Technical Program
Full Paper: 25 min Invited Paper: 25 min Short Paper: 15 min
21st Australasian Conference on Information Security and Privacy
Melbourne, Australia
| 4-6 July 2016
4 July | 5 July | 6 July | |||
---|---|---|---|---|---|
Room 1 | Room 2 | Room 1 | Room 2 | Room 1 | Room 2 |
Registration | |||||
Opening | Sess. 5 | Sess. 6 | Sess. 11 | Sess. 12 | |
Keynote 1 | Invited Talk 3 | ||||
Coffee Break | |||||
Jennifer Seberry Invited Lecture | Keynote 2 | Invited Talk 6 | |||
Invited Talk 2 | Invited Talk 4 | Invited Talk 7 | |||
Lunch | |||||
Sess. 1 | Sess. 2 | Invited Talk 5 | Invited Talk 8 | ||
Sess. 7 | Sess. 8 | Sess. 13 | Sess. 14 | ||
Coffee Break | |||||
Sess. 3 | Sess. 4 | Sess. 9 | Sess. 10 | Sess. 15 | Sess. 16 |
StC Meeting | Closing | ||||
Reception | Banquet |
Time | Room 1 | Room 2 |
---|---|---|
08:30-09:00 | Registration | |
09:00-09:30 | Opening | |
09:30-10:30 | Keynote 1 | |
10:30-10:50 | Coffee Break | |
10:50-11:30 | Jennifer Seberry Invited Lecture | |
11:30-12:10 | Invited Talk 2 | |
12:10-13:10 | Lunch | |
13:10-15:15 | Session 1 | Session 2 |
15:15-15:35 | Coffee Break | |
15:35-17:05 | Session 3 | Session 4 |
17:05-18:00 | Steering Committee Meeting | |
18:00-19:00 | Welcome Reception |
Time | Room 1 | Room 2 | ||||
---|---|---|---|---|---|---|
08:30-09:45 | Session 5 | Session 6 | ||||
09:45-10:25 | Invited Talk 3 | |||||
10:25-10:45 | Coffee Break | |||||
10:45-11:45 | Keynote 2 | |||||
11:45-12:25 | Invited Talk 4 | |||||
12:25-13:20 | Lunch | |||||
13:20-14:00 | Invited Talk 5 | |||||
14:00-15:15 | Session 7 | Session 8 | ||||
15:15-5:35 | Coffee Break | |||||
15:35-17:30 | Session 9 | Session 10 | ||||
18:30 | Conference Banquet |
Time | Room 1 | Room 2 | ||||
---|---|---|---|---|---|---|
08:30-10:35 | Session 11 | Session 12 | ||||
10:35-10:55 | Coffee Break | |||||
10:55-11:35 | Invited Talk 6 | |||||
11:35-12:15 | Invited Talk 7 | |||||
12:15-13:15 | Lunch | |||||
13:15-13:55 | Invited Talk 8 | |||||
13:55-15:35 | Session 13 | Session 14 | ||||
15:35-15:55 | Coffee Break | |||||
15:55-17:15 | Session 15 | Session 16 | ||||
17:15-17:30 | Closing |
Full Paper: 25 min Invited Paper: 25 min Short Paper: 15 min
Conference Opening
09:00-09:30 (4 July) [Room 1]
Opening Address
Professor Peter Hodgson, Deputy Vice-Chancellor Research, Deakin University, Australia
Program Overview
Dr Ron Steinfeld and Dr Joseph Liu, Monash University, Australia
ACISP: History and Future
Professor Jennifer Seberry, University of Wollongong, Australia
Keynote Address 1 (Chair: Yang Xiang)
09:30-10:30 (4 July) [Room 1]
Security and Privacy in the IoT Learn More
Professor Elisa Bertino, Purdue University, United States
Jennifer Seberry Invited Lecture (Chair: Jennifer Seberry)
10:50-11:30 (4 July) [Room 1]
Integrated Access Control for Smart Buildings using Building Information Models Learn More
Professor Ed Dawson, Queensland University of Technology, Australia
Invited Talk 2 (Chair: Josef Pieprzyk)
11:30-12:10 (4 July) [Room 1]
A Survey on Anonymous Credentials Learn More
Professor Xun Yi, RMIT University, Australia
Session 1A: Bitcoin Security (Chair: Aniello Castiglione)
13:10-14:00 (4 July) [Room 1]
Fair Client Puzzles from the Bitcoin Blockchain
Christopher Carr and Colin Boyd
Towards Bitcoin Payment Networks Invited Paper
Patrick McCorry, Malte Möser, Siamak Shahandashti and Feng Hao
Session 1B: Cloud Storage Security (Chair: Aniello Castiglione)
14:00-15:15 (4 July) [Room 1]
Towards Efficient Fully Randomized Message-Locked Encryption
Tao Jiang, Xiaofeng Chen, Qianhong Wu, Willy Susilo, Jianfeng Ma, and Wenjing Lou
Secure and Traceable Framework for Data Circulation
Kaitai Liang, Atsuko Miyaji, and Chunhua Su
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy
Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Raymond Choo, and Xinpeng Zhang
Session 2A: Functional Encryption and Attribute-based Cryptosystem (I) (Chair: Fuchun Guo)
13:10-14:25 (4 July) [Room 2]
Chosen Ciphertext Secure Attribute-Based Encryption With Outsourced Decryption
Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, and Min Ji
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
Yinghui Zhang, Jin Li, Dong Zheng , Xiaofeng Chen, and Hui Li
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, and Ting Wang
Session 2B: Secure Batch Processing (Chair: Fuchun Guo)
14:25-15:15 (4 July) [Room 2]
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations
Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, and Yuan Zhou
Accelerating Oblivious Transfer with Batch Multi-Exponentiation
Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, and Wei Hu
Session 3A: Digital Forensics (Chair: Raymond Choo)
15:35-16:15 (4 July) [Room 1]
Interest Profiling for Security Monitoring and Forensic Investigation Short Paper
Min Yang, Fei Xu, and Kam-pui Chow
Exploring the Space of Digital Evidence
Carsten Rudolph
Session 3B: Social Network Privacy (Chair: Raymond Choo)
16:15-17:05 (4 July) [Room 1]
Towards Privacy Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy
Shen Yan, Shiran Pan, Yuhang Zhao, and Wen-Tao Zhu
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing Invited Paper
Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, and Man Ho Au
Session 4: Public Key and Identity-based Encryption (I) (Chair: Willy Susilo)
15:35-17:05 (4 July) [Room 2]
Content-based Encryption
Xiaofen Wang and Yi Mu
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry
Zhe Xia, Xiaoyun Yang, Min Xiao, and Debiao He
Identity-Based Group Encryption
Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, and Qianhong Wu
Reducing the Key Size of the SRP Encryption Scheme Short Paper
Duong Hoang Dung, Albrecht Petzoldt, and Tsuyoshi Takagi
Session 5: Signature and Key Management (Chair: Yong Yu)
08:30-09:45 (5 July) [Room 1]
One-Round Strong Oblivious Signature-Based Envelope
Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, and Mingwu Zhang
Proxy Signature with Revocation
Shengmin Xu, Guomin Yang, Yi Mu and Sha Ma
On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Aniello Castiglione
Session 6: Symmetric Cipher (I) (Chair: Kazuhiko Minematsu)
08:30-09:45 (5 July) [Room 2]
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song, Zhangjie Huang, and Qianqian Yang
On the Security of the LAC Authenticated Encryption Algorithm
Jiqiang Lu
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin, Huaifeng Chen, and Xiaoyun Wang
Invited Talk 3 (Chair: Ron Steinfeld)
09:45-10:25 (5 July) [Room 1]
Secure Outsourcing and Crowdsourcing of Computations Learn More
Professor Willy Susilo, University of Wollongong, Australia
Keynote Address 2 (Chair: Joseph Liu)
10:45-11:45 (5 July) [Room 1]
Triple DES Revisited Learn More
Professor Chris Mitchell, Royal Holloway, University of London, United Kingdom
Invited Talk 4 (Chair: Joseph Liu)
11:45-12:25 (5 July) [Room 1]
Cloning 3G/4G SIM Cards with Side-channel Analysis: Lessons Learned in Physical Security Learn More
Professor Yu Yu, Shanghai Jiao Tong University, China
Invited Talk 5 (Chair: Xinyi Huang)
13:20-14:00 (5 July) [Room 1]
Security and Privacy in Passive Mobile RFID Systems Learn More
Professor Wanlei Zhou, Deakin University, Australia
Session 7: Functional Encryption and Attribute-based Cryptosystem (II) (Chair: S. M. Yiu)
14:00-15:15 (5 July) [Room 1]
Leakage-Resilient Functional Encryption via Pair Encodings
Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, and Jinguang Han
Secret Handshakes with Dynamic Expressive Matching Policy
Lin Hou, Junzuo Lai and Lixian Liu
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo
Session 8: Statistical Privacy (Chair: Chunhua Su)
14:00-15:15 (5 July) [Room 2]
Privacy-preserving k-Nearest Neighbour Query on Outsourced Database
Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, and Tsuyoshi Takagi
Reversible Data Hiding for Encrypted Images Based on Statistical Learning
Zhen Li and Wei Wu
Statistical disclosure control for data privacy using sequence of generalised linear models Invited Paper
Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, and Wun-She Yap
Session 9A: National Security Infrastructure (Chair: Ed Dawson)
15:35-16:40 (5 July) [Room 1]
A Comparison Study of Wireless Network Security in several Australasian Cities & Suburbs
Alastair Nisbet and Andrew Woodward
On the Guessability of Resident Registration Numbers in South Korea
Youngbae Song, Hyoungshick Kim, and Junho Huh
Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats Short Paper
Miroslaw Kutylowski, Lucjan Hanzlik, and Kamil Kluczniak
Session 9B: Smart City Security (Chair: Ed Dawson)
16:40-17:30 (5 July) [Room 1]
Putting the User in Control of the Intelligent Transportation System
Catalin Gosman, Tudor Cornea, Ciprian Dobre, Florin Pop, and Aniello Castiglione
A survey on the cyber attacks against non-linear state estimation in smart grids Invited Paper
Jingxuan Wang, Lucas C. K. Hui, S. M. Yiu, Xingmin Cui, Eric Ke Wang, and Junbin Fang
Session 10A: Pseudo Random / One-way Function (Chair: Chris Mitchell)
15:35-16:40 (5 July) [Room 2]
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
Xun Yi, Xuechao Yang, Yong Feng, Fengling Han, and Ron van Schyndel
One-Key Compression Function Based MAC with BBB Security
Avijit Dutta, Mridul Nandi, and Goutam Paul
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems Short Paper
Jhordany Rodriguez Parra, Terence Chan, and Siu Wai Ho
Session 10B: Mathematical Primitives (I) (Chair: Chris Mitchell)
16:40-17:30 (5 July) [Room 2]
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
Atsushi Takayasu and Noboru Kunihiro
A new attack on three variants of the RSA cryptosystem
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, and Joseph Tonien
Session 11A: Searchable Encryption (Chair: Kaitai Liang)
08:30-09:45 (6 July) [Room 1]
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe L. Jiang and Jin Li
Public Key Encryption with Authorized Keyword Search
Peng Jiang, Yi Mu, Fuchun Guo, and Qiaoyan Wen
Linear Encryption with Keyword Search
Shiwei Zhang, Guomin Yang, and Yi Mu
Session 11B: Broadcast Encryption (Chair: Kaitai Liang)
09:45-10:35 (6 July) [Room 1]
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Kai He, Jian Weng, Man Ho Au, Yijun Mao, and Robert H. Deng
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, and Rongmao Chen
Session 12: Symmetric Cipher (II) (Chair: Jiqiang Lu)
08:30-10:35 (6 July) [Room 2]
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
Nasour Bagheri, Florian Mendel, and Yu Sasaki
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler, Eik List, Stefan Lucks, and Jakob Wenzel
Improved (Related-Key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Jiageng Chen, Je Sen Teh, Chunhua Su, Azman Samsudin, and Junbin Fang
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu
Impossible Differential Cryptanalysis of 14-Round Camellia-192
Keting Jia and Ning Wang
Invited Talk 6 (Chair: Yi Mu)
10:55-11:35 (6 July) [Room 1]
Charging Me and I Know Your Secrets: Attack and Defence Learn More
Dr Weizhi Meng, Institute for Infocomm Research, Singapore
Invited Talk 7 (Chair: Yi Mu)
11:35-12:15 (6 July) [Room 1]
CLAP: Lightweight Authentication Protocols for IoT Applications Learn More
Dr Surya Nepal, CSIRO Data61, Australia
Invited Talk 8 (Chair: Julian Jang-Jaccard)
13:15-13:55 (6 July) [Room 1]
Ransomware Outbreaks in Australia Learn More
Dr Jonathan Oliver, Trend Micro, Australia
Session 13: Lightweight / QR Code Security (Chair: Carsten Rudolph)
13:55-15:35 (6 July) [Room 1]
Towards Lightweight Anonymous Entity Authentication for IoT Applications
Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, and Kim-Kwang Raymond Choo
Hybrid MQ Signature for Embedded Device
Shaohua Tang, Bo Lv, and Wuqiang Shen
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes Invited Paper
Zhe Liu, Johann Großschädl, Lin Li, and Qiuliang Xu
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
Yang-Wai Chow, Willy Susilo, Guomin Yang, James Phillips, Ilung Pranata, and Ari Moesriami Barmawi
Session 14: Public Key (II) / Password (Chair: Man Ho Au)
13:55-15:35 (6 July) [Room 2]
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
Shi-Feng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, and Dawu Gu
Edit Distance Based Encryption and Its Application
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, and Kaitai Liang
Proxy Re-Encryption with Delegatable Verifiability
Xiaodong Lin and Rongxing Lu
Password Requirements Markup Language
Moritz Horsch, Mario Schlipf, Johannes Braun, and Johannes Buchmann
Session 15A: Mobile Security (Chair: Lucas Hui)
15:55-16:35 (6 July) [Room 1]
A Feasible No-Root Approach on Android Short Paper
Yao Cheng, Yingjiu Li, and Robert Deng
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services Invited Paper
Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, and Yajun Tang
Session 15B: Network Security (Chair: Lucas Hui)
16:35-17:15 (6 July) [Room 1]
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection
Shigang Liu, Yu Wang, Chao Chen, and Yang Xiang
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Short Paper
Timothy Glennan, Christopher Leckie, and Sarah M. Erfani
Session 16A: Biometric Security (Chair: Wei Wu)
15:55-16:25 (6 July) [Room 2]
Biometric Access Control with High Dimensional Facial Features Short Paper
Ying Han Pang, Ean Yee Khor, and Shih Yin Ooi
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes Short Paper
Shiran Pan, Shen Yan, and Wen-Tao Zhu
Session 16B: Mathematical Primitives (II) (Chair: Wei Wu)
16:25-17:15 (6 July) [Room 2]
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
Takashi Yamakawa, Goichiro Hanaoka, and Noboru Kunihiro
Deterministic Encoding into Twisted Edwards Curves
Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, and Song Tian
Conference Closing
17:15–17:30 (6 July) [Room 1]
Introduction to ACISP 2017
Julian Jang-Jaccard and Paul Watters, Massey University, New Zealand
ACISP 2016 accepted paper (52 full, 8 short) + invited paper (6) list (Total submission: 176)
A Comparison Study of Wireless Network Security in several Australasian Cities & Suburbs Alastair Nisbet (Auckland University of Technology , New Zealand) Andrew Woodward (Edith Cowan University, Australia) |
On the Guessability of Resident Registration Numbers in South Korea Youngbae Song (Sungkyunkwan University, South Korea) Hyoungshick Kim (Sungkyunkwan University, South Korea) Junho Huh (Honeywell ACS Labs, US) |
Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats Short Paper Miroslaw Kutylowski (Wroclaw University of Technology, Poland) Lucjan Hanzlik (Wroclaw University of Technology, Poland) Kamil Kluczniak (Wroclaw University of Technology, Poland) |
Putting the User in Control of the Intelligent Transportation System Catalin Gosman (University Politehnica of Bucharest, Romania) Tudor Cornea (University Politehnica of Bucharest, Romania) Ciprian Dobre (University Politehnica of Bucharest, Romania) Florin Pop (University Politehnica of Bucharest, Romania) Aniello Castiglione (University of Salerno, Italy) |
A survey on the cyber attacks against non-linear state estimation in smart grids Invited Paper Jingxuan Wang (University of Hong Kong, Hong Kong) Lucas C. K. Hui (University of Hong Kong, Hong Kong) S. M. Yiu (University of Hong Kong, Hong Kong) Xingmin Cui (University of Hong Kong, Hong Kong) Eric Ke Wang (Harbin Institute of Technology, Shenzhen Graduate School, China) Junbin Fang (Jinan University, China) |
Towards Privacy Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy Shen Yan (Institute of Information Engineering, Chinese Academy of Sciences, China) Shiran Pan (Institute of Information Engineering, Chinese Academy of Sciences, China) Yuhang Zhao (Institute of Information Engineering, Chinese Academy of Sciences, China) Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China) |
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing Invited Paper Shuang Zhao (Chinese Academy of Sciences, China) Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong) Bo Bai (Chinese Academy of Sciences, China) Xiaobo Ma (Xi'an Jiaotong University, China) Wei Zou (Chinese Academy of Sciences, China) Xinliang Qiu (Chinese Academy of Sciences, China) Man Ho Au (The Hong Kong Polytechnic University, Hong Kong) |
Fair Client Puzzles from the Bitcoin Blockchain Christopher Carr (Norwegian University of Science and Technology, Norway) Colin Boyd (Norwegian University of Science and Technology, Norway) |
Towards Bitcoin Payment Networks Invited Paper Patrick McCorry (Newcastle University, UK) Malte Möser (University of Münster, Germany) Siamak Shahandashti (Newcastle University, UK) Feng Hao (Newcastle University, UK) |
A Feasible No-Root Approach on Android Short Paper Yao Cheng (Singapore Management University, Singapore) Yingjiu Li (Singapore Management University, Singapore) Robert Deng (Singapore Management University, Singapore) |
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services Invited Paper Wei Chen (Nanjing University of Posts and Telecommunications, China) Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong) Chengyu Yin (Nanjing University of Posts and Telecommunications, China) Bin Xiao (The Hong Kong Polytechnic University, Hong Kong) Man Ho Au (The Hong Kong Polytechnic University, Hong Kong) Yajun Tang (Shantou University, China) |
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection Shigang Liu (Deakin University, Australia) Yu Wang (Deakin University, Australia) Chao Chen (Deakin University, Australia) Yang Xiang (Deakin University, Australia) |
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Short Paper Timothy Glennan (University of Melbourne, Australia) Christopher Leckie (University of Melbourne, Australia) Sarah M. Erfani (University of Melbourne, Australia) |
Privacy-preserving k-Nearest Neighbour Query on Outsourced Database Rui Xu (Kyushu University, Japan) Kirill Morozov (Kyushu University, Japan) Yanjiang Yang (Huawei, Singapore) Jianying Zhou (Institute for Infocomm Research, Singapore) Tsuyoshi Takagi (Kyushu University, Japan) |
Reversible Data Hiding for Encrypted Images Based on Statistical Learning Zhen Li (Institute for Infocomm Research, Singapore) Wei Wu (Fujian Normal University, China) |
Statistical disclosure control for data privacy using sequence of generalised linear models Invited Paper Min Cherng Lee (Universiti Tunku Abdul Rahman, Malaysia) Robin Mitra (University of Southampton, UK) Emmanuel Lazaridis (University College London, UK) An Chow Lai (Universiti Tunku Abdul Rahman, Malaysia) Yong Kheng Goh (Universiti Tunku Abdul Rahman, Malaysia) Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia) |
Biometric Access Control with High Dimensional Facial Features Short Paper Ying Han Pang (Multimedia University, Malaysia) Ean Yee Khor (Multimedia University, Malaysia) Shih Yin Ooi (Multimedia University, Malaysia) |
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes Short Paper Shiran Pan (Institute of Information Engineering, Chinese Academy of Sciences, China) Shen Yan (Institute of Information Engineering, Chinese Academy of Sciences, China) Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China) |
Interest Profiling for Security Monitoring and Forensic Investigation Short Paper Min Yang (University of Hong Kong, Hong Kong) Fei Xu (Institute of Information Engineering, Chinese Academy of Sciences, China) Kam-pui Chow (University of Hong Kong, Hong Kong) |
Exploring the Space of Digital Evidence Carsten Rudolph (Monash University, Australia) |
Towards Lightweight Anonymous Entity Authentication for IoT Applications Yanjiang Yang (Huawei, Singapore) Haibin Cai (East China Normal University, China) Zhuo Wei (Huawei, Singapore) Haibing Lu (Santa Clara University, US) Kim-Kwang Raymond Choo (University of South Australia, Australia) |
Hybrid MQ Signature for Embedded Device Shaohua Tang (South China University of Technology, China) Bo Lv (South China University of Technology, China) Wuqiang Shen (South China University of Technology, China) |
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes Invited Paper Zhe Liu (University of Waterloo, Canada) Johann Großschädl (University of Luxembourg, Luxembourg) Lin Li (Shandong University, China) Qiuliang Xu (Shandong University, China) |
Towards Efficient Fully Randomized Message-Locked Encryption Tao Jiang (Xidian University, China) Xiaofeng Chen (Xidian University, China) Qianhong Wu (Beihang University, China) Willy Susilo (University of Wollongong, Australia) Jianfeng Ma (Xidian University, China) Wenjing Lou (Virginia Polytechnic Institute and State University, US) |
Secure and Traceable Framework for Data Circulation Kaitai Liang (Aalto University, Finland) Atsuko Miyaji (Osaka University, Japan) Chunhua Su (Osaka University, Japan) |
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy Yong Yu (University of Electronic Science and Technology of China, China) Yannan Li (University of Electronic Science and Technology of China, China) Man Ho Au (The Hong Kong Polytechnic University, Hong Kong) Willy Susilo (University of Wollongong, Australia) Raymond Choo (University of South Australia, Australia) Xinpeng Zhang (University of Electronic Science and Technology of China, China) |
Password Requirements Markup Language Moritz Horsch (Technische Universität Darmstadt, Germany) Mario Schlipf (Technische Universität Darmstadt, Germany) Johannes Braun (Technische Universität Darmstadt, Germany) Johannes Buchmann (Technische Universität Darmstadt, Germany) |
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing Yang-Wai Chow (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) James Phillips (Auckland University of Technology, New Zealand) Ilung Pranata (University of Newcastle, Australia) Ari Moesriami Barmawi (Telkom Institute of Technology, Indonesia) |
Leakage-Resilient Functional Encryption via Pair Encodings Zuoxia Yu (Hong Kong Polytechnic University, Hong Kong) Man Ho Au (Hong Kong Polytechnic University, Hong Kong) Qiuliang Xu (Shandong University, China) Rupeng Yang (Shandong University, China) Jinguang Han (Nanjing University of Finance and Economics, China) |
Secret Handshakes with Dynamic Expressive Matching Policy Lin Hou (Jinan University, China) Junzuo Lai (Jinan University, China) Lixian Liu (Jinan University, China) |
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance Yinhao Jiang (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) Fuchun Guo (University of Wollongong, Australia) |
Chosen Ciphertext Secure Attribute-Based Encryption With Outsourced Decryption Cong Zuo (Zhejiang Gongshang University, China) Jun Shao (Zhejiang Gongshang University, China) Guiyi Wei (Zhejiang Gongshang University, China) Mande Xie (Zhejiang Gongshang University, China) Min Ji (Zhejiang Gongshang University, China) |
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures Yinghui Zhang (Xi'an University of Posts and Telecommunications, China) Jin Li (Guangzhou University, China) Dong Zheng (Xi'an University of Posts and Telecommunications, China) Xiaofeng Chen (Xidian University, China) Hui Li (Xidian University, China) |
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update Peng Zhang (Shenzhen University, China) Zehong Chen (Shenzhen University, China) Kaitai Liang (Aalto University, Finland) Shulan Wang (Shenzhen University, China) Ting Wang (Shenzhen University, China) |
Content-based Encryption Xiaofen Wang (University of Electronic Science and Technology of China, China) Yi Mu (University of Wollongong, Australia) |
Proxy Re-Encryption with Delegatable Verifiability Xiaodong Lin (University of Ontario Institute of Technology, Canada) Rongxing Lu (Nanyang Technological University, Singapore) |
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry Zhe Xia (Wuhan University of Technology, China) Xiaoyun Yang (Wuhan University of Technology, China) Min Xiao (Wuhan University of Technology, China) Debiao He (Wuhan University, China) |
Identity-Based Group Encryption Xiling Luo (Beihang University, China) Yili Ren (Beihang University, China) Jingwen Liu (Potevio Information Technology Co.,Ltd, China) Jiankun Hu (University of New South Wales, Australia) Weiran Liu (Beihang University, China) Zhen Wang (Beihang University, China) Wei Xu (Potevio Information Technology Co.,Ltd, China) Qianhong Wu (Beihang University, China) |
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions Shi-Feng Sun (Shanghai Jiao Tong University, China) Udaya Parampalli (The University of Melbourne, Australia) Tsz Hon Yuen (Huawei, Singapore) Yu Yu (Shanghai Jiao Tong University, China) Dawu Gu (Shanghai Jiao Tong University, China) |
Edit Distance Based Encryption and Its Application Tran Viet Xuan Phuong (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Kaitai Liang (Aalto University, Finland) |
Reducing the Key Size of the SRP Encryption Scheme Short Paper Duong Hoang Dung (Kyushu University, Japan) Albrecht Petzoldt (Kyushu University, Japan) Tsuyoshi Takagi (Kyushu University, Japan) |
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage Tong Li (Nankai University, China) Zheli Liu (Nankai University, China) Ping Li (Sun Yat-sen University, China) Chunfu Jia (Nankai University, China) Zoe L. Jiang (Harbin Institute of Technology Shenzhen Graduate School, China) Jin Li (Guangzhou University, China) |
Public Key Encryption with Authorized Keyword Search Peng Jiang (Beijing University of Posts and Telecommunications, China) Yi Mu (University of Wollongong, Australia) Fuchun Guo (University of Wollongong, Australia) Qiaoyan Wen (Beijing University of Posts and Telecommunications, China) |
Linear Encryption with Keyword Search Shiwei Zhang (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) |
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security Kai He (Jinan University, China) Jian Weng (Jinan University, China) Man Ho Au (Hong Kong Polytechnic University, Hong Kong) Yijun Mao (South China University of Agriculture, China) Robert H. Deng (Singapore Management University, Singapore) |
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing Jianchang Lai (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) Fuchun Guo (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Rongmao Chen (University of Wollongong, Australia) |
One-Round Strong Oblivious Signature-Based Envelope Rongmao Chen (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) Fuchun Guo (University of Wollongong, Australia) Mingwu Zhang (Hubei University of Technology, China) |
Proxy Signature with Revocation Shengmin Xu (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) Sha Ma (University of Wollongong, Australia) |
On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures Arcangelo Castiglione (University of Salerno, Italy) Alfredo De Santis (University of Salerno, Italy) Barbara Masucci (University of Salerno, Italy) Francesco Palmieri (University of Salerno, Italy) Aniello Castiglione (University of Salerno, Italy) |
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations Yujuan Sun (East China Normal University, China) Yu Yu (Shanghai Jiao Tong University, China) Xiangxue Li (East China Normal University, China) Kai Zhang (East China Normal University, China) Haifeng Qian (East China Normal University, China) Yuan Zhou (CNCERT, China) |
Accelerating Oblivious Transfer with Batch Multi-Exponentiation Yang Sun (Beihang University, China) Qianhong Wu (Beihang University, China) Jingwen Liu (Potevio Information Technology Co.,Ltd, China) Jianwei Liu (Beihang University, China) Xinyi Huang (Fujian Normal University, China) Bo Qin (Renmin Uninversity of China) Wei Hu (Potevio Information Technology Co.,Ltd, China) |
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps Xun Yi (RMIT, Australia) Xuechao Yang (RMIT, Australia) Yong Feng (RMIT, Australia) Fengling Han (RMIT, Australia) Ron van Schyndel (RMIT, Australia) |
One-Key Compression Function Based MAC with BBB Security Avijit Dutta (Indian Statistical Institute, India) Mridul Nandi (Indian Statistical Institute, India) Goutam Paul (Indian Statistical Institute, India) |
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems Short Paper Jhordany Rodriguez Parra (University of South Australia, Australia) Terence Chan (University of South Australia, Australia) Siu Wai Ho (University of South Australia, Australia) |
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs Atsushi Takayasu (The University of Tokyo, Japan) Noboru Kunihiro (The University of Tokyo, Japan) |
A new attack on three variants of the RSA cryptosystem Martin Bunder (University of Wollongong, Australia) Abderrahmane Nitaj (Universite de Caen, France) Willy Susilo (University of Wollongong, Australia) Joseph Tonien (University of Wollongong, Australia) |
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information Takashi Yamakawa (The University of Tokyo, Japan) Goichiro Hanaoka (AIST, Japan) Noboru Kunihiro (The University of Tokyo, Japan) |
Deterministic Encoding into Twisted Edwards Curves Wei Yu (Institute of Information Engineering, Chinese Academy of Sciences, China) Kunpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China) Bao Li (Institute of Information Engineering, Chinese Academy of Sciences, China) Xiaoyang He (Institute of Information Engineering, Chinese Academy of Sciences, China) Song Tian (Institute of Information Engineering, Chinese Academy of Sciences, China) |
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ Nasour Bagheri (SRTTU and IPM, Iran) Florian Mendel (Graz University of Technology, Austria) Yu Sasaki (NTT Secure Platform Laboratories, Japan) |
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch Christian Forler (HS Schmalkalden, Germany) Eik List (Bauhaus-Universität Weimar, Germany) Stefan Lucks (Bauhaus-Universität Weimar, Germany) Jakob Wenzel (Bauhaus-Universität Weimar, Germany) |
Improved (Related-Key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework Jiageng Chen (Central China Normal University, China) Je Sen Teh (Universiti Sains Malaysia, Malaysia) Chunhua Su (Osaka University, Japan) Azman Samsudin (Universiti Sains Malaysia, Malaysia) Junbin Fang (Jinan University, China) |
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO) Kazuhiko Minematsu (NEC Corporation, Japan) |
Impossible Differential Cryptanalysis of 14-Round Camellia-192 Keting Jia (Tsinghua University, China) Ning Wang (Shandong University, China) |
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA Ling Song (Institute of Information Engineering, Chinese Academy of Sciences, China) Zhangjie Huang (Institute of Information Engineering, Chinese Academy of Sciences, China) Qianqian Yang (Institute of Information Engineering, Chinese Academy of Sciences, China) |
On the Security of the LAC Authenticated Encryption Algorithm Jiqiang Lu (Institute for Infocomm Research, Singapore) |
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques Lingyue Qin (Tsinghua University, China) Huaifeng Chen (Shandong University, China) Xiaoyun Wang (Tsinghua University, China) |