Financial Cryptography and Data Security 2017

International Financial Cryptography Association logo

Twenty-First International Conference
April 3–7, 2017
The Palace Hotel

A conference program, including a schedule of events, will be posted shortly. In the meantime, here is a list of presentations:

Invited Talks

Silvio Micali. ALGORAND: A New Public Ledger (opening keynote)

A public ledger is a tamperproof sequence of data that can be read and augmented by everyone. Shared public ledgers stand to revolutionize the way a democratic society operates. They secure all kinds of traditional transactions—such as payments, asset transfers, titling—in the exact order in which they occur; and enable totally new transactions—such as cryptocurrencies and smart contracts. They can remove intermediaries and usher in a new paradigm for trust. As currently implemented, however, public ledgers cannot achieve their enormous potential.

Algorand is a quite alternative, truly democratic, and very efficient way to implement a public ledger. Unlike prior implementations based on proof of work, it requires a negligible amount of computation, and generates a transaction history that will not "fork" with overwhelmingly high probability.

Accepted Papers

Anamaria Costache, Nigel P. Smart and Srinivas Vivek. Faster Homomorphic Evaluation of Discrete Fourier Transforms

Michael Schwarz, Clémentine Maurice, Daniel Gruss and Stefan Mangard. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript

Gunnar Hartung. Attacks on Secure Logging Schemes

Markus Jakobsson. Short Paper: Addressing Sophisticated Email Attacks

David Derler, Sebastian Ramacher and Daniel Slamanig. Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Karthikeyan Bhargavan, Antoine Delignat-Lavaud and Nadim Kobeissi. Formal Modeling and Verification for Domain Validation and ACME

Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic. Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS

Cecylia Bocovich, John A. Doucette and Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage

Wakaha Ogata and Kaoru Kurosawa. Efficient No-dictionary Verifiable SSE

Helger Lipmaa and Kateryna Pavlyk. A Simpler Rate-Optimal CPIR Protocol

Ryan Stanley-Oakes. A Provably Secure PKCS#11 Configuration Without Authenticated Attributes

Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner and Sharon Goldberg. The Security of NTP's Datagram Protocol

Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner and Anja Lehmann. Updatable Tokenization: Formal Definitions and Provably Secure Constructions

Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy and Sasha Ivanov. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies

Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. TrustIsRisk: A Decentralized Financial Trust Platform

Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. BehavioCog: An Observation Resistant Authentication Scheme

Vincent Taylor and Ivan Martinovic. Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store

Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev. A Post-Quantum Digital Signature Scheme based on Supersingular Isogenies

Essam Ghadafi. Efficient Round-Optimal Blind Signatures in the Standard Model

Ajaya Neupane, Md Lutfor Rahman and Nitesh Saxena. PEEP: Passively Eavesdropping Private Input via Brainwave Signals

Reihaneh Safavi-Naini, Viliam Lisy and Yvo Desmedt. Economically Optimal Variable Tag Length Authentication

Pawel Szalachowski, Adrian Perrig. Short Paper: On Deployment of DNS-based Security Enhancements

Qian Wang, Kui Ren, Minxin Du and Aziz Mohaisen. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates

Albrecht Petzoldt, Alan Szepieniec and Mohamed Saied Emam Mohamed. A Practical Multivariate Blind Signature Scheme

Sietse Ringers, Eric Verheul and Jaap-Henk Hoepman. An efficient self-blindable attribute-based credential scheme

Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer. Short Paper: Service-Oriented Sharding with Aspen

Yevgeniy Dodis and Dario Fiore. Unilaterally-Authenticated Key Exchange

Patrick McCorry, Siamak Shahandashti and Feng Hao. A Smart Contract for Boardroom Voting with Maximum Voter Privacy

Tom Chothia, Flavio Garcia, Christopher Heppel and Christopher McMahon-Stone. Why Banker Bob (still) can't get TLS right: A Security Analysis of TLS in Leading UK Banking Apps

Bernardo Portela, Manuel Barbosa, Guillaume Scerri, Bogdan Warinschi, Raad Bahmani, Ferdinand Brasser and Ahmad-Reza Sadeghi. Secure Multiparty Computation from SGX

Nayanamana Samarasinghe and Mohammad Mannan. Short Paper: TLS Ecosystems in Networked Devices vs Web Servers

Gabriel Kaptchuk, Matthew Green and Aviel Rubin. Outsourcing Medical Dataset Analysis: A Possible Solution

Helger Lipmaa. Optimally Sound Sigma Protocols Under DCRA

Steven Goldfeder, Joseph Bonneau, Rosario Gennaro and Arvind Narayanan. Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin

Sherman S. M. Chow, Haibin Zhang and Tao Zhang. Real Hidden Identity-Based Signatures

Poster Presentations

Peter Todd and Harry Halpin. OpenTimestamps: Securing Software Updates using the Bitcoin Blockchain

Anirban Basu, Joshua Jeeson Daniel, Sushmita Ruj, Mohammad Shahriar Rahman, Theo Dimitrakos, and Shinsaku Kiyomoto. Accountability and integrity for data management using blockchains

Zhan Chen and Wenquan Bi. 11-Round Impossible Differential Attack on Midori64

Mohammad Shahriar Rahman, Anirban Basu, and Shinsaku Kiyomoto. Broker-mediated Trade Finance with Blockchains

S. Matthew English, Ehsan Nezhadian. Application of Bitcoin Data-Structures & Design Principles to Supply Chain Management


William Scannell (moderator), Tarah Wheeler, Saender Clark, and others TBA (panelists), When Cash & Crypto Collide

Fiat currencies around the world are beginning to transition to a purely digital form. One need look no further than Venezeula's move to demonetize their 100 bolivar bill; or India's 500 and 1000 rupee note demonetization. These are both clear signals that fiat currency is about to mean something very different in the coming decade. With a purely digital fiat currency, governments expect to expose black market monetary stockpiles, increase the number of participants in the banking system, and improve fiscal efficiency. There will of course be unintended side effects. As money ceases to have any form but ones and zeroes, the role of the security services providers guaranteeing the safe transmission of money around the world is going to increase.

As currency is transmitted in the black box form of secure encrypted tokens, will security guarantors step into the role of monetary authorities?




This conference is organized annually by the International Financial Cryptography Association.