|       
 
  
 
 This site is hosted by  Institute for Infocomm Research (I2R)
 | 2004 International Workshop on Practice and Theory in Public Key Cryptography   1-4 March, 2004, 
        Singapore  
          Preliminary Conference Program   
| 2:00 PM-6:00 PM |  | Registration Open |  |  |    
| 8:30AM-6:00PM |  | Registration Open |  
  |  |  
| 9:15AM-9:30AM | Opening Remarks |  
  |  |  
|  | 
    Robert
    DENG (General Chair) and Feng
    BAO (Program Committee Chair)
     (Institute for Infocomm Research, Singapore) |  
| 9:30AM-10:30AM | Session
  1: Invited Speech (Session Chair:  Rei Safavi-Naini) |  |  |  
|  | 
    Personal Privacy in the Public Key Setting: The Next
      FrontierMoti Yung (Columbia
      University, USA)
 |  
| 10:30AM-11:00AM | Refreshment
  Break |  
| 11:00AM-12:30PM | Session 2  (Session Chair:  Serge Vaudenay) |  
  |  |  
|  | 
      Faster Scalar Multiplication on Koblitz Curves combining Point
        Halving with the Frobenius EndomorphismRoberto Maria Avanzi, Mathieu Ciet, and Francesco Sica (Mount Allison
        University, Canada)
Application of Montgomery's Trick to Scalar Multiplication for
        Elliptic and Hyperelliptic Curves Using a Fixed Base PointPradeep Kumar Mishra and Palash Sarkar (Indian Statistical Institute,
        India)
        Fast arithmetic on Jacobians of Picard curvesStephane Flon and Roger Oyono (
	Universitaet Bonn and Universitaet Essen, Germany)
 |  
| 12:30PM-2:00PM | Conference
  Lunch |  
| 2:00PM-3:30PM | Session
  3 (Session Chair:  Ronald Cramer) |  
  |  |  
|  | 
      Undeniable Signatures Based on Characters Jean Monnerat, Serge Vaudenay (EPFL - I&C - LASEC (Laboratory of
        Security and Cryptography), Switzerland )
Efficient Extension of Standard Schnorr/RSA signatures into
        Universal Designated-Verifier SignaturesRon Steinfeld and Huaxiong Wang and Josef Pieprzyk (Macquarie
        University, Australia)
Constructing Committed Signatures From Strong-RSA Assumption In
        The Standard Complexity ModelHuafei Zhu (Institute for Infocomm Research, Singapore)
 |  
| 3:30PM-4:00PM | Refreshment
  Break |  
| 4:00PM-5:30PM | Session 4 (Session Chair:  Colin Boyd) |  |  |  
|  | 
    Constant Round Authenticated Group Key Agreement via Distributed
      ComputationE. Bresson and D. Catalano (Cryptology department - CELAR, France)
Efficient ID-based Group Key Agreement with Bilinear MapsKyu Young Choi and Jung Yeon Hwang and Dong Hoon Lee (Korea University,
      KOREA)
Encrypted Key Exchange Using Mask Generation FunctionsE. Bresson, O. Chevassut and D. Pointcheval (ENS-DI, France)
 |  
| 6:00 PM-9:00 PM | Welcome Reception |  |  |  
|  |  |    
|  |  |  |  
| 9:00AM-10:30AM | Session
  5 (Session Chair: Helger Lipmaa)         |  |  |  
|  | 
    New Results on the Hardness of Diffie-Hellman BitsMaria Isabel Gonzalez Vasco, Mats Naslund and Igor E. Shparlinski (Universidad
      de Oviedo, Spain and Macquarie Uni, Australia)
Short Exponent DHTakeshi Koshiba, Kaoru Kurosawa (Japan Science and Technology Corporation,
      Japan.)
Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman
      GroupsBenoit Libert and Jean-Jacques Quisquater (UCL Crypto Group, Belgium)
 |  
| 10:30AM-11:00AM | Refreshment
  Break |  
| 11:00AM-12:30PM | Session 6 (Session Chair: Hideki Imai)      
    |  
  |  |  
|  | 
      Algebraic Attacks over GF(2^k), Cryptanalysis of HFE Challenge 2
        and Sflash-v2Nicolas T. Courtois (Schlumberger Smart Cards, France)
Secret Exponent Attacks on RSA-type Schemes With Moduli N=p^rq Alexander May (Paderborn, Germany)
General Group Authentication Codes and their Relation to
        "Unconditionally--Secure SignaturesReihaneh Safavi--Naini, Luke McAven and Moti Yung (University of
        Wollongong, Australia)
 |  
| 12:30PM-2:00PM | Conference
  Lunch |  
| 2:00PM-3:30PM | Session
  7  (Session Chair: Jintai Ding)         |  
  |  |  
|  | 
      From Digital Signature to ID-Based Identification/SignatureKaoru Kurosawa and Swee-Huay Heng (Ibaraki University and Tokyo
        Institute of Technology, Japan)
Identity-Based Threshold DecryptionJoonsang Baek and Yuliang Zheng (Monash University, Australia and
        University of North Carolina at Charlotte, USA )
An Efficient Signature Scheme from Bilinear Pairings and Its
        ApplicationFangguo Zhang, Rei Safavi-Naini and Willy Susilo (University of
        Wollongong, Australia)
 |  
| 3:30PM-4:00PM | Refreshment
  Break |  
| 4:00PM-5:30PM | Session 8  (Session Chair: Alexander May)         |  |  |  
|  | 
      An RSA Family of Trap-door Permutations with a Common Domain and
        its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka (Tokyo Institute
        of Technology, Japan)
A new variant of the Matsumoto-Imai cryptosystem through
        perturbationJintai Ding (University of Cincinnati, USA)
Efficient, Verifiable Shuffle Decryption and Its Requirement of
        UnlinkabilityJun Furukawa (NEC Corporation, Japan)
 |  
| 6:00 PM-9:00 PM | Conference Dinner Banquet |  
  |  |  
|  |  |    
|  |  |  |  
| 9:00AM-10:30AM | Session
  9    (Session Chair: Eiichiro Fujisaki)      |  |  |  
|  | 
    A point compression method for elliptic curves defined over
      $GF(2^n)$Brian King (Indiana University - Purdue University Indianapolis, USA)
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems
      Using IsogenyToru Akishita and Tsuyoshi Takagi (Sony Corporation, Japan)
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai
      (UNIVERSITY OF TOKYO, Japan)
 |  
| 10:30AM-11:00AM | Refreshment
  Break |  
| 11:00AM-12:30PM | Session 10  (Session Chair: Jianying
  ZHOU) |  
  |  |  
|  | 
      QuasiModo: Efficient Certificate Validation and RevocationFarid Elwailly, Craig Gentry, Zulfikar Ramzan (DoCoMo Communications
        Laboratories USA)
A Distributed Online Certificate Status Protocol with a Single
        Public KeySatoshi KOGA, Kouichi SAKURAI (Kyushu University, Japan )
A First Approach to Provide Anonymity in Attribute CertificatesJavier Lopez, Vicente Benjumea, Jose A. Montenegro, and Jose M. Troya
        (University of Malaga, Spain)
 |  
| 12:30PM-2:00PM | Conference
  Lunch |  
| 2:00PM-3:30PM | Session 11  (Session Chair: Javier Lopez)  |  
  |  |  
|  | 
      A nonuniform algorithm for the hidden number problem in subgroups
        and cryptographic applicationsIgor Shparlinski and Arne Winterhof (Macquarie Uni, Australia and Uni
        Linz, Austria)
Cryptographic Randomized Response TechniquesAndris Ambainis, Markus Jakobsson, Helger Lipmaa (Helsinki University of
        Technology, Finland )
A Correct, Private and Efficient Mix NetworkKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan (Queensland
        University of Technology, Australia)
 |  
| 3:30PM-4:00PM | Refreshment
  Break |  
| 4:00PM-5:00PM | Session 12  (Session Chair: Nicolas Courtois)      |  
  |  |  
|  | 
      A Generalized Wiener Attack on RSAJohannes Blomer, Alexander May (Paderborn, Germany)
Cryptanalysis of a Public-key Encryption Scheme Based on the
        Polynomial Reconstruction ProblemJean-Sébastien Coron (Gemplus, France )
 |  
| 5:00PM-5:15PM | Closing
  Session |  |  |  
|  |  |  |