ICITS 2009 Tentative Program
Thursday, 3 December 2009
| 2:00pm | Registration [Granship 11F] |
| 6:00pm | Registration Closed |
Friday, 4 December 2009
| 8:00am | Registration [Granship 11F] |
| 8:50am | Opening Remarks |
| Leakage Resilient Cryptography Session Chair: Rei Safavi-Naini |
|
|---|---|
| 9:00am | Invited Talk: Leakage-Resilience and The Bounded Retrieval Model |
| 9:50am | A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes Stefan Dziembowski (University of Rome "La Sapienza") |
| 10:15am | Break (30 minutes) |
| Quantum Cryptography and Indistinguishability Session Chair: Serge Fehr |
|
| 10:45am | Invited Talk: Security of Key Distribution and Complementarity in Quantum Mechanics |
| 11:35am | Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification Peter Gazi and Ueli Maurer (ETH Zurich, Switzerland and Comenius University Bratislava, Slovakia) |
| 12:00 noon | Lunch (till 2:00pm) |
| Connection to Computational Security Session Chair: Stefan Dziembowski |
|
| 2:00pm | Invited Talk: Code-Based Public-Key Cryptosystems And Their Applications |
| 2:50pm | On the Security of Pseudorandomized Information-Theoretically Secure Schemes Koji Nuida and Goichiro Hanaoka (AIST, Japan) |
| 3:15pm | Break (30 minutes) |
| Secret Sharing Session Chair: Kaoru Kurosawa |
|
| 3:45pm | Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience Arpita Patra, Ashish Choudhary and C. Pandu Rangan (IIT, Madras, India) |
| 4:10pm | On the Optimization of Bipartite Secret Sharing Schemes Oriol Farras, Jessica Ruth Metcalf-Burton, Carles Padro, and Leonor Vazquez (Universitat Politècnica de Catalunya, Barcelona, Spain and University of Michigan, U.S.A.) |
| 4:35pm | Linear Threshold Multisecret Sharing Schemes Oriol Farras, Ignacio Gracia, Sebastia Martin, and Carles Padro (Universitat Politècnica de Catalunya, Barcelona, Spain) Finishes at 5:00pm |
| 6:00pm | Conference dinner (till 8:30pm) [Takasago-no-ma (Fugetsuro)] |
Saturday, 5 December 2009
| Key Agreement from Common Randomness Session Chair: Goichiro Hanaoka |
|
|---|---|
| 8:30am | Door Opens |
| 9:00am | Invited Talk: Multiterminal Secrecy Generation and Tree Packing |
| 9:50am | Information Theoretic Security Based on Bounded Observability Jun Muramatsu, Kazuyuki Yoshimura, and Peter Davis (NTT, Japan) |
| 10:15am | Break (30 minutes) |
| Random Graph and Group Testing Session Chair: Yvo Desmedt |
|
| 10:45am | Invited Talk: Random Graphs in Security and Privacy |
| 11:35am | Group Testing and Batch Verification Greg Zaverucha and Doug Stinson (University of Waterloo, Canada) Finishes at 12:00 noon |
| Excursions (lunch & dinner provided) Buses leave at 12:30 from the Main Entrance. |
|
Sunday, 6 December 2009
| Reliable Data Transmission and Computation Session Chair: Kazukuni Kobara |
|
|---|---|
| 8:30am | Door Opens |
| 9:00am | Invited Talk: What Can Cryptography Do for Coding Theory? |
| 9:50am | Cryptanalysis of Secure Message Transmission Protocols with Feedback Qiushi Yang and Yvo Desmedt (University College London, UK) |
| 10:15am | The Optimum Leakage Principle for Analyzing Multi-threaded Programs Han Chen and Pasquale Malacaria (Queen Mary University of London, UK) |
| 10:40am | Break (20 minutes) |
| Fingerprint and Watermarking Session Chair: Paolo D'Arco |
|
| 11:00am | A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure Koji Nuida (AIST, Japan) |
| 11:25am | An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes Koji Nuida and Goichiro Hanaoka (AIST, Japan) |
| 11:50am | Statistical-mechanical Approach for Multiple Watermarks Using Spectrum Spreading Kazuhiro Senda and Masaki Kawamura (Yamaguchi University, Japan) |
| 12:15pm | Closing Remark |
| 12:25pm | Conference Adjourns |

Slides in