22nd Oct 2017
( 1st Floor, Jiyuan Hotel)
|
14:00-22:00 |
Registration |
Jiyuan International Hotel |
23rd Oct 2017 AM
(Jirui Hall,1st Floor, Jiyuan Hotel)
|
8:30-9:30 |
Opening and Group Photo
Chair: Hui Li |
Keynote Speech 1
Session Chair: Tatsuaki Okamoto |
9:30-10:30 |
Title: Computations on Encrypted Data and Privacy
Speaker: David Pointcheval |
10:30-10:50 |
Tea Break |
Invited Talk 1
Session Chair: Yang Xiang |
10:50-11:40 |
Title:
Speaker: Wanlei Zhou, Tianqing Zhu |
Invited Talk 2
Session Chair: Yong Yu |
11:40-12:30 |
Title: Digital Signatures with Tight Reductions
Speaker: Willy Susilo |
12:30-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel)
|
23rd Oct 2017 PM
(Wenhua Hall, 5th Floor, Jiyuan Hotel)
|
Session 1. Public Key Encryption and Signcryption
Session Chair: |
14:00-14:25 |
Provable Secure Constructions for Broadcast Encryption with Personalized Messages |
|
Kamalesh Acharya |
(IIT KHARAGPUR, India) |
|
Ratna Dutta |
(IIT KHARAGPUR, India) |
|
14:25-14:50 |
Provably Secure Homomorphic Signcryption |
|
Fatemeh Rezaeibagha |
(University of Wollongong ,Australia) |
|
Yi Mu |
(University of Wollongong ,Australia) |
|
Shiwei Zhang |
(University of Wollongong ,Australia) |
|
Xiaofen Wang |
(University of Electronic Science and Technology of China ,China) |
|
14:50-15:15 |
Natural sd-RCCA secure Public-key encryptions |
|
Yuan Chen |
(Xidian University ,China) |
|
Qingkuan Dong |
(Xidian University ,China) |
|
Qiqi Lai |
(Shaanxi Normal University ,China) |
|
15:15-15:40 |
Homomorphic Secret Sharing from Paillier Encryption |
|
Nelly Fazio |
(City College of New York ,United States) |
|
Rosario Gennaro |
(City College of New York ,United States) |
|
Tahereh Jafarikhah |
(City College of New York ,United States) |
|
William Skeith |
(City College of New York ,United States) |
|
15:40-16:00 |
Tea break |
Session 2. Proxy Re-encryption and Functional Encryption
Session Chair: |
16:00-16:25 |
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing |
Sharmila Deva Selvi S |
(Indian Institute of Technology Madras ,India) |
Arinjita Paul |
(Indian Institute of Technology Madras ,India) |
Chandrasekaran Pandurangan |
(Institute of Technology Madras ,India) |
|
16:25-16:50 |
Mergeable Functional Encryption |
|
Vincenzon Iovino |
(University of Luxembourg ,Luxembourg) |
|
Karol Zebrowski |
(University of Warsaw ,Poland) |
|
Session 3. Security Protocols
Session Chair: |
16:50-17:15 |
Private Subgraph Matching Protocol |
|
Zifeng Xu |
(Northeastern University ,China) |
|
Fucai Zhou |
(Northeastern University ,China) |
|
Yuxi Li |
(Northeastern University ,China) |
|
Jian Xu |
(Northeastern University ,China) |
|
Qiang Wang |
(Northeastern University ,China) |
|
17:15-17:40 |
A New Blockchain-based Value-Added Tax System |
|
Dimaz Ankaa Wijaya |
(Monash University ,Australia) |
|
Joseph K. Liu |
(Monash University ,Australia) |
|
Dony Suwarsono |
(Directorate General of Taxes ,Indonesia) |
|
Peng Zhang |
(Shenzhen University ,China) |
|
17:40-18:05 |
Verifiable Private Polynomial Evaluation |
|
Xavier Bultel |
(Universit茅 Clermont Auvergne ,France) |
|
Manik Lal Das |
(DA-IICT ,India) |
|
Hardik Gajera |
(DA-IICT ,India) |
|
David Gerault |
(Universit茅 Clermont Auvergne ,France) |
|
Matthieu Giraud |
(Universit茅 Clermont Auvergne ,France) |
|
Pascal Lafourcade |
(Universit茅 Clermont Auvergne ,France) |
|
18:30 |
Banquet (Jirui Hall,1st Floor, Jiyuan Hotel) |
24th Oct 2017
(Wenhua Hall, 5th Floor, Jiyuan Hotel ) |
Invited Talk 3
Session Chair: Willy Susilo |
8:30-9:20 |
Title: Adversarial signal processing: a game-theoretic framework
Speaker: Mauro Barni |
Invited Talk 4
Session Chair: |
9:20-10:10 |
Title:(Linkable) Ring Signature and its Applications to Blockchain
Speaker: Joseph Liu |
10:10-10:30 |
Tea break |
Invited Talk 5
Session Chair: |
10:30-11:20 |
Title:Accountable Anonymous Authentications
Speaker:Man Ho Allen Au |
Session 4. Authenticated Encryption and Key Exchange
Session Chair: |
11:20-11:45 |
INT-RUP Security of Checksum-based Authenticated Encryption |
|
Ping Zhang |
(University of Science and Technology of China ,China) |
|
Peng Wang |
(Institute of Information Engineering of Chinese Academy of Sciences ,China) |
|
Honggang Hu |
(University of Science and Technology of China ,China) |
|
Changsong Chen |
(The Third Research Institute of Ministry of Public Security ,China) |
|
Wenke Kuai |
(State Grid Anhui Electric Power Company ,China) |
|
11:45-12:10 |
Leakage-Resilient Non-Interactive Key Exchange in the Continuous-Memory Leakage Setting |
|
Suvradip Chakraborty |
(Indian Institute of Technology Madras ,India) |
|
Janaka Alawatugoda |
(University of Peradeniya ,Sri Lanka) |
|
C Pandu Rangan |
(Institute of Technology Madras ,India) |
|
12:10-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel) |
Session 5. Secure Cloud Computing
Session Chair: |
14:00-14:25 |
Provably Secure Self-Extractable Encryption |
|
Zhi Liang |
(Beihang University, China) |
|
Qianhong Wu |
(Beihang University, China) |
|
Weiran Liu |
(Beihang University, China) |
|
Jianwei Liu |
(Beihang University, China) |
|
Fu Xiao |
(Nanjing University of Posts and Telecommunications, China) |
|
14:25-14:50 |
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption |
|
Yunling Wang |
(Xidian University ,China) |
|
Jianfeng Wang |
(Xidian University ,China) |
|
Shifeng Sun |
(Monash University ,Australia) |
|
Joseph K. Liu |
(Monash University ,Australia) |
|
Willy Susilo |
(University of Wollongong ,Australia) |
|
Xiaofeng Chen |
(Xidian University ,China) |
|
14:50-15:15 |
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
|
Ru Meng |
(Shaanxi Normal University ,China) |
|
Kaitai Liang |
(Manchester Metropolitan University ,United Kingdom) |
|
Jianting Ning |
(National University of Singapore ,Singapore) |
|
Jinguang Han |
(University of Surrey ,United Kingdom) |
|
Willy Susilo |
(University of Wollongong ,Australia) |
|
Yanwei Zhou |
(Shaanxi Normal University ,China) |
|
15:15-15:40 |
Secure Multi-label Classification over Encrypted Data in Cloud
|
Yang Liu |
(Nanjing University of Aeronautics and Astronautics ,China) |
|
Xingxin Li |
(Nanjing University of Aeronautics and Astronautics ,China) |
|
Youwen Zhu |
(Nanjing University of Aeronautics and Astronautics ,China) |
|
Jian Wang |
(Nanjing University of Aeronautics and Astronautics ,China) |
|
Zhe Liu |
(Nanjing University of Aeronautics and Astronautics ,China) |
|
15:40-16:00 |
Tea break |
Session 6. Lattice and Post-quantum Cryptography
Session Chair: |
16:00-16:25 |
Provable Secure Signature Scheme based on Isomorphism of Polynomials in Quantum Random Oracle Model |
|
Bagus Santoso |
(University of Electro-Communications, Japan) |
|
Chunhua Su |
(University of Aizu, Japan) |
|
16:25-16:50 |
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts within Polynomial Noise |
|
Long Chen |
(Chinese Academy of Sciences ,China) |
|
Zhenfeng Zhang |
(Chinese Academy of Sciences ,China) |
|
16:50-17:15 |
Revocable Predicate Encryption from Lattices |
|
San Ling |
(Nanyang Technological University, Singapore) |
|
Khoa Nguyen |
(Nanyang Technological University, Singapore) |
|
Huaxiong Wang |
(Nanyang Technological University, Singapore) |
|
Juanyang Zhang |
(Nanyang Technological University, Singapore) |
|
Session 7. Security Models
Session Chair: |
17:15-17:40 |
Impossibility of the Provable Security of the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model |
|
Masayuki Fukumitsu |
(Hokkaido Information University, Japan) |
|
Shingo Hasegawa |
(Tohoku University, Japan) |
|
17:40-18:05 |
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem |
|
Fangguo Zhang |
(Sun Yat-sen University ,China) |
|
18:05-18:30 |
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security |
|
Dali Zhu |
(University of Chinese Academy of Sciences, China) |
|
Renjun Zhang |
(University of Chinese Academy of Sciences, China) |
|
Dingding Jia |
(University of Chinese Academy of Sciences, China) |
|
18:30 |
Dinner Buffet (8th Floor, Jiyuan Hotel) |
25th Oct 2017
(Wenhua Hall, 5th Floor, Jiyuan Hotel) |
Session 8. Short Papers
Session Chair: |
8:30-8:50 |
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions |
|
Ahto Buldas |
(Tallinn University of Technology, Estonia) |
|
Matthias Geihs |
(TU Darmstadt, Germany) |
|
Johannes Buchmann |
(TU Darmstadt, Germany) |
|
8:50-9:10 |
Fuzzy Public-Key Encryption Based on Biometric Data |
|
Hui Cui |
(Royal Melbourne Institute of Technology, Australia) |
|
Man Ho Au |
(The Hong Kong Polytechnic University, Hong Kong) |
|
Baodong Qin |
(Xi'an University of Posts and Telecommunications, China) |
|
Xun Yi |
(Royal Melbourne Institute of Technology, Australia) |
|
Robert.H Deng |
(Singapore Management University, Singapore) |
|
9:10-9:30 |
On the Hardness of Sparsely Learning Parity with Noise |
|
Hanlin Liu |
(Shanghai JiaoTong University ,China) |
|
Di Yan |
(Shanghai JiaoTong University ,China) |
|
Yu Yu |
(Shanghai JiaoTong University ,China) |
|
Shuoyao Zhao |
(Shanghai JiaoTong University ,China) |
|
9:30-9:50 |
A Secure Cloud Backup System with Deduplication and Assured Deletion |
|
Junzuo Lai |
(Jinan University ,China) |
|
Jie Xiong |
(Jinan University ,China) |
|
Chuansheng Wang |
(Jinan University ,China) |
|
Guangzheng Wu |
(Jinan University ,China) |
|
Yanling Li |
(Jinan University ,China) |
|
9:50-10:10 |
New framework of Password-based Authenticated Key Exchange from Only-one Lossy Encryption |
|
Haiyang Xue |
(Chinese Academy of Sciences, China) |
|
Bao Li |
(Chinese Academy of Sciences, China) |
|
Jingnan He |
(Chinese Academy of Sciences, China) |
|
10:10-10:30 |
Tea break |
Session 9. Digital Signatures and Authentication
Session Chair: |
10:30-10:55 |
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures |
|
Gunnar Hartung |
(Karlsruhe Institute of Technology (KIT),Germany) |
|
Bj枚rn Kaidel |
(Karlsruhe Institute of Technology (KIT),Germany) |
|
Alexander Koch |
(Karlsruhe Institute of Technology (KIT),Germany) |
|
Jessica Koch |
(Karlsruhe Institute of Technology (KIT),Germany) |
|
Dominik Hartmann |
(Karlsruhe Institute of Technology (KIT),Germany) |
|
10:55-11:20 |
Verifiably Encrypted Group Signatures |
|
Zhen Wang |
(Beihang University, China) |
|
Xiling Lou |
(Beihang University, China) |
|
Qianhong Wu |
(Beihang University, China) |
|
11:20-11:45 |
Deniable Ring Authentication based on Projective Hash Functions |
|
Shengke Zeng |
(Xihua University ,China) |
|
Yi Mu |
(University of Wollongong ,Australia) |
|
Guomin Yang |
(University of Wollongong ,Australia) |
|
Mingxing He |
(Xihua University ,China) |
|
11:45-12:00 |
Closing |
12:00-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel)
|