Financial Cryptography and Data Security 2018


Twenty-Second International Conference
February 26–March 2, 2018
Santa Barbara Beach Resort

Please note, this program is provisional and subject to change.

All events take place in the Arawak Ballroom unless otherwise indicated.
Sunday, February 25, 2018

16:00–18:00 Registration Reception
Location: Huri Huri
Monday, February 26, 2018

08:30–09:00 Registration

09:00–09:15 Opening Remarks

Session 1: Opening Keynote

Yassir Nawaz
Executive Director, JPMorgan Chase & Co.

10:15–10:45 Break

Session 2: Privacy

"Major key alert!" Anomalous keys in Tor relays. George Kadianakis (The Tor Project), Claudia V. Roberts, Laura M. Roberts, and Philipp Winter (Princeton University)

On purpose and by necessity: Compliance under the GDPR. David Basin (ETH Zürich), Søren Debois, and Thomas Hildebrandt (IT University of Copenhagen)

MP3: A More Efficient Private Presence Protocol. Rahul Parhi, Michael Schliep, and Nicholas Hopper (University of Minnesota - Twin Cities)

12:00–13:30 Lunch
Location: Shore

Session 3: Cryptographic Integrity

Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model). Hovav Shacham (UT Austin)

Weak-Unforgeable Tags for Secure Supply Chain Management. Reza Rahaeimehr, Hoda Maleki, Marten van Dijk, Chenglu Jin, and Phuong ha Nguyen (University of Connecticut)

Proof-of-Censorship: Enabling centralized censorship-resistant content providers. Ian Martiny (University of Colorado), Ian Miers (Johns Hopkins University), and Eric Wustrow (University of Colorado)

14:45–15:15 Break

Session 4: Economic and Usability Analyses

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. Sadegh Farhang (Penn State), Aron Laszka (University of Houston), and Jens Grossklags (Technical University of Munich)

The Rules of Engagement for Bug Bounty Programs. Aron Laszka (University of Houston), Mingyi Zhao (Snap Inc.), Akash Malbari (Pennsylvania State University), and Jens Grossklags (Technical University of Munich)

Why Johnny Doesn't Use Two Factor: A Two-Phase Usability Study of the FIDO U2F Security Key. Sanchari Das, Gianpaolo Russo, Andrew C. Dingman, and L. Jean Camp (Indiana University Bloomington)

19:00–21:30 Welcome Reception and Poster Session
Location: Stanibari
Tuesday, February 27, 2018

Session 5: Privacy and Data Processing

High-Precision Privacy-Preserving Real-Valued Function Evaluation. Christina Boura, Ilaria Chillotti (Universite de Versailles), Nicolas Gama (Inpher and Universite de Versailles), Dimitar Jetchev, Stan Peceny, and Alexander Petric (Inpher)

Faster Unbalanced Private Set Intersection. Amanda Cristina Davi Resende and Diego de Freitas Aranha (University of Campinas)

SWiM: Secure Wildcard Pattern Matching From OT Extension. Vladimir Kolesnikov (Bell Labs), Mike Rosulek, and Ni Trieu (Oregon State University)

10:15–10:45 Break

Session 6: Attacks

Attacks against GSMA's M2M Remote Provisioning (short paper). Maxime Meyer (ENS Ulm Paris), Elizabeth A. Quaglia (Royal Holloway, University of London), and Ben Smyth (University of Luxembourg)

Rescuing LoRaWAN 1.0. Gildas Avoine (IRISA) and Loïc Ferreira (Orange)

Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors. Jordan Holland, Joseph Connor, Parker Diamond, Jared M. Smith, and Max Schuchard (University of Tennessee)

12:30–20:30 Excursion

West side tour with dinner at Dokterstuin.

21:00–22:00 General Meeting
Location: Arawak Ballroom

22:00–00:00 Rump Session
Location: Arawak Ballroom
Wednesday, February 28, 2018

Session 7: Applied Cryptography

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. Abdelrahaman Aly, Aysajan Abidin, and Svetla Nikova (imec-COSIC ESAT, KU Leuven)

A Fourier Analysis Based Attack against Physically Unclonable Functions. Fatemeh Ganji, Shahin Tajik, and Jean-Pierre Seifert (Technische Universitaet Berlin)

On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling. Jeremiah Blocki and Samson Zhou (Purdue University)

10:15–10:45 Break

Session 8: Anonymity in Distributed Systems

Pricing Anonymity. Daniel G. Arce (University of Texas at Dallas) and Rainer Böhme (Universität Innsbruck)

A New Look at Refund Mechanism in Bitcoin Payment Protocol. Sepideh Avizheh, Reihaneh Safavi-Naini (University of Calgary), and Siamak F. Shahandashti (University of York)

Anonymous Reputation Systems Achieving Full Dynamicity from Lattices. Ali El Kaafarani (University of Oxford), Shuichi Katsumata (The University of Tokyo, National Institute of Advanced Industrial Science and Technology (AIST)), and Ravital Solomon (University of Oxford)

12:00–13:30 Lunch
Location: Shore

Session 9: Blockchain Measurements

Measuring Profitability of Alternative Crypto-currencies (short paper). Danny Yuxing Huang, Kirill Levchenko, and Alex C. Snoeren (University of California, San Diego)

A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf (RWTH Aachen University), Dirk Müllmann (Goethe University, Frankfurt/Main), Oliver Hohlfeld, and Klaus Wehrle (RWTH Aachen University)

Decentralization in Bitcoin and Ethereum Networks. Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer (Cornell University, IC3)

18:00–20:00 Beach BBQ
Location: Shaman Beach
Thursday, March 1, 2018

Session 10: Blockchain Protocols

Anonymous Post-Quantum Cryptocash. Huang Zhang, Fangguo Zhang, Haibo Tian (Sun Yat-Sen University), and Man Ho Allen Au (The Hong Kong Polytechnic University)

SpaceMint: A Cryptocurrency Based on Proofs of Space. Sunoo Park, Albert Kwon (MIT), Joel Alwen (IST Austria), George Fuchsbauer (ENS Paris), Peter Gazi, and Krzysztof Pietrzak (IST Austria)

Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. Bernardo David (Tokyo Institute of Technology), Rafael Dowsley (Aarhus University), and Mario Larangeira (Tokyo Institute of Technology)

10:15–10:45 Break

Session 11: Blockchain Modeling

Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach. Anastasia Mavridou (Vanderbilt University) and Aron Laszka (University of Houston)

A formal model of Bitcoin transactions. Nicola Atzei, Massimo Bartoletti, Stefano Lande (University of Cagliari), and Roberto Zunino (University of Trento)

11:35–11:45 Closing Remarks

12:00–13:30 Lunch
Location: Shore

14:00–18:30 Free Afternoon with Activities
(sign-up sheets will be available)

A: Blue Curacao liquor factory, Fort Nassau, Scharloo Street, downtown historical walking tour, Kura Hulanda, Riffort Mall

B: Fortress Beekenburg, east side view point, ostrich farm and jeep tour

C: Aloe farm plantation, botanic and historic garden Den Paradera

D: Hato Caves tour, Caracas Bay snorkeling

19:00–22:00 Punda Vibes
Location: Downtown

On your own, but group transportation will be arranged.

Friday, March 2, 2018

Morning Workshops

Note: the timing of the lunch and breaks is coordinated among all of the workshops, but some workshops might start earlier in the morning or end later in the afternoon. See their individual programs for details. Workshop registrants can attend any of the workshops and can switch between them as desired.

10:30–11:00 Break

12:30–14:00 Lunch
Location: Shore

Afternoon Workshops

15:30–16:00 Break




This conference is organized annually by the International Financial Cryptography Association.