Wednesday, May 26th, 2010 |
|
|
12:30 |
Registration |
|
|
13:50 |
Opening |
|
|
14:00 |
Encryption I (Session chair: Duong Hieu Phan) |
|
Simple and Efficient Public-Key
Encryption from Computational Diffie-Hellman in the Standard
Model |
|
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, and Victor Shoup |
|
Constant
Size Ciphertexts in Threshold Attribute-Based Encryption |
|
Javier Herranz, Fabien Laguillaumie, and Carla Ràfols |
|
|
14:50 |
Cryptanalysis (Session chair: Jean-Sébastien Coron) |
|
Algebraic
Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem |
|
Jean-Charles Faugère and Pierre-Jean Spaenlehauer |
|
Maximizing
Small Root Bounds by Linearization and Applications to Small
Secret Exponent RSA |
|
Mathias Herrmann and Alexander May |
|
Implicit Factoring with Shared Most Significant and Middle Bits |
|
Jean-Charles Faugère, Raphaël Marinier, and Guénaël Renault |
|
|
16:05 |
Break |
|
|
16:25 |
Protocols I (Session chair: Ivan Visconti) |
|
On the
Feasibility of Consistent Computations |
|
Sven Laur and Helger Lipmaa |
|
Multi-Query
Computationally-Private Information Retrieval with Constant
Communication Rate |
|
Jens Groth and Aggelos Kiayias, and Helger Lipmaa |
|
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting |
|
Wei Wu, Xinyi Huang, Yi Mu, Willy Susilo, and Yang Xiang |
|
|
Thursday, May 27th, 2010 |
|
|
09:00 |
Invited Talk I (Session chair: David Pointcheval) |
|
Mathematics, Cryptography, Security |
|
Jacques Stern |
|
|
10:00 |
Network Coding (Session chair: Mark Manulis) |
|
Secure
Network Coding Over the Integers |
|
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, and Tal Rabin |
|
Preventing
Pollution Attacks in Multi-Source Network Coding |
|
Shweta Agrawal, Dan Boneh, Xavier Boyen, and David Mandell Freeman |
|
|
10:50 |
Break |
|
|
11:10 |
Tools (Session chair: Eike Kiltz) |
|
Groth-Sahai Proofs Revisited |
|
Essam Ghadafi, Nigel P. Smart, and Bogdan Warinschi |
|
Constant-Round
Concurrent Non-Malleable Statistically Binding Commitments and
Decommitments |
|
Zhenfu Cao, Ivan Visconti, and Zongyang Zhang |
|
|
12:00 |
Lunch |
|
|
14:00 |
Elliptic Curves (Session chair: Damien Vergnaud) |
|
Faster
Squaring in the Cyclotomic Subgroup of Sixth Degree
Extensions |
|
Robert Granger and Michael Scott |
|
Faster
Pairing Computations on Curves with High-Degree Twists |
|
Craig Costello, Tanja Lange, and Michael Naehrig |
|
Efficient
arithmetic on Hessian curves |
|
Reza Rezaeian Farashahi and Marc Joye |
|
|
15:15 |
Break |
|
|
15:35 |
Lossy Trapdoor Functions (Session chair: Vadim Lyubashevsky) |
|
CCA
Proxy Re-Encryption without Bilinear Maps in the Standard
Model |
|
Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka |
|
More
Constructions of Lossy and Correlation-Secure Trapdoor
Functions |
|
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev |
|
Chosen-Ciphertext
Security from Slightly Lossy Trapdoor Functions (Best Paper Award) |
|
Petros Mol and Scott Yilek |
|
|
19:00 |
Gala Dinner |
|
|
Friday, May 28th, 2010 |
|
|
09:00 |
Invited Talk II (Session chair: Phong Nguyen) |
|
Duality in
Lattice Based Cryptography |
|
Daniele Micciancio |
|
|
10:00 |
Protocols II (Session chair: Bogdan Warinschi) |
|
Efficient
Set Operations in the Presence of Malicious Adversaries |
|
Carmit Hazay and Kobbi Nissim |
|
Text
Search Protocols with Simulation Based Security |
|
Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen |
|
|
10:50 |
Break |
|
|
11:10 |
Discrete Logarithm (Session chair: Martijn Stam) |
|
Solving
a 676-bit Discrete Logarithm Problem in GF(3^6n) |
|
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, and Tsuyoshi Takagi |
|
Using
Equivalence Classes to Accelerate Solving the Discrete Logarithm
Problem in a Short Interval |
|
Steven Galbraith and Raminder Ruprai |
|
|
12:00 |
Lunch |
|
|
14:00 |
Encryption II (Session chair: Eiichiro Fujisaki) |
|
Functional
Encryption for Inner Product: Achieving Constant-Size
Ciphertexts with Adaptive Security or Support for Negation |
|
Nuttapong Attrapadung and Benoît Libert |
|
Security
of Encryption Schemes in the Weakened Random Oracle Models |
|
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, and Keita Xagawa |
|
Fully
Homomorphic Encryption with Relatively Small Key and Ciphertext
Sizes |
|
Nigel P. Smart and Frederik Vercauteren |
|
|
15:15 |
Break |
|
|
15:35 |
Signatures (Session chair: Benoît Libert) |
|
Unlinkability of Sanitizable Signatures |
|
Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schröder |
|
Confidential
Signatures and Deterministic Signcryption |
|
Alexander W. Dent, Marc Fischlin, Mark Manulis, Dominique Schröder, and Martijn Stam |
|
Identity-Based
Multi-Signatures and Aggregate Signatures based on RSA |
|
Ali Bagherzandi and Stanislaw Jarecki |
|
Lattice Mixing and Vanishing Trapdoors : A Framework for Fully Secure Short Signatures and more |
|
Xavier Boyen |
|
|
17:30 |
Cocktail |