This site is hosted by

Institute for Infocomm Research (I2R)

 

2004 International Workshop on Practice and Theory in Public Key Cryptography 

1-4 March, 2004, Singapore

 Preliminary Conference Program

Monday, March 1
2:00 PM-6:00 PM   Registration Open
 
 
Tuesday, March 2
8:30AM-6:00PM  

Registration Open

9:15AM-9:30AM

Opening Remarks

Robert DENG (General Chair) and Feng BAO (Program Committee Chair)

(Institute for Infocomm Research, Singapore)

9:30AM-10:30AM

Session 1: Invited Speech (Session Chair:  Rei Safavi-Naini)

  • Personal Privacy in the Public Key Setting: The Next Frontier
    Moti Yung (Columbia University, USA) 
10:30AM-11:00AM

Refreshment Break

11:00AM-12:30PM

Session 2  (Session Chair: Serge Vaudenay)

  • Faster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism
    Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica (Mount Allison University, Canada)
  • Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point
    Pradeep Kumar Mishra and Palash Sarkar (Indian Statistical Institute, India)
  • Fast arithmetic on Jacobians of Picard curves
    Stephane Flon and Roger Oyono ( Universitaet Bonn and Universitaet Essen, Germany)
12:30PM-2:00PM

Conference Lunch

2:00PM-3:30PM

Session 3 (Session Chair: Ronald Cramer)

  • Undeniable Signatures Based on Characters 
    Jean Monnerat, Serge Vaudenay (EPFL - I&C - LASEC (Laboratory of Security and Cryptography), Switzerland )
  • Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
    Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk (Macquarie University, Australia)
  • Constructing Committed Signatures From Strong-RSA Assumption In The Standard Complexity Model
    Huafei Zhu (Institute for Infocomm Research, Singapore)
3:30PM-4:00PM

Refreshment Break

4:00PM-5:30PM

Session 4 (Session Chair: Colin Boyd)

  • Constant Round Authenticated Group Key Agreement via Distributed Computation
    E. Bresson and D. Catalano (Cryptology department - CELAR, France)
  • Efficient ID-based Group Key Agreement with Bilinear Maps
    Kyu Young Choi and Jung Yeon Hwang and Dong Hoon Lee (Korea University, KOREA)
  • Encrypted Key Exchange Using Mask Generation Functions
    E. Bresson, O. Chevassut and D. Pointcheval (ENS-DI, France)
6:00 PM-9:00 PM

Welcome Reception

 
Wednesday, March 3
 

9:00AM-10:30AM

Session 5 (Session Chair: Helger Lipmaa)       

  • New Results on the Hardness of Diffie-Hellman Bits
    Maria Isabel Gonzalez Vasco, Mats Naslund and Igor E. Shparlinski (Universidad de Oviedo, Spain and Macquarie Uni, Australia)
  • Short Exponent DH
    Takeshi Koshiba, Kaoru Kurosawa (Japan Science and Technology Corporation, Japan.)
  • Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman Groups
    Benoit Libert and Jean-Jacques Quisquater (UCL Crypto Group, Belgium)
10:30AM-11:00AM

Refreshment Break

11:00AM-12:30PM

Session 6 (Session Chair: Hideki Imai)        

  • Algebraic Attacks over GF(2^k), Cryptanalysis of HFE Challenge 2 and Sflash-v2
    Nicolas T. Courtois (Schlumberger Smart Cards, France)
  • Secret Exponent Attacks on RSA-type Schemes With Moduli N=p^rq 
    Alexander May (Paderborn, Germany)
  • General Group Authentication Codes and their Relation to "Unconditionally--Secure Signatures
    Reihaneh Safavi--Naini, Luke McAven and Moti Yung (University of Wollongong, Australia)
12:30PM-2:00PM

Conference Lunch

2:00PM-3:30PM

Session 7  (Session Chair: Jintai Ding)       

  • From Digital Signature to ID-Based Identification/Signature
    Kaoru Kurosawa and Swee-Huay Heng (Ibaraki University and Tokyo Institute of Technology, Japan)
  • Identity-Based Threshold Decryption
    Joonsang Baek and Yuliang Zheng (Monash University, Australia and University of North Carolina at Charlotte, USA )
  • An Efficient Signature Scheme from Bilinear Pairings and Its Application
    Fangguo Zhang, Rei Safavi-Naini and Willy Susilo (University of Wollongong, Australia)
3:30PM-4:00PM

Refreshment Break

4:00PM-5:30PM

Session 8  (Session Chair: Alexander May)       

  • An RSA Family of Trap-door Permutations with a Common Domain and its Applications 
    Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka (Tokyo Institute of Technology, Japan)
  • A new variant of the Matsumoto-Imai cryptosystem through perturbation
    Jintai Ding (University of Cincinnati, USA)
  • Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability
    Jun Furukawa (NEC Corporation, Japan)
6:00 PM-9:00 PM

Conference Dinner Banquet

 
Thursday, March 4
 

9:00AM-10:30AM

Session 9  (Session Chair: Eiichiro Fujisaki)    

  • A point compression method for elliptic curves defined over $GF(2^n)$
    Brian King (Indiana University - Purdue University Indianapolis, USA)
  • On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
    Toru Akishita and Tsuyoshi Takagi (Sony Corporation, Japan)
  • On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
    Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai (UNIVERSITY OF TOKYO, Japan)
10:30AM-11:00AM

Refreshment Break

11:00AM-12:30PM

Session 10  (Session Chair: Jianying ZHOU)

  • QuasiModo: Efficient Certificate Validation and Revocation
    Farid Elwailly, Craig Gentry, Zulfikar Ramzan (DoCoMo Communications Laboratories USA)
  • A Distributed Online Certificate Status Protocol with a Single Public Key
    Satoshi KOGA, Kouichi SAKURAI (Kyushu University, Japan )
  • A First Approach to Provide Anonymity in Attribute Certificates
    Javier Lopez, Vicente Benjumea, Jose A. Montenegro, and Jose M. Troya (University of Malaga, Spain)
12:30PM-2:00PM

Conference Lunch

2:00PM-3:30PM

Session 11  (Session Chair: Javier Lopez)

  • A nonuniform algorithm for the hidden number problem in subgroups and cryptographic applications
    Igor Shparlinski and Arne Winterhof (Macquarie Uni, Australia and Uni Linz, Austria)
  • Cryptographic Randomized Response Techniques
    Andris Ambainis, Markus Jakobsson, Helger Lipmaa (Helsinki University of Technology, Finland )
  • A Correct, Private and Efficient Mix Network
    Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan (Queensland University of Technology, Australia)
3:30PM-4:00PM

Refreshment Break

4:00PM-5:00PM

Session 12  (Session Chair: Nicolas Courtois)    

  • A Generalized Wiener Attack on RSA
    Johannes Blomer, Alexander May (Paderborn, Germany)
  • Cryptanalysis of a Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
    Jean-Sébastien Coron (Gemplus, France )
5:00PM-5:15PM

Closing Session