9th European PKI Workshop: Research and Applications
in conjunction with ESORICS 2012

Pisa, Italy - September 13-14, 2012

Home  |  Call for Papers [pdf]   [txt]   |  Committees  |  Important dates  |  Program

Program (draft)

Thursday September 13, 2012
09:15 - 09:30 Welcome
09:30 - 10:45 Invited talk
Key Reuse in Public Key Cryptography: Theory and Practice
Kenny Paterson

10:45 - 11:25 Coffee break
11:25 - 12:25 Session 1: Digital Signature
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer, Herve Chabanne, Alain Patey

Non-Interactive Public Accountability for Sanitizable Signatures
Christina Brzuska, Henrich C. Pöhls, and Kai Samelin

12:25 - 14:15 Lunch break
14:15 - 15:45 Session 2: Public Key Infrastructure
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities
Johannes Braun, Andreas Hulsing, Alex Wiesmaier, Martin A. G. Vigil, Johannes Buchmann

Personal PKI for the Smart Device Era
John Lyle, Andrew Paverd, Justin King-Lacroix, Andrea Atzeni, Habib Virji, Ivan Flechais, Shamal Faily

The Notary Based PKI
Martin Vigil, Cristian Moecke, Ricardo Custodio, Melanie Volkamer

15:45 - 16:15 Coffee Break
16:15 - 17:15 Session 3: Wireless Authentication and Revocation (Chair: Andrea Atzeni)
How to bootstrap trust among devices in home wireless environments via EAP-STLS
Massimiliano Pala

Anonymity Revocation through Standard Infrastructures
Jesus Diaz, David Arroyo, Francisco B. Rodriguez

Friday September 14, 2012
09:30 - 10:45 Invited talk
Cloud computing, Economics, and PKI (The good, the bad, and the ugly?)
Roberto Di Pietro

10:45 - 11:15 Coffee break
11:15 - 12:45 Session 4: Cryptographic Schemas and Trusted Computing (Chair: Alain Patey)
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure

Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness
Cheng Chen, Yanfei Guo, Rui Zhang

Waltzing the Bear, or: A Trusted Virtual Security Module
Ronald Töegl, Florian Reimair, and Martin Pirker

12:25 - 14:15 Lunch break
14:15 - 15:15 Session 5: Certificates and Public Key Encryption (Chair: Ronald Töegl)
GeoPKI: Translating Spatial Trust into Certificate Trust
Tiffany Hyun-Jin Kim, Adrian Perrig, Virgil Gligor

Efficient Public Key Encryption Admitting Decryption by Sender
Puwen Wei, Yuliang Zheng

If you have any question, please contact the program chairs at