ICITS 2009 Tentative Program

Thursday, 3 December 2009

2:00pm Registration [Granship 11F]
6:00pm Registration Closed

Friday, 4 December 2009

8:00am Registration [Granship 11F]
8:50am Opening Remarks
Leakage Resilient Cryptography
Session Chair: Rei Safavi-Naini
9:00am Invited Talk:
Leakage-Resilience and The Bounded Retrieval Model
Yevgeniy Dodis (New York University)
Slides in PDF
9:50am A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
Stefan Dziembowski (University of Rome "La Sapienza")
10:15am Break (30 minutes)
Quantum Cryptography and Indistinguishability
Session Chair: Serge Fehr
10:45am Invited Talk:
Security of Key Distribution and Complementarity in Quantum Mechanics
Masato Koashi (Osaka University, Japan)
Slides in PDF
11:35am Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
Peter Gazi and Ueli Maurer (ETH Zurich, Switzerland and Comenius University Bratislava, Slovakia)
12:00 noon Lunch (till 2:00pm)
Connection to Computational Security
Session Chair: Stefan Dziembowski
2:00pm Invited Talk:
Code-Based Public-Key Cryptosystems And Their Applications
Kazukuni Kobara (AIST, Japan)
Slides in PDF
2:50pm On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Koji Nuida and Goichiro Hanaoka (AIST, Japan)
3:15pm Break (30 minutes)
Secret Sharing
Session Chair: Kaoru Kurosawa
3:45pm Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
Arpita Patra, Ashish Choudhary and C. Pandu Rangan (IIT, Madras, India)
4:10pm On the Optimization of Bipartite Secret Sharing Schemes
Oriol Farras, Jessica Ruth Metcalf-Burton, Carles Padro, and Leonor Vazquez
(Universitat Politècnica de Catalunya, Barcelona, Spain and University of Michigan, U.S.A.)
4:35pm Linear Threshold Multisecret Sharing Schemes
Oriol Farras, Ignacio Gracia, Sebastia Martin, and Carles Padro
(Universitat Politècnica de Catalunya, Barcelona, Spain)
Finishes at 5:00pm
6:00pm Conference dinner (till 8:30pm) [Takasago-no-ma (Fugetsuro)]

Saturday, 5 December 2009

Key Agreement from Common Randomness
Session Chair: Goichiro Hanaoka
8:30am Door Opens
9:00am Invited Talk:
Multiterminal Secrecy Generation and Tree Packing
Prakash Narayan (University of Maryland)
Slides in PDF
9:50am Information Theoretic Security Based on Bounded Observability
Jun Muramatsu, Kazuyuki Yoshimura, and Peter Davis (NTT, Japan)
10:15am Break (30 minutes)
Random Graph and Group Testing
Session Chair: Yvo Desmedt
10:45am Invited Talk:
Random Graphs in Security and Privacy
Adi Shamir (The Weizmann Institute of Science)
Slides in PDF
11:35am Group Testing and Batch Verification
Greg Zaverucha and Doug Stinson (University of Waterloo, Canada)
Finishes at 12:00 noon
Excursions (lunch & dinner provided)
Buses leave at 12:30 from the Main Entrance.

Sunday, 6 December 2009

Reliable Data Transmission and Computation
Session Chair: Kazukuni Kobara
8:30am Door Opens
9:00am Invited Talk:
What Can Cryptography Do for Coding Theory?
Adam Smith (Pennsylvania State University)
Slides in PDF
9:50am Cryptanalysis of Secure Message Transmission Protocols with Feedback
Qiushi Yang and Yvo Desmedt (University College London, UK)
10:15am The Optimum Leakage Principle for Analyzing Multi-threaded Programs
Han Chen and Pasquale Malacaria (Queen Mary University of London, UK)
10:40am Break (20 minutes)
Fingerprint and Watermarking
Session Chair: Paolo D'Arco
11:00am A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
Koji Nuida (AIST, Japan)
11:25am An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes
Koji Nuida and Goichiro Hanaoka (AIST, Japan)
11:50am Statistical-mechanical Approach for Multiple Watermarks Using Spectrum Spreading
Kazuhiro Senda and Masaki Kawamura (Yamaguchi University, Japan)
12:15pm Closing Remark
12:25pm Conference Adjourns