Public Key Cryptography 2009

March 18-20, 2009, UC Irvine
Irvine, CA, USA

Conference Program


Wednesday, March 18

8:20-8:50 Breakfast Refreshments

8:50-9:00 Welcome Announcements

9:00-10:40 Session 1: Number Theory  (Chair: Stanislaw Jarecki )

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint (Best Paper Award)
Alexander May and Maike Ritzenhofen, HGI, Ruhr-University of Bochom
The Security of All Bits Using List Decoding
Carla Rafols and Paz Morillo, Universitat Politecnica de Catalunya
A New Lattice Construction For Partial Key Exposure Attack For RSA
Yoshinori Aono, Tokyo Institute of Technology
Subset-Restricted Random Walks for Pollard rho Method on GF(p^m)
Minkyu Kim, Jung Hee Cheon, and Jin Hong, Seul National University

10:40-11:00 Coffee Break

11:00-12:15 Invited Talk 1 (Session Chair: Moti Yung)

  From Signatures to Anonymous Credentials and Anonymous Delegation [abstract]
Anna Lysyanskaya, Brown University

12:15-2:00 Lunch Break at Bren Hall, Room 6011 (6th floor)

2:00-3:40 Session 2: Applications and Protocols (Chair: Ivan Visconti)

  Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh, Stanford; David Freeman, CWI and Universiteit Leiden; Jonathan Katz, University of Maryland; Brent Waters, University of Texas at Austin
  Improving the Boneh-Franklin Traitor Tracing Scheme
Pascal Junod, University of Applied Sciences - Western Switzerland; Alexandre Karlov and Arjen K. Lenstra, EPFL, Switzerland
  Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
M. Choudary Gorantla, Colin Boyd, and Juan Manuel Gonzalez Nieto, Queensland University of Technology
  Zero-Knowledge Proofs with Witness Elimination
Aggelos Kiayias and Hong-Sheng Zhou, University of Connecticut

3:40-4:00 Coffee Break

4:00-5:15 Session 3: Multi-Party Protocols (Chair: Juan Garay)

  Distributed Public-Key Cryptography from Weak Secrets
Michel Abdalla, ENS; Xavier Boyen, Stanford; Celine Chevalier, ENS; David Pointcheval, ENS
  Asynchronous Multiparty Computation: Theory and Implementation
Ivan Damgard, Martin Geisler, Mikkel Kroigaard, and Jesper Buus Nielsen, Aarhus University
  Multi-Party Computation with Omnipresent Adversary
Hossein Ghodosi, James Cook University; Josef Pieprzyk, Macquarie University

7:00-9:00 Dinner

Thursday, March 19

8:30-9:00 Breakfast Refreshment

9:00-10:40 Session 4: Identity-Based Encryption (Chair: Xavier Boyen)

  Blind and Anonymous Identity-Based Encryption and Authorized Private Searches on Public-key Encrypted Data
Jan Camenisch, IBM Zurich; Markulf Kohlweiss and Alfredo Rial, Katholieke Universitit Leuven; Caroline Sheedy, Dublin City University
  Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Jae Hong Seo, Seoul National University; Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki, NTT Labs, Tokyo
  Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Benoit Libert and Damien Vergnaud, UCL Crypto Group and Ecole Normale Superieure
  Removing Escrow from Identity-Based Encryption - New Security Notions and Key Management Techniques
Sherman S.M. Chow, New York University

10:40-11:00 Coffee Break

11:00-12:15 Invited Talk 2 (Chair: Tatsuaki Okamoto)

  A New Paradigm for Secure Protocols [abstract]
Amit Sahai, UCLA

12:15-2:00 Lunch Break at UCI University Club

2:00-3:40 Session 5: Signatures (Chair: David Naccache)

  On the Theory and Practice of Personal Digital Signatures
Ivan Damgard and Gert Lassoe Mikkelsen, Aarhus University
  Security of Blind Signatures Under Aborts
Marc Fischlin and Dominique Schroder, Darmstadt University of Technology
  Security of Sanitizable Signatures Revisited
Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schroder, and Florian Volk, Darmstadt University of Technology
  Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
Brian J. Matt, John Hopkins University

3:40-4:00 Coffee Break

4:00-5:15 Session 6: Encryption (Chair: Amit Sahai)

  CCA-Secure Proxy Re-Encryption without Pairings
Jun Shao and Zhenfu Cao, Shanghai Jiao Tong University
  Compact CCA-Secure Encryption for Messages of Arbitrary Length
Masayuki Abe, NTT; Eike Kiltz, CWI; Tatsuaki Okamoto, NTT
  Verifiable Rotation of Homomorphic Encryptions
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, and Jose Villegas, Technical University of Eindhoven

7:00-10:00 Conference Banquet at Restaurant "Sage on the Coast", Newport Coast

Friday, March 20

8:30-9:00 Breakfast Refreshment

9:00-10:15 Session 7: New Cryptosystems and Optimizations (Chair: Marc Joye)

  A practical key recovery attack on basic TCHo
Gregor Leander, Technical University of Denmark; Mathias Herrmann, HGI, Ruhr-University of Bochum
  An algebraic surface cryptosystem
Koichiro Akiyama, Toshiba; Yasuhiro Goto, Hokkaido University of Education; Hideyuki Miyake, Toshiba
  Fast Multibase Methods and Other Optimizations for Elliptic Curve Scalar Multiplication
Patrick Longa and Catherine Gebotys, University of Waterloo

10:15-10:35 Coffee Break

10:35-Noon Session 8: Group Signatures and Anonymous Credentials (Chair: Anna Lysyanskaya)

  Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Toru Nakanishi, Hiroki Fujii, Yuta Hira, and Nobuo Funabiki, Okayama University
  An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials 
Jan Camenisch, IBM Zurich; Markulf Kohlweiss, Katholieke Universiteit Leuven; Claudio Soriente, University of California at Irvine
  Controlling Access to an Oblivious Database using Stateful Anonymous Credentials
Scott Coull, Matthew Green, and Susan Hohenberger, Johns Hopkins University

Noon: Conference Ends. (Optional Lunch on Campus)