infocomm Research, Singapore)
|
3:30PM-4:00PM |
Refreshment
Break
|
4:00PM-5:30PM |
Session 4 (Session Chair: Colin Boyd)
|
|
|
- Constant Round Authenticated Group Key Agreement via Distributed
Computation
E. Bresson and D. Catalano (Cryptology department - CELAR, France)
- Efficient ID-based Group Key Agreement with Bilinear Maps
Kyu Young Choi and Jung Yeon Hwang and Dong Hoon Lee (Korea University,
KOREA)
- Encrypted Key Exchange Using Mask Generation Functions
E. Bresson, O. Chevassut and D. Pointcheval (ENS-DI, France)
|
6:00 PM-9:00 PM |
Welcome Reception
|
|
| |
|
|
|
9:00AM-10:30AM |
Session
5 (Session Chair: Helger Lipmaa)
|
|
|
- New Results on the Hardness of Diffie-Hellman Bits
Maria Isabel Gonzalez Vasco, Mats Naslund and Igor E. Shparlinski (Universidad
de Oviedo, Spain and Macquarie Uni, Australia)
- Short Exponent DH
Takeshi Koshiba, Kaoru Kurosawa (Japan Science and Technology Corporation,
Japan.)
- Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman
Groups
Benoit Libert and Jean-Jacques Quisquater (UCL Crypto Group, Belgium)
|
10:30AM-11:00AM |
Refreshment
Break
|
11:00AM-12:30PM |
Session 6 (Session Chair: Hideki Imai)
|
|
|
- Algebraic Attacks over GF(2^k), Cryptanalysis of HFE Challenge 2
and Sflash-v2
Nicolas T. Courtois (Schlumberger Smart Cards, France)
- Secret Exponent Attacks on RSA-type Schemes With Moduli N=p^rq
Alexander May (Paderborn, Germany)
- General Group Authentication Codes and their Relation to
"Unconditionally--Secure Signatures
Reihaneh Safavi--Naini, Luke McAven and Moti Yung (University of
Wollongong, Australia)
|
12:30PM-2:00PM |
Conference
Lunch
|
2:00PM-3:30PM |
Session
7 (Session Chair: Jintai Ding)
|
|
|
- From Digital Signature to ID-Based Identification/Signature
Kaoru Kurosawa and Swee-Huay Heng (Ibaraki University and Tokyo
Institute of Technology, Japan)
- Identity-Based Threshold Decryption
Joonsang Baek and Yuliang Zheng (Monash University, Australia and
University of North Carolina at Charlotte, USA )
- An Efficient Signature Scheme from Bilinear Pairings and Its
Application
Fangguo Zhang, Rei Safavi-Naini and Willy Susilo (University of
Wollongong, Australia)
|
3:30PM-4:00PM |
Refreshment
Break
|
4:00PM-5:30PM |
Session 8 (Session Chair: Alexander May)
|
|
|
- An RSA Family of Trap-door Permutations with a Common Domain and
its Applications
Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka (Tokyo Institute
of Technology, Japan)
- A new variant of the Matsumoto-Imai cryptosystem through
perturbation
Jintai Ding (University of Cincinnati, USA)
- Efficient, Verifiable Shuffle Decryption and Its Requirement of
Unlinkability
Jun Furukawa (NEC Corporation, Japan)
|
6:00 PM-9:00 PM |
Conference Dinner Banquet
|
|
| |
|
|
|
9:00AM-10:30AM |
Session
9 (Session Chair: Eiichiro Fujisaki)
|
|
|
- A point compression method for elliptic curves defined over
$GF(2^n)$
Brian King (Indiana University - Purdue University Indianapolis, USA)
- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems
Using Isogeny
Toru Akishita and Tsuyoshi Takagi (Sony Corporation, Japan)
- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai
(UNIVERSITY OF TOKYO, Japan)
|
10:30AM-11:00AM |
Refreshment
Break
|
11:00AM-12:30PM |
Session 10 (Session Chair: Jianying
ZHOU)
|
|
|
- QuasiModo: Efficient Certificate Validation and Revocation
Farid Elwailly, Craig Gentry, Zulfikar Ramzan (DoCoMo Communications
Laboratories USA)
- A Distributed Online Certificate Status Protocol with a Single
Public Key
Satoshi KOGA, Kouichi SAKURAI (Kyushu University, Japan )
- A First Approach to Provide Anonymity in Attribute Certificates
Javier Lopez, Vicente Benjumea, Jose A. Montenegro, and Jose M. Troya
(University of Malaga, Spain)
|
12:30PM-2:00PM |
Conference
Lunch
|
2:00PM-3:30PM |
Session 11 (Session Chair: Javier Lopez)
|
|
|
- A nonuniform algorithm for the hidden number problem in subgroups
and cryptographic applications
Igor Shparlinski and Arne Winterhof (Macquarie Uni, Australia and Uni
Linz, Austria)
- Cryptographic Randomized Response Techniques
Andris Ambainis, Markus Jakobsson, Helger Lipmaa (Helsinki University of
Technology, Finland )
- A Correct, Private and Efficient Mix Network
Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan (Queensland
University of Technology, Australia)
|
3:30PM-4:00PM |
Refreshment
Break
|
4:00PM-5:00PM |
Session 12 (Session Chair: Nicolas Courtois)
|
|
|
- A Generalized Wiener Attack on RSA
Johannes Blomer, Alexander May (Paderborn, Germany)
- Cryptanalysis of a Public-key Encryption Scheme Based on the
Polynomial Reconstruction Problem
Jean-Sébastien Coron (Gemplus, France )
|
5:00PM-5:15PM |
Closing
Session
|
|
| |
|