ebook img

Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers PDF

322 Pages·2015·13.858 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers

Michael Brenner · Nicolas Christin Benjamin Johnson · Kurt Rohloff (Eds.) 6 7 Financial Cryptography 9 8 S C and Data Security N L FC 2015 International Workshops, BITCOIN, WAHC, and Wearable San Juan, Puerto Rico, January 30, 2015 Revised Selected Papers 123 Lecture Notes in Computer Science 8976 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Michael Brenner Nicolas Christin (cid:129) Benjamin Johnson Kurt Rohloff (Eds.) (cid:129) Financial Cryptography and Data Security FC 2015 International Workshops BITCOIN, WAHC, and Wearable San Juan, Puerto Rico, January 30, 2015 Revised Selected Papers 123 Editors Michael Brenner Benjamin Johnson LeibnizUniversität Carnegie MellonUniversity Hannover Pittsburgh, PA Germany USA NicolasChristin KurtRohloff Carnegie MellonUniversity NewJersey Institute ofTechnology Pittsburgh, PA Newark, NJ USA USA ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-662-48050-2 ISBN978-3-662-48051-9 (eBook) DOI 10.1007/978-3-662-48051-9 LibraryofCongressControlNumber:2015943047 LNCSSublibrary:SL4–SecurityandCryptology SpringerHeidelbergNewYorkDordrechtLondon ©InternationalFinancialCryptographyAssociation2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper Springer-VerlagGmbHBerlinHeidelbergispartofSpringerScience+BusinessMedia (www.springer.com) BITCOIN 2015: Second Workshop on Bitcoin Research Building on the success of the First Workshop on Bitcoin Research, which was co-hosted with Financial Cryptography and Data Security 2014, we were delighted to havetheopportunitytoofferthisworkshopagainthisyear.If2013markedtheyearin which Bitcoin burst onto the media stage, 2014 was a year of consolidation, in which Bitcoin and distributed payment systems cemented their status as a worthy and prac- tical research topic. Bitcoin’s exchange rate, which had been surpassing record high after record high in 2013, settled down to much more modest levels in 2014, driving some of the speculators away. Meanwhile, researchers identified a number offascinating challenges brought upon byBitcoinindomainsrangingfromlegalaspects,togametheory,todistributedsystem design.Ourgoalinorganizingthissecondworkshopwastocontinueofferingaforum for this exciting research to be heard and discussed. We believe that the program the authors contributed is a good reflection of the diversity of the research Bitcoin can foster. Wegaveauthorsofacceptedpaperstheopportunitytopublishthepaperinextenso intheseproceedingsortolimitthemselvestoanabstractiftheydecidedtopursueother avenues for publication. As a result, the proceedings in the volume contain the full, revisedversionsofnineofthetenacceptedpapers,andoneextendedabstract.Authors of Bitcoin-related papers submitted to the main conference were also automatically consideredfortheworkshop.Allinall,weconsidered15manuscriptsforinclusionin this proceedings volume. These manuscripts were evaluated through a thorough peer-review process, in which each paper was assigned to at least three reviewers. We thank the authors of all submissions, the members of the Program Committee, and the external reviewers for their efforts; Rainer Böhme and Tyler Moore, the organizers of the first edition, for their sage advice; the presenters and the numerous participants for attending; and the organizers of Financial Cryptography and Data Security 2015 for hosting this workshop. We are especially grateful to the Bitcoin Foundation who acted as Bitcoin-grade sponsor of the main conference and the workshop. April 2015 Nicolas Christin Emin Gün Sirer VI BITCOIN 2015 BITCOIN 2015 Program Committee Gavin Andresen Bitcoin Foundation, USA Elli Androulaki IBM Zürich, Switzerland Rainer Böhme University of Münster, Germany Joseph Bonneau Princeton University, USA Srdjan Capkun ETH Zürich, Germany Jeremy Clark Concordia University, Canada Stefan Dziembowski University of Warsaw, Poland Benjamin Edelman Harvard University, USA Ittay Eyal Cornell University, USA Christina Garman Johns Hopkins University, USA Matt Green Johns Hopkins University, USA Joshua Kroll Princeton University, USA Sarah Meiklejohn University College London, UK Tyler Moore Southern Methodist University, USA Andrew Miller University of Maryland, USA Roger Wattenhofer ETH Zürich, Switzerland Nicholas Weaver ICSI, USA Aviv Zohar Hebrew University of Jerusalem, Israel WAHC 2015: Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography The cloud hype and recent disclosures show there is demand for secure and practical computing technologies. The workshop addresses the challenge in safely outsourcing dataprocessingontoremotecomputingresourcesbyprotectingprogramsanddataeven during processing. This allows users to outsource computation over confidential information independently from the trustworthiness or the security level of the remote delegate. The workshop serviced these research needs by collecting and bringing togethersomeofthetopresearchersandpractitionersfromacademia,government,and industry to present, discuss, and share the latest progress in the field relevant to real-world problems with practical approaches and solutions. The workshop was uniformly attended by academia, government, and industry, withattendeesbothfromprioryearswithexperienceinthedomainandnewattendees learning from the community. Specific encrypted computing technologies focused on homomorphic encryption and secure multiparty computation. The technologies and techniques discussed in this workshop are key to extending the range of applications that can be securely and practically outsourced. Presentations and discussion at the workshop were of the high quality and deep insightwehavecometoexpectfromourcommunity.Topicsofconversationincluded insights and lessons learned from experience implementing encrypted computing schemes, and experience reports on applying these technologies. Special thanks to the invited speakers: Drew Dean from SRI International and Dov Gordon from Applied Communication Sciences, who shared their experiences and involvements from multiple past encrypted computing projects. The workshop received 16 submissions. All contained unique and interesting results. Each was reviewed by at least three Program Committee members. While all the papers were of high quality, only six papers were accepted to the workshop. We thanktheauthorsforallsubmissions,themembersoftheProgramCommitteefortheir effort,theworkshopparticipantsforattending,andtheFCorganizersforsupportingus. April 2015 Michael Brenner Kurt Rohloff VIII WAHC 2015 WAHC 2015 Program Committee Dan Bogdanov Cybernetica, Estonia Kevin Butler University of Florida, USA David Cousins BBN, USA Dario Fiore IMDEA Software Institute, Madrid, Spain Shai Halevi IBM, USA Vladimir Kolesnikov Bell Labs, USA Tancrde Lepoint CryptoExperts, France David Naccache Ecole Normale Superieure, Paris, France Michael Naehrig Microsoft, USA Maire O’Neill Queen’s University Belfast, UK Pascal Paillier CryptoExperts, France Benny Pinkas Bar-Ilan University, Israel Christoph Sorge Universität Saarland, Germany Osman Ugus Exceet Secure Solutions, Germany Yevgeniy Vahlis University of Toronto, Canada Marten van Dijk University of Connecticut, USA Fre Vercauteren Katholieke Universiteit Leuven, Belgium Adrian Waller Thales, UK Wearable 2015: First Workshop on Wearable Security and Privacy Wearable 2015, the First Workshop on Wearable Security and Privacy, was held January30,2015,attheInterContinentalSanJuanHotelinIslaVerde,PuertoRico,in association with Financial Cryptography and Data Security 2015. This workshop focused on the unique challenges of security and privacy for wearable devices. The workshop received eight submissions of which six were accepted. These proceedingscontainrevisedversionsoftheacceptedpapers.Aninvitedlecture,entitled “Privacy in the Age of Pervasive Cameras: When Electronic Privacy Gets Physical” was given by Apu Kapadia, Assistant Professor of Computer Science and Informatics at Indiana University. The Program Committee consisted of 12 members with diverse research interests relatedtotheworkshoptopic.Eachpaperwasassignedtoatleastthreereviewers.We ensured that each paper received a fair and objective review by experts and also a broadergroupofProgramCommitteemembers.Thefinaldecisionsonacceptedpapers were based on reviews and discussion. We sincerely thank the authors of all submissions. Their efforts gave us an opportunityforastronganddiverseprogram.Wealsosincerelythanktheeffortsofthe Program Committee. We are very fortunate that so many brilliant people invested so much time not only in writing reviews, but also in participating actively in follow-up discussions. A list of Program Committee members appears after this note. April 2015 Benjamin Johnson John Chuang

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.