Program
CANS2009 Program (12 - 14 December 2009)
2009/12/12(Sat)
Time |
Content |
09:20-10:00 |
Registration |
10:00-10:10 |
Welcoming Remarks |
10:10-11:25 |
Session 1: 3 Presentations (25min each)
<<Cryptographic Protocol and Schemes I>>
Chair: Mark Manulis
1. |
Title: |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima |
Authors: |
Vladimir Kolesnikov, Ahmad-Reza Sadeghi and Thomas Schneider |
2. |
Title: |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security |
Authors: |
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary and Pandu Rangan C |
3. |
Title: |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring |
Authors: |
Marc Joye |
|
11:25-12:25 |
Invited Talk (1) Chair: Juan A. Garay
|
Title: |
A Cryptographer's-eye View of Privacy in Statistical Databases |
Speaker: |
Adam Smith (Penn State University, US) |
|
12:25-14:30 |
Lunch and Excursion at Kenrokuen Garden, Photo shoot |
14:30-16:10 |
Session 2: 4 Presentations (25min each)
<<Cryptanalysis I>>
Chair: Mitsuru Matsui
1. |
Title: |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT |
Authors: |
Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang and Meiqin Wang |
2. |
Title: |
Saturation Attack on the Block Cipher HIGHT |
Authors: |
Peng Zhang, Bing Sun and Chao Li |
3. |
Title: |
Extensions of the Cube Attack based on Low Degree Annihilators |
Authors: |
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei and Josef Pieprzyk |
4. |
Title: |
An Analysis of the Compact XSL Attack on BES and Embedded SMS4 |
Authors: |
Jiali Choy, Huihui Yap and Khoongming Khoo |
|
116:10-16:30 |
Coffee Break (1) |
16:30-18:10 |
Session 3: 4 Presentations (25min each)
<<Wireless and Sensor Network Security I>>
Chair: Isao Echizen
1. |
Title: |
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks |
Authors: |
Chong Hee Kim and Gildas Avoine |
2. |
Title: |
Anonymizer-Enabled Security and Privacy for RFID |
Authors: |
Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann |
3. |
Title: |
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes |
Authors: |
Nitesh Saxena and Md. Borhan Uddin |
<<Network Security>>
1. |
Title: |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning |
Authors: |
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang and Yue-Hsun Lin |
|
18:30-21:00 |
Banquet at Kanazawa Excel Hotel Tokyu |
2009/12/13(Sun)
Time |
Content |
09:30-10:45 |
Session 4: 3 Presentations (25min each)
<<Privacy and Anonymity>>
Chair: Ahmad-Reza Sadeghi
1. |
Title: |
Privacy-Preserving Relationship Path Discovery in Social Networks |
Authors: |
Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos |
2. |
Title: |
Verifying Anonymous Credential Systems in Applied Pi Calculus |
Authors: |
Xiangxi Li, Yu Zhang and Yuxin Deng |
3. |
Title: |
Transferable Anonymous Constant-Size Fair E-Cash |
Authors: |
Georg Fuchsbauer, David Pointcheval and Damien Vergnaud |
|
10:45-11:05 |
Coffee Break (2) |
11:05-11:55 |
Session 5: 2 Presentations (25min each)
<<Functional and Searchable Encryption>>
Chair: Seny Kamara
1. |
Title: |
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle |
Authors: |
Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wan |
2. |
Title: |
Private-Key Hidden Vector Encryption with Key Privacy |
Authors: |
Carlo Blundo, Vincenzo Iovino and Giuseppe Persiano |
|
11:55-12:55 |
Invited Talk (2) Chair: Akira Otsuka
|
Title: |
Building Secure Networked Systems with Code Attestation |
Speaker: |
Adrian Perrig (CMU, US) |
|
12:55-14:15 |
Lunch |
14:15-15:55 |
Session 6: 4 Presentations (25min each)
<<Authentication>>
Chair: Vlad Kolesnikov
1. |
Title: |
Stronger Password Authentication against Cross-Site Impersonation |
Authors: |
Xavier Boyen |
2. |
Title: |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards |
Authors: |
Wen-Ting Jin and Jing Xu |
3. |
Title: |
Ensuring Authentication of Digital Information using Cryptographic Accumulators |
Authors: |
Christophe Tartary |
<<Block Cipher Design>>
1. |
Title: |
MIBS: A New Lightweight Block Cipher |
Authors: |
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki |
|
15:55-16:15 |
Coffee Break (3) |
16:15-17:55 |
Session 7: 4 Presentations (25min each)
<<Cryptanalysis II>>
Chair: Josef Pieprzyk
1. |
Title: |
Distinguishing and Second-Preimage Attack on CBC-like MACs |
Authors: |
Keting Jia, Xiaoyun Wang, Zheng Yuan and Guangwu Xu |
2. |
Title: |
Improving the Rainbow Attack by Reusing Colours |
Authors: |
Martin Agren, Thomas Johansson and Martin Hell |
3. |
Title: |
Side Channel Cube Attack on PRESENT |
Authors: |
Lin Yang, Meiqin Wang and Siyuan Qiao |
4. |
Title: |
Algebraic Attack on the MQQ Public Key Cryptosystem |
Authors: |
Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding and Johannes Buchmann |
|
18:00-22:00 |
Dinner (Wadaya, a traditional Kanazawa cuisine) |
2009/12/14(Mon)
Time |
Content |
09:30-10:45 |
Session 8: 3 Presentations (25min each)
<<Algebraic and Number-Theoretic Schemes>>
Chair: Jorge Nakahara
1. |
Title: |
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity |
Authors: |
Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu |
2. |
Title: |
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves |
Authors: |
Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari and Francisco Rodriguez-Henriquez |
3. |
Title: |
On the Complexity of Computing Discrete Logarithms over Algebraic Tori |
Authors: |
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki and Hiroki Shizuya |
|
10:45-11:05 |
Coffee Break (4) |
11:05-11:55 |
Session 9: 2 Presentations (25min each)
<<Wireless and Sensor Network Security II>>
Chair: Benoit Libert
1. |
Title: |
On the Usability of Secure Association of Wireless Devices Based On Distance Bounding |
Authors: |
Mario Cagalj, Nitesh Saxena and Ersin Uzun |
2. |
Title: |
Short Hash-based Signatures for Wireless Sensor Networks |
Authors: |
Erik Dahmen and Christoph Kraus |
|
11:55-12:55 |
Invited Talk(3) Chair: Atsuko Miyaji
|
Title: |
Computing on Encrypted Data |
Speaker: |
Craig Gentry (IBM Research, US) |
|
12:55-14:15 |
Lunch |
14:15-15:30 |
Session 10: 3 Presentations (25min each)
<<Cryptographic Protocol and Schemes II>>
Chair: TBA
1. |
Title: |
Fully Robust Tree-Diffie-Hellman Group Key Exchange |
Authors: |
Mark Manulis, Emmanuel Bresson and Timo Brecher |
2. |
Title: |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model |
Authors: |
Benoit Libert and Damien Vergnaud |
3. |
Title: |
Relinkable Ring Signature |
Authors: |
Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi |
|
15:30-15:40 |
Closing |