ACISP 2016

21st Australasian Conference on Information Security and Privacy
Melbourne, Australia
4-6 July 2016

Conference Schedule

4 July5 July6 July
Room 1Room 2Room 1Room 2Room 1Room 2
Registration
OpeningSess. 5Sess. 6Sess. 11Sess. 12
Keynote 1Invited Talk 3
Coffee Break
Jennifer Seberry Invited LectureKeynote 2Invited Talk 6
Invited Talk 2Invited Talk 4Invited Talk 7
Lunch
Sess. 1Sess. 2Invited Talk 5Invited Talk 8
Sess. 7Sess. 8Sess. 13Sess. 14
Coffee Break
Sess. 3Sess. 4Sess. 9Sess. 10Sess. 15Sess. 16
StC MeetingClosing
ReceptionBanquet
TimeRoom 1Room 2
08:30-09:00Registration
09:00-09:30Opening
09:30-10:30Keynote 1
10:30-10:50Coffee Break
10:50-11:30Jennifer Seberry Invited Lecture
11:30-12:10Invited Talk 2
12:10-13:10Lunch
13:10-15:15 Session 1 Session 2
15:15-15:35Coffee Break
15:35-17:05 Session 3 Session 4
17:05-18:00Steering Committee Meeting
18:00-19:00Welcome Reception
TimeRoom 1Room 2
08:30-09:45 Session 5 Session 6
09:45-10:25Invited Talk 3
10:25-10:45Coffee Break
10:45-11:45Keynote 2
11:45-12:25Invited Talk 4
12:25-13:20Lunch
13:20-14:00Invited Talk 5
14:00-15:15 Session 7 Session 8
15:15-5:35Coffee Break
15:35-17:30 Session 9 Session 10
18:30Conference Banquet
TimeRoom 1Room 2
08:30-10:35 Session 11 Session 12
10:35-10:55Coffee Break
10:55-11:35Invited Talk 6
11:35-12:15Invited Talk 7
12:15-13:15Lunch
13:15-13:55Invited Talk 8
13:55-15:35 Session 13 Session 14
15:35-15:55Coffee Break
15:55-17:15 Session 15 Session 16
17:15-17:30Closing

Technical Program

Full Paper: 25 min Invited Paper: 25 min Short Paper: 15 min

Conference Opening
09:00-09:30 (4 July) [Room 1]

Opening Address
Professor Peter Hodgson, Deputy Vice-Chancellor Research, Deakin University, Australia

Program Overview
Dr Ron Steinfeld and Dr Joseph Liu, Monash University, Australia

ACISP: History and Future
Professor Jennifer Seberry, University of Wollongong, Australia

Keynote Address 1 (Chair: Yang Xiang)
09:30-10:30 (4 July) [Room 1]

Security and Privacy in the IoT Learn More
Professor Elisa Bertino, Purdue University, United States

Jennifer Seberry Invited Lecture (Chair: Jennifer Seberry)
10:50-11:30 (4 July) [Room 1]

Integrated Access Control for Smart Buildings using Building Information Models Learn More
Professor Ed Dawson, Queensland University of Technology, Australia

Invited Talk 2 (Chair: Josef Pieprzyk)
11:30-12:10 (4 July) [Room 1]

A Survey on Anonymous Credentials Learn More
Professor Xun Yi, RMIT University, Australia

Session 1A: Bitcoin Security (Chair: Aniello Castiglione)
13:10-14:00 (4 July) [Room 1]

Fair Client Puzzles from the Bitcoin Blockchain
Christopher Carr and Colin Boyd

Towards Bitcoin Payment Networks Invited Paper
Patrick McCorry, Malte Möser, Siamak Shahandashti and Feng Hao

Session 1B: Cloud Storage Security (Chair: Aniello Castiglione)
14:00-15:15 (4 July) [Room 1]

Towards Efficient Fully Randomized Message-Locked Encryption
Tao Jiang, Xiaofeng Chen, Qianhong Wu, Willy Susilo, Jianfeng Ma, and Wenjing Lou

Secure and Traceable Framework for Data Circulation
Kaitai Liang, Atsuko Miyaji, and Chunhua Su

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy
Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Raymond Choo, and Xinpeng Zhang

Session 2A: Functional Encryption and Attribute-based Cryptosystem (I) (Chair: Fuchun Guo)
13:10-14:25 (4 July) [Room 2]

Chosen Ciphertext Secure Attribute-Based Encryption With Outsourced Decryption
Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, and Min Ji

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
Yinghui Zhang, Jin Li, Dong Zheng , Xiaofeng Chen, and Hui Li

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, and Ting Wang

Session 2B: Secure Batch Processing (Chair: Fuchun Guo)
14:25-15:15 (4 July) [Room 2]

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations
Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, and Yuan Zhou

Accelerating Oblivious Transfer with Batch Multi-Exponentiation
Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, and Wei Hu

Session 3A: Digital Forensics (Chair: Raymond Choo)
15:35-16:15 (4 July) [Room 1]

Interest Profiling for Security Monitoring and Forensic Investigation Short Paper
Min Yang, Fei Xu, and Kam-pui Chow

Exploring the Space of Digital Evidence
Carsten Rudolph

Session 3B: Social Network Privacy (Chair: Raymond Choo)
16:15-17:05 (4 July) [Room 1]

Towards Privacy Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy
Shen Yan, Shiran Pan, Yuhang Zhao, and Wen-Tao Zhu

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing Invited Paper
Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, and Man Ho Au

Session 4: Public Key and Identity-based Encryption (I) (Chair: Willy Susilo)
15:35-17:05 (4 July) [Room 2]

Content-based Encryption
Xiaofen Wang and Yi Mu

Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry
Zhe Xia, Xiaoyun Yang, Min Xiao, and Debiao He

Identity-Based Group Encryption
Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, and Qianhong Wu

Reducing the Key Size of the SRP Encryption Scheme Short Paper
Duong Hoang Dung, Albrecht Petzoldt, and Tsuyoshi Takagi

Session 5: Signature and Key Management (Chair: Yong Yu)
08:30-09:45 (5 July) [Room 1]

One-Round Strong Oblivious Signature-Based Envelope
Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, and Mingwu Zhang

Proxy Signature with Revocation
Shengmin Xu, Guomin Yang, Yi Mu and Sha Ma

On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Aniello Castiglione

Session 6: Symmetric Cipher (I) (Chair: Kazuhiko Minematsu)
08:30-09:45 (5 July) [Room 2]

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song, Zhangjie Huang, and Qianqian Yang

On the Security of the LAC Authenticated Encryption Algorithm
Jiqiang Lu

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin, Huaifeng Chen, and Xiaoyun Wang

Invited Talk 3 (Chair: Ron Steinfeld)
09:45-10:25 (5 July) [Room 1]

Secure Outsourcing and Crowdsourcing of Computations Learn More
Professor Willy Susilo, University of Wollongong, Australia

Keynote Address 2 (Chair: Joseph Liu)
10:45-11:45 (5 July) [Room 1]

Triple DES Revisited Learn More
Professor Chris Mitchell, Royal Holloway, University of London, United Kingdom

Invited Talk 4 (Chair: Joseph Liu)
11:45-12:25 (5 July) [Room 1]

Cloning 3G/4G SIM Cards with Side-channel Analysis: Lessons Learned in Physical Security Learn More
Professor Yu Yu, Shanghai Jiao Tong University, China

Invited Talk 5 (Chair: Xinyi Huang)
13:20-14:00 (5 July) [Room 1]

Security and Privacy in Passive Mobile RFID Systems Learn More
Professor Wanlei Zhou, Deakin University, Australia

Session 7: Functional Encryption and Attribute-based Cryptosystem (II) (Chair: S. M. Yiu)
14:00-15:15 (5 July) [Room 1]

Leakage-Resilient Functional Encryption via Pair Encodings
Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, and Jinguang Han

Secret Handshakes with Dynamic Expressive Matching Policy
Lin Hou, Junzuo Lai and Lixian Liu

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo

Session 8: Statistical Privacy (Chair: Chunhua Su)
14:00-15:15 (5 July) [Room 2]

Privacy-preserving k-Nearest Neighbour Query on Outsourced Database
Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, and Tsuyoshi Takagi

Reversible Data Hiding for Encrypted Images Based on Statistical Learning
Zhen Li and Wei Wu

Statistical disclosure control for data privacy using sequence of generalised linear models Invited Paper
Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, and Wun-She Yap

Session 9A: National Security Infrastructure (Chair: Ed Dawson)
15:35-16:40 (5 July) [Room 1]

A Comparison Study of Wireless Network Security in several Australasian Cities & Suburbs
Alastair Nisbet and Andrew Woodward

On the Guessability of Resident Registration Numbers in South Korea
Youngbae Song, Hyoungshick Kim, and Junho Huh

Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats Short Paper
Miroslaw Kutylowski, Lucjan Hanzlik, and Kamil Kluczniak

Session 9B: Smart City Security (Chair: Ed Dawson)
16:40-17:30 (5 July) [Room 1]

Putting the User in Control of the Intelligent Transportation System
Catalin Gosman, Tudor Cornea, Ciprian Dobre, Florin Pop, and Aniello Castiglione

A survey on the cyber attacks against non-linear state estimation in smart grids Invited Paper
Jingxuan Wang, Lucas C. K. Hui, S. M. Yiu, Xingmin Cui, Eric Ke Wang, and Junbin Fang

Session 10A: Pseudo Random / One-way Function (Chair: Chris Mitchell)
15:35-16:40 (5 July) [Room 2]

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
Xun Yi, Xuechao Yang, Yong Feng, Fengling Han, and Ron van Schyndel

One-Key Compression Function Based MAC with BBB Security
Avijit Dutta, Mridul Nandi, and Goutam Paul

A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems Short Paper
Jhordany Rodriguez Parra, Terence Chan, and Siu Wai Ho

Session 10B: Mathematical Primitives (I) (Chair: Chris Mitchell)
16:40-17:30 (5 July) [Room 2]

Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
Atsushi Takayasu and Noboru Kunihiro

A new attack on three variants of the RSA cryptosystem
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, and Joseph Tonien

Session 11A: Searchable Encryption (Chair: Kaitai Liang)
08:30-09:45 (6 July) [Room 1]

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe L. Jiang and Jin Li

Public Key Encryption with Authorized Keyword Search
Peng Jiang, Yi Mu, Fuchun Guo, and Qiaoyan Wen

Linear Encryption with Keyword Search
Shiwei Zhang, Guomin Yang, and Yi Mu

Session 11B: Broadcast Encryption (Chair: Kaitai Liang)
09:45-10:35 (6 July) [Room 1]

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Kai He, Jian Weng, Man Ho Au, Yijun Mao, and Robert H. Deng

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, and Rongmao Chen

Session 12: Symmetric Cipher (II) (Chair: Jiqiang Lu)
08:30-10:35 (6 July) [Room 2]

Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
Nasour Bagheri, Florian Mendel, and Yu Sasaki

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler, Eik List, Stefan Lucks, and Jakob Wenzel

Improved (Related-Key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Jiageng Chen, Je Sen Teh, Chunhua Su, Azman Samsudin, and Junbin Fang

Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu

Impossible Differential Cryptanalysis of 14-Round Camellia-192
Keting Jia and Ning Wang

Invited Talk 6 (Chair: Yi Mu)
10:55-11:35 (6 July) [Room 1]

Charging Me and I Know Your Secrets: Attack and Defence Learn More
Dr Weizhi Meng, Institute for Infocomm Research, Singapore

Invited Talk 7 (Chair: Yi Mu)
11:35-12:15 (6 July) [Room 1]

CLAP: Lightweight Authentication Protocols for IoT Applications Learn More
Dr Surya Nepal, CSIRO Data61, Australia

Invited Talk 8 (Chair: Julian Jang-Jaccard)
13:15-13:55 (6 July) [Room 1]

Ransomware Outbreaks in Australia Learn More
Dr Jonathan Oliver, Trend Micro, Australia

Session 13: Lightweight / QR Code Security (Chair: Carsten Rudolph)
13:55-15:35 (6 July) [Room 1]

Towards Lightweight Anonymous Entity Authentication for IoT Applications
Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, and Kim-Kwang Raymond Choo

Hybrid MQ Signature for Embedded Device
Shaohua Tang, Bo Lv, and Wuqiang Shen

Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes Invited Paper
Zhe Liu, Johann Großschädl, Lin Li, and Qiuliang Xu

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
Yang-Wai Chow, Willy Susilo, Guomin Yang, James Phillips, Ilung Pranata, and Ari Moesriami Barmawi

Session 14: Public Key (II) / Password (Chair: Man Ho Au)
13:55-15:35 (6 July) [Room 2]

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
Shi-Feng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, and Dawu Gu

Edit Distance Based Encryption and Its Application
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, and Kaitai Liang

Proxy Re-Encryption with Delegatable Verifiability
Xiaodong Lin and Rongxing Lu

Password Requirements Markup Language
Moritz Horsch, Mario Schlipf, Johannes Braun, and Johannes Buchmann

Session 15A: Mobile Security (Chair: Lucas Hui)
15:55-16:35 (6 July) [Room 1]

A Feasible No-Root Approach on Android Short Paper
Yao Cheng, Yingjiu Li, and Robert Deng

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services Invited Paper
Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, and Yajun Tang

Session 15B: Network Security (Chair: Lucas Hui)
16:35-17:15 (6 July) [Room 1]

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection
Shigang Liu, Yu Wang, Chao Chen, and Yang Xiang

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Short Paper
Timothy Glennan, Christopher Leckie, and Sarah M. Erfani

Session 16A: Biometric Security (Chair: Wei Wu)
15:55-16:25 (6 July) [Room 2]

Biometric Access Control with High Dimensional Facial Features Short Paper
Ying Han Pang, Ean Yee Khor, and Shih Yin Ooi

Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes Short Paper
Shiran Pan, Shen Yan, and Wen-Tao Zhu

Session 16B: Mathematical Primitives (II) (Chair: Wei Wu)
16:25-17:15 (6 July) [Room 2]

Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
Takashi Yamakawa, Goichiro Hanaoka, and Noboru Kunihiro

Deterministic Encoding into Twisted Edwards Curves
Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, and Song Tian

Conference Closing
17:15–17:30 (6 July) [Room 1]

Introduction to ACISP 2017
Julian Jang-Jaccard and Paul Watters, Massey University, New Zealand

Accepted Papers

ACISP 2016 accepted paper (52 full, 8 short) + invited paper (6) list (Total submission: 176)

  • Acceptance rate for full paper: 29%
  • Acceptance rate for full+short paper: 34%

National Security Infrastructure

A Comparison Study of Wireless Network Security in several Australasian Cities & Suburbs
Alastair Nisbet (Auckland University of Technology , New Zealand)
Andrew Woodward (Edith Cowan University, Australia)
On the Guessability of Resident Registration Numbers in South Korea
Youngbae Song (Sungkyunkwan University, South Korea)
Hyoungshick Kim (Sungkyunkwan University, South Korea)
Junho Huh (Honeywell ACS Labs, US)
Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats Short Paper
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Lucjan Hanzlik (Wroclaw University of Technology, Poland)
Kamil Kluczniak (Wroclaw University of Technology, Poland)

Smart City Security

Putting the User in Control of the Intelligent Transportation System
Catalin Gosman (University Politehnica of Bucharest, Romania)
Tudor Cornea (University Politehnica of Bucharest, Romania)
Ciprian Dobre (University Politehnica of Bucharest, Romania)
Florin Pop (University Politehnica of Bucharest, Romania)
Aniello Castiglione (University of Salerno, Italy)
A survey on the cyber attacks against non-linear state estimation in smart grids Invited Paper
Jingxuan Wang (University of Hong Kong, Hong Kong)
Lucas C. K. Hui (University of Hong Kong, Hong Kong)
S. M. Yiu (University of Hong Kong, Hong Kong)
Xingmin Cui (University of Hong Kong, Hong Kong)
Eric Ke Wang (Harbin Institute of Technology, Shenzhen Graduate School, China)
Junbin Fang (Jinan University, China)

Social Network Privacy

Towards Privacy Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy
Shen Yan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Shiran Pan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Yuhang Zhao (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China)
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing Invited Paper
Shuang Zhao (Chinese Academy of Sciences, China)
Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong)
Bo Bai (Chinese Academy of Sciences, China)
Xiaobo Ma (Xi'an Jiaotong University, China)
Wei Zou (Chinese Academy of Sciences, China)
Xinliang Qiu (Chinese Academy of Sciences, China)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)

Bitcoin Security

Fair Client Puzzles from the Bitcoin Blockchain
Christopher Carr (Norwegian University of Science and Technology, Norway)
Colin Boyd (Norwegian University of Science and Technology, Norway)
Towards Bitcoin Payment Networks Invited Paper
Patrick McCorry (Newcastle University, UK)
Malte Möser (University of Münster, Germany)
Siamak Shahandashti (Newcastle University, UK)
Feng Hao (Newcastle University, UK)

Mobile Security

A Feasible No-Root Approach on Android Short Paper
Yao Cheng (Singapore Management University, Singapore)
Yingjiu Li (Singapore Management University, Singapore)
Robert Deng (Singapore Management University, Singapore)
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services Invited Paper
Wei Chen (Nanjing University of Posts and Telecommunications, China)
Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong)
Chengyu Yin (Nanjing University of Posts and Telecommunications, China)
Bin Xiao (The Hong Kong Polytechnic University, Hong Kong)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Yajun Tang (Shantou University, China)

Network Security

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection
Shigang Liu (Deakin University, Australia)
Yu Wang (Deakin University, Australia)
Chao Chen (Deakin University, Australia)
Yang Xiang (Deakin University, Australia)
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Short Paper
Timothy Glennan (University of Melbourne, Australia)
Christopher Leckie (University of Melbourne, Australia)
Sarah M. Erfani (University of Melbourne, Australia)

Statistical Privacy

Privacy-preserving k-Nearest Neighbour Query on Outsourced Database
Rui Xu (Kyushu University, Japan)
Kirill Morozov (Kyushu University, Japan)
Yanjiang Yang (Huawei, Singapore)
Jianying Zhou (Institute for Infocomm Research, Singapore)
Tsuyoshi Takagi (Kyushu University, Japan)
Reversible Data Hiding for Encrypted Images Based on Statistical Learning
Zhen Li (Institute for Infocomm Research, Singapore)
Wei Wu (Fujian Normal University, China)
Statistical disclosure control for data privacy using sequence of generalised linear models Invited Paper
Min Cherng Lee (Universiti Tunku Abdul Rahman, Malaysia)
Robin Mitra (University of Southampton, UK)
Emmanuel Lazaridis (University College London, UK)
An Chow Lai (Universiti Tunku Abdul Rahman, Malaysia)
Yong Kheng Goh (Universiti Tunku Abdul Rahman, Malaysia)
Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia)

Biometric Security

Biometric Access Control with High Dimensional Facial Features Short Paper
Ying Han Pang (Multimedia University, Malaysia)
Ean Yee Khor (Multimedia University, Malaysia)
Shih Yin Ooi (Multimedia University, Malaysia)
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes Short Paper
Shiran Pan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Shen Yan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China)

Digital Forensics

Interest Profiling for Security Monitoring and Forensic Investigation Short Paper
Min Yang (University of Hong Kong, Hong Kong)
Fei Xu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Kam-pui Chow (University of Hong Kong, Hong Kong)
Exploring the Space of Digital Evidence
Carsten Rudolph (Monash University, Australia)

Lightweight Security

Towards Lightweight Anonymous Entity Authentication for IoT Applications
Yanjiang Yang (Huawei, Singapore)
Haibin Cai (East China Normal University, China)
Zhuo Wei (Huawei, Singapore)
Haibing Lu (Santa Clara University, US)
Kim-Kwang Raymond Choo (University of South Australia, Australia)
Hybrid MQ Signature for Embedded Device
Shaohua Tang (South China University of Technology, China)
Bo Lv (South China University of Technology, China)
Wuqiang Shen (South China University of Technology, China)
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes Invited Paper
Zhe Liu (University of Waterloo, Canada)
Johann Großschädl (University of Luxembourg, Luxembourg)
Lin Li (Shandong University, China)
Qiuliang Xu (Shandong University, China)

Cloud Storage Security

Towards Efficient Fully Randomized Message-Locked Encryption
Tao Jiang (Xidian University, China)
Xiaofeng Chen (Xidian University, China)
Qianhong Wu (Beihang University, China)
Willy Susilo (University of Wollongong, Australia)
Jianfeng Ma (Xidian University, China)
Wenjing Lou (Virginia Polytechnic Institute and State University, US)
Secure and Traceable Framework for Data Circulation
Kaitai Liang (Aalto University, Finland)
Atsuko Miyaji (Osaka University, Japan)
Chunhua Su (Osaka University, Japan)
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy
Yong Yu (University of Electronic Science and Technology of China, China)
Yannan Li (University of Electronic Science and Technology of China, China)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Willy Susilo (University of Wollongong, Australia)
Raymond Choo (University of South Australia, Australia)
Xinpeng Zhang (University of Electronic Science and Technology of China, China)

Password / QR Code Security

Password Requirements Markup Language
Moritz Horsch (Technische Universität Darmstadt, Germany)
Mario Schlipf (Technische Universität Darmstadt, Germany)
Johannes Braun (Technische Universität Darmstadt, Germany)
Johannes Buchmann (Technische Universität Darmstadt, Germany)
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
Yang-Wai Chow (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
James Phillips (Auckland University of Technology, New Zealand)
Ilung Pranata (University of Newcastle, Australia)
Ari Moesriami Barmawi (Telkom Institute of Technology, Indonesia)

Functional Encryption and Attribute-based Cryptosystem

Leakage-Resilient Functional Encryption via Pair Encodings
Zuoxia Yu (Hong Kong Polytechnic University, Hong Kong)
Man Ho Au (Hong Kong Polytechnic University, Hong Kong)
Qiuliang Xu (Shandong University, China)
Rupeng Yang (Shandong University, China)
Jinguang Han (Nanjing University of Finance and Economics, China)
Secret Handshakes with Dynamic Expressive Matching Policy
Lin Hou (Jinan University, China)
Junzuo Lai (Jinan University, China)
Lixian Liu (Jinan University, China)
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
Yinhao Jiang (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Fuchun Guo (University of Wollongong, Australia)
Chosen Ciphertext Secure Attribute-Based Encryption With Outsourced Decryption
Cong Zuo (Zhejiang Gongshang University, China)
Jun Shao (Zhejiang Gongshang University, China)
Guiyi Wei (Zhejiang Gongshang University, China)
Mande Xie (Zhejiang Gongshang University, China)
Min Ji (Zhejiang Gongshang University, China)
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
Yinghui Zhang (Xi'an University of Posts and Telecommunications, China)
Jin Li (Guangzhou University, China)
Dong Zheng (Xi'an University of Posts and Telecommunications, China)
Xiaofeng Chen (Xidian University, China)
Hui Li (Xidian University, China)
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
Peng Zhang (Shenzhen University, China)
Zehong Chen (Shenzhen University, China)
Kaitai Liang (Aalto University, Finland)
Shulan Wang (Shenzhen University, China)
Ting Wang (Shenzhen University, China)

Public Key and Identity-based Encryption

Content-based Encryption
Xiaofen Wang (University of Electronic Science and Technology of China, China)
Yi Mu (University of Wollongong, Australia)
Proxy Re-Encryption with Delegatable Verifiability
Xiaodong Lin (University of Ontario Institute of Technology, Canada)
Rongxing Lu (Nanyang Technological University, Singapore)
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry
Zhe Xia (Wuhan University of Technology, China)
Xiaoyun Yang (Wuhan University of Technology, China)
Min Xiao (Wuhan University of Technology, China)
Debiao He (Wuhan University, China)
Identity-Based Group Encryption
Xiling Luo (Beihang University, China)
Yili Ren (Beihang University, China)
Jingwen Liu (Potevio Information Technology Co.,Ltd, China)
Jiankun Hu (University of New South Wales, Australia)
Weiran Liu (Beihang University, China)
Zhen Wang (Beihang University, China)
Wei Xu (Potevio Information Technology Co.,Ltd, China)
Qianhong Wu (Beihang University, China)
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
Shi-Feng Sun (Shanghai Jiao Tong University, China)
Udaya Parampalli (The University of Melbourne, Australia)
Tsz Hon Yuen (Huawei, Singapore)
Yu Yu (Shanghai Jiao Tong University, China)
Dawu Gu (Shanghai Jiao Tong University, China)
Edit Distance Based Encryption and Its Application
Tran Viet Xuan Phuong (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Kaitai Liang (Aalto University, Finland)
Reducing the Key Size of the SRP Encryption Scheme Short Paper
Duong Hoang Dung (Kyushu University, Japan)
Albrecht Petzoldt (Kyushu University, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)

Searchable Encryption

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
Tong Li (Nankai University, China)
Zheli Liu (Nankai University, China)
Ping Li (Sun Yat-sen University, China)
Chunfu Jia (Nankai University, China)
Zoe L. Jiang (Harbin Institute of Technology Shenzhen Graduate School, China)
Jin Li (Guangzhou University, China)
Public Key Encryption with Authorized Keyword Search
Peng Jiang (Beijing University of Posts and Telecommunications, China)
Yi Mu (University of Wollongong, Australia)
Fuchun Guo (University of Wollongong, Australia)
Qiaoyan Wen (Beijing University of Posts and Telecommunications, China)
Linear Encryption with Keyword Search
Shiwei Zhang (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)

Broadcast Encryption

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Kai He (Jinan University, China)
Jian Weng (Jinan University, China)
Man Ho Au (Hong Kong Polytechnic University, Hong Kong)
Yijun Mao (South China University of Agriculture, China)
Robert H. Deng (Singapore Management University, Singapore)
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
Jianchang Lai (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Fuchun Guo (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Rongmao Chen (University of Wollongong, Australia)

Signature and Key Management

One-Round Strong Oblivious Signature-Based Envelope
Rongmao Chen (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Fuchun Guo (University of Wollongong, Australia)
Mingwu Zhang (Hubei University of Technology, China)
Proxy Signature with Revocation
Shengmin Xu (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Sha Ma (University of Wollongong, Australia)
On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
Arcangelo Castiglione (University of Salerno, Italy)
Alfredo De Santis (University of Salerno, Italy)
Barbara Masucci (University of Salerno, Italy)
Francesco Palmieri (University of Salerno, Italy)
Aniello Castiglione (University of Salerno, Italy)

Secure Batch Processing

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations
Yujuan Sun (East China Normal University, China)
Yu Yu (Shanghai Jiao Tong University, China)
Xiangxue Li (East China Normal University, China)
Kai Zhang (East China Normal University, China)
Haifeng Qian (East China Normal University, China)
Yuan Zhou (CNCERT, China)
Accelerating Oblivious Transfer with Batch Multi-Exponentiation
Yang Sun (Beihang University, China)
Qianhong Wu (Beihang University, China)
Jingwen Liu (Potevio Information Technology Co.,Ltd, China)
Jianwei Liu (Beihang University, China)
Xinyi Huang (Fujian Normal University, China)
Bo Qin (Renmin Uninversity of China)
Wei Hu (Potevio Information Technology Co.,Ltd, China)

Pseudo Random / One-way Function

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
Xun Yi (RMIT, Australia)
Xuechao Yang (RMIT, Australia)
Yong Feng (RMIT, Australia)
Fengling Han (RMIT, Australia)
Ron van Schyndel (RMIT, Australia)
One-Key Compression Function Based MAC with BBB Security
Avijit Dutta (Indian Statistical Institute, India)
Mridul Nandi (Indian Statistical Institute, India)
Goutam Paul (Indian Statistical Institute, India)
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems Short Paper
Jhordany Rodriguez Parra (University of South Australia, Australia)
Terence Chan (University of South Australia, Australia)
Siu Wai Ho (University of South Australia, Australia)

Mathematical Primitives

Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
Atsushi Takayasu (The University of Tokyo, Japan)
Noboru Kunihiro (The University of Tokyo, Japan)
A new attack on three variants of the RSA cryptosystem
Martin Bunder (University of Wollongong, Australia)
Abderrahmane Nitaj (Universite de Caen, France)
Willy Susilo (University of Wollongong, Australia)
Joseph Tonien (University of Wollongong, Australia)
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
Takashi Yamakawa (The University of Tokyo, Japan)
Goichiro Hanaoka (AIST, Japan)
Noboru Kunihiro (The University of Tokyo, Japan)
Deterministic Encoding into Twisted Edwards Curves
Wei Yu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Kunpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Bao Li (Institute of Information Engineering, Chinese Academy of Sciences, China)
Xiaoyang He (Institute of Information Engineering, Chinese Academy of Sciences, China)
Song Tian (Institute of Information Engineering, Chinese Academy of Sciences, China)

Symmetric Cipher

Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
Nasour Bagheri (SRTTU and IPM, Iran)
Florian Mendel (Graz University of Technology, Austria)
Yu Sasaki (NTT Secure Platform Laboratories, Japan)
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler (HS Schmalkalden, Germany)
Eik List (Bauhaus-Universität Weimar, Germany)
Stefan Lucks (Bauhaus-Universität Weimar, Germany)
Jakob Wenzel (Bauhaus-Universität Weimar, Germany)
Improved (Related-Key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Jiageng Chen (Central China Normal University, China)
Je Sen Teh (Universiti Sains Malaysia, Malaysia)
Chunhua Su (Osaka University, Japan)
Azman Samsudin (Universiti Sains Malaysia, Malaysia)
Junbin Fang (Jinan University, China)
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu (NEC Corporation, Japan)
Impossible Differential Cryptanalysis of 14-Round Camellia-192
Keting Jia (Tsinghua University, China)
Ning Wang (Shandong University, China)
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song (Institute of Information Engineering, Chinese Academy of Sciences, China)
Zhangjie Huang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Qianqian Yang (Institute of Information Engineering, Chinese Academy of Sciences, China)
On the Security of the LAC Authenticated Encryption Algorithm
Jiqiang Lu (Institute for Infocomm Research, Singapore)
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin (Tsinghua University, China)
Huaifeng Chen (Shandong University, China)
Xiaoyun Wang (Tsinghua University, China)
Deakin Univesity
NSCLab
Springer
Monash University