Conference Program
*note: Schedule is tentative and may change.
Full schedule: Download
Overview: Download
Time | 02-Jul | 03-Jul | 04-Jul | 05-Jul | ||||
8:30 | Registration | Registration | Registration | |||||
9:00 | Opening | |||||||
9:30 | JS Lecture:
Jennifer Seberry |
Keynote 2:
Jong Sou Park |
Session 7A: Foundations B | Session 7B: Short Papers 3 | ||||
10:00 | ||||||||
10:30 | Break | Break | Break | |||||
11:00 | Session 1A: Encryption A | Session 1B: Post-quantum Security A | Session 4A: Foundations A | Session 4B: System and Network Security A | Session 8A: Symmetric Cryptography | Session 8B: System and Network Security C | ||
11:30 | ||||||||
12:00 | ||||||||
12:30 | Lunch | Lunch | ||||||
13:00 | ||||||||
13:30 | Session 2A: Cryptocurrency Related A | Session 2B: Post-quantum Security B | Keynote 3:
Zbigniew Kalbarczyk |
|||||
14:00 | ||||||||
14:30 | Keynote 1:
Joseph K. Liu |
Session 5A: Short Papers 1 | Session 5B: Cryptocurrency Related B | |||||
15:00 | ||||||||
15:30 | Break | Break | ||||||
16:00 | Session 3A: Encryption B | Session 3B: Post-quantum Security C | Session 6A: Short Papers 2 | Session 6B: System and Network Security B | ||||
16:30 | ||||||||
17:00 | ||||||||
17:30 | Registration | |||||||
18:00 | Reception:
Shilling Club |
Banquet: Chateau on the Park |
||||||
19:00 | ||||||||
20:00 | ||||||||
21:00 |
Presentation note:
Full paper presentation – 25 minutes presentation, 5 minutes Q&A (total 30 minutes)
Short paper presentation – 15 minutes presentation, 5 minutes Q&A (total 20 minutes)
Session schedule
Day 1: 3 July
Session 1A (11:00 – 12:30): Encryption A
chair:
1. Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach
– Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal and Dongxi Liu
2. Location Based Encryption
– Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang and Dongxi Liu
3. Group ID-based Encryption With Equality Test Against Insider Attack
– Ling, Ma, Huang, Xiang and Li
Session 1B (11:00 – 12:30): Post-quantum Security A
chair: Veronika Kuchta
1. Improving the security of the DRS scheme with uniformly chosen random noise
– Arnaud Sipasseuth, Thomas Plantard and Willy Susilo
2. A lattice based public key encryption with equality test in standard model
– Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy and Willy Susilo
3. Lattice RingCT v2.0 with Multiple Input and Output Wallets
– Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph Liu and Jacob Cheng
Session 2A (14:30 – 15:30): Cryptocurrency Related A
chair:
1. Fast-to-Finalize Nakamoto-Like Consensus Protocol
– Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu and Joseph Liu
2. A Combined Micro-block Chain Truncation Attack on Bitcoin-NG
– Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin and Hui Yu
Session 2B (14:30 – 15:30): Post-quantum Security B
chair: Terry Lau Shue Chien
1. Two new module-code-based KEMs with rank metric
– Li-Ping Wang and Jingwei Hu
2. Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
– Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel Smart and Younes Talibi Alaoui
Session 3A (16:00 – 17:30): Encryption B
chair: Jongkil Kim
1. Strong Post-Compromise Secure Proxy Re-Encryption
– Ela Lee, Alex Davidson, Amit Deo and Keith Martin
2. Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model
– Tapas Pal and Ratna Dutta
3. Two-Client and Multi-client Functional Encryption for Set Intersection
– Tim R. van de Kamp, David Stritzl, Willem Jonker and Andreas Peter
Session 3B (16:00 – 17:30): Post-quantum Security C
chair:
1. Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem
– Terry Shue Chien Lau and Chik How Tan
2. Pseudorandom Functions from LWE: RKA Security and Application
– Nan Cui, Shengli Liu, Yunhua Wen and Dawu Gu
3. delta-subgaussian Random Variables in Cryptography
– Sean Murphy and Rachel Player
Day 2: 4 July
Session 4A (11:00 – 12:30): Foundations A
chair:
1. Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
– Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai and Jacob Schuldt
2. Efficient Secure Multi-Party Protocols for Decision Tree Classification
– Atsunori Ichikawa, Wakaha Ogata, Koki Hamada and Ryo Kikuchi
3. The Wiener Attack on RSA Revisited: A Quest for the Exact Bound
– Willy Susilo, Joseph Tonien and Guomin Yang
Session 4B (11:00 – 12:30): System and Network Security A
chair: Mengmeng Ge
1. Dimensionality Reduction and Visualization of Network Intrusion Detection Data
– Wei Zong, Yang-Wai Chow and Willy Susilo
2. DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks
– Timothy Curry, Devon Callahan, Benjamin Fuller and Laurent Michel
Session 5A (14:30 – 15:30): Short Papers 1
chair:
1. Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications
– Dongxue Pan, Bei Liang, Hongda Li and Peifang Ni
2. Speeding Up Scalar Multiplication on Koblitz Curves Using $\mu_4$ Coordinates
– Weixuan Li, Wei Yu, Bao Li and Xuejun Fan
3. Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields
– Xuejun Fan, Song Tian, Bao Li and Weixuan Li
Session 5B (14:30 – 15:30): Cryptocurrency Related B
chair:
1. Risk of Asynchronous Protocol Update: Attacks to Monero Protocols
– Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld and Dongxi Liu
2. A Flexible Instant Payment System Based on Blockchain
– Lin Zhong, Qianhong Wu, Jan Xie, Bo Qin, Joseph K. Liu and Huili Wang
Session 6A (16:00 – 17:00): Short Papers 2
chair:
1. Secure and Compact Elliptic Curve Cryptosystems
– Yaoan Jin and Atsuko Miyaji
2. A quantitative study of attribute based correlation in micro-databases and its effects on privacy
– Debanjan Sadhya and Bodhi Chakraborty
3. Automated cash mining attacks on mobile advertising networks
– Woojoong Ji, Taeyun Kim, Kuyju Kim and Hyoungshick Kim
Session 6B (16:00 – 17:00): System and Network Security B
chair:
1. A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs
– Liang Zheng, Donglei Han, Zongbin Liu, Lingchen Zhang, Churan Tang and Ping Peng
2. Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications
– Mohammadreza Ashouri
Day 3: 5 July
Session 7A (09:30 – 10:30): Foundations B
chair:
1. Function-Dependent Commitments from Homomorphic Authenticators
– Lucas Schabhüser, Denis Butin and Johannes Buchmann
2. Security against Subversion in Multi-Surveillant Settings
– Geng Li, Jianwei Liu and Zongyang Zhang
Session 7B (09:30 – 10:30): Short Papers 3
chair:
1. A Novel Semi-Supervised Adaboost Technique Based on Improved Tri-training
– Dunming Li, Jiewen Mao and Fuke Shen
2. Tagging a Malware’s Intentions by using Attention-based Sequence-to-Sequence Neural Network
– Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali Sun, Shun-Wen Hsiao and Meng Chang Chen
Session 8A (11:00 – 12:30): Symmetric Cryptography
chair:
1. Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
– Yunwen Liu and Yu Sasaki
2. Fast Chosen-key Distinguish Attacks on Round-reduced AES-192
– Chunbo Zhu, Gaoli Wang and Boyu Zhu
3. A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks
– Yusuke Naito
Session 8B (11:00 – 12:30): System and Network Security C
chair:
1. AMOGAP: Defending Against Man-in-the-middle and Offline Guessing Attacks on Passwords
– Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo and Qingkai Zeng
2. MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone
– Xiaojian Pang, Li Yang, Maozhen Liu and Jianfeng Ma