ACISP 2020

30 Nov - 02 Dec 2020

Accepted Papers List

Total number of submissions: 151. Acceptance Rate: 19.9% (full paper), 23.8% (overall)

Best Paper: Lattice Blind Signature with Forward Secrecy (Huy Quoc Le, Dung Hoang Duong, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Thomas Plantard, Willy Susilo and Josef Pieprzyk)
Best Student Paper: DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-based Trust in IoT Networks (Zuchao Ma, Liang Liu and Weizhi Meng)

Post-Quantum Cryptography

Lattice Blind Signature with Forward Secrecy Best Paper
Huy Quoc Le (University of Wollongong, Australia)
Dung Hoang Duong (University of Wollongong, Australia)
Ha Thanh Nguyen Tran (Concordia University of Edmonton, Canada)
Viet Cuong Trinh (Hong Duc University, Canada)
Thomas Plantard (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Josef Pieprzyk (Data61, Australia)
Optimized Arithmetic Operations for Isogeny-based Cryptography on Huff Curves
Yan Huang (Sun Yat-sen University, Guangzhou, China)
Fangguo Zhang (Sun Yat-sen University, Guangzhou, China)
Zhi Hu (Sun Yat-sen University, Guangzhou, China)
Zhijie Liu (Sun Yat-sen University, Guangzhou, China)
On Lattice-Based Interactive Protocols with Aborts
Nabil Alkeilani Alkadri (TU Darmstadt, Germany)
Rachid El Bansarkhani (QuantiCor Security GmbH, Germany)
Johannes Buchmann (TU Darmstadt, Germany)
SKCN: Practical and Flexible Digital Signature from Module Lattice
Boru Gong (Fudan University, China)
Leixiao Cheng (Fudan University, China)
Yunlei Zhao (Fudan University, China)
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies (University of Wuppertal, Germany)
Herman Galteland (Norwegian University of Science and Technology, Norway)
Kristian Gjøsteen (Norwegian University of Science and Technology, Norway)
Yao Jiang (Norwegian University of Science and Technology, Norway)

Symmetric Cipher

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu (National University of Defense Technology, China)
Yunwen Liu (National University of Defense Technology, China)
Tomer Ashur (TU Eindhoven, Netherlands)
Bing Sun (National University of Defense Technology, China)
Chao Li (National University of Defense Technology, China)
A New Improved AES S-Box With Enhanced Properties
Abderrahmane Nitaj (Universite de Caen Normandie, France)
Willy Susilo (University of Wollongong, Australia)
Joseph Tonien (University of Wollongong, Australia)
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers
Yuji Koike (University of Hyogo, Japan)
Kosei Sakamoto (University of Hyogo, Japan)
Takuya Hayashi (National Institute of Information and Communications Technology, Japan)
Takanori Isobe (University of Hyogo, Japan)
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh (Universiti Sains Malaysia, Malaysia)
Je Sen Teh (Universiti Sains Malaysia, Malaysia)
Jiageng Chen (Central China Normal University, China)

Signature

From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee (Indian Institute of Science, India)
R Kabaleeshwaran (Indian Institute of Science, India)
Lightweight Implementation of SM2 Elliptic Curve on Intel Processor with AVX2
Junhao Huang (Nanjing University of Aeronautics and Astronautics, China)
Zhe Liu (Nanjing University of Aeronautics and Astronautics, China)
Zhi Hu (Central South University, China)
Johann Großschädl (University of Luxembourg, Luxembourg)
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme
Masayuki Tezuka (Tokyo Institute of Technology, Japan)
Keisuke Tanaka (Tokyo Institute of Technology, Japan)

Network Security and Blockchain

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-based Trust in IoT Networks Best Student Paper
Zuchao Ma (Nanjing University of Aeronautics and Astronautics, China)
Liang Liu (Nanjing University of Aeronautics and Astronautics, China)
Weizhi Meng (Technical Universtiy of Denmark, Denmark)
A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm
Xiaolei Liu (China Academy of Engineering Physics, China)
Teng Hu (University of Science and Technology of China, China)
Kangyi Ding (University of Science and Technology of China, China)
Yang Bai University of Science and Technology of China, China)
Weina Niu (University of Electronic Science and Technology of China, China)
Jiazhong Lu (Chengdu University of Information Technology, China)
A Blockchain-based Resource Supervision Scheme for Edge Devices under Cloud-Fog-End Computing Model
Tongchen Wang (Beihang University, China)
Jianwei Liu (Beihang University, China)
Dawei Li (Beihang University, China)
Qianhong Wu (Beihang University, China)

Cryptographic Primitives

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition
Jinrong Chen (National University of Defense Technology, China)
Lin Liu (National University of Defense Technology, China)
Rongmao Chen (National University of Defense Technology, China)
Wei Peng (National University of Defense Technology, China)
Efficient Forward-Secure Threshold Public Key Encryption
Rafael Kurek (University of Wuppertal, Germany)
A New Targeted Password Guessing Model
Zhijie Xie (National University of Defense Technology, China)
Min Zhang (National University of Defense Technology, China)
Qiying Dong (Nankai University, China)
Zhenhan Li (National University of Defense Technology, China)
Multi-Input Laconic Function Evaluation
Bo Pang (Chinese Academy of Sciences, China)
Long Chen (New Jersey Institue of Technology, US)
Xiong Fan (University of Maryland, US)
Qiang Tang (New Jersey Institue of Technology, US)

Mathematical Foundation

Arbitrary-Centered Discrete Gaussian Sampling over the Integers
Yusong Du (Sun Yat-sen University, China)
Baoying Fan (Sun Yat-sen University, China)
Baodian Wei (Sun Yat-sen University, China)
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao (East China Normal University, China)
Zhenfu Cao (East China Normal University, China)
Xiaolei Dong (East China Normal University, China)
Jun Shao (Zhejiang Gongshang University, China)
Licheng Wang (Beijing University of Posts and Telecommunications, China)
Zhusen Liu (East China Normal University, China)
Revisiting the Hardness of Binary Error LWE
Chao Sun (Kyoto University, Japan)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Masayuki Abe (NTT Secure Platform Laboratories, Japan)

Machine Learning Security

PALOR: Poisoning Attacks against LOgistic Regression
Jialin Wen (East China Normal University, China)
Benjamin Zi Hao Zhao (University of New South Wales and Data61, Australia)
Minhui Xue (The University of Adelaide, Australia)
Haifeng Qian (East China Normal University, China)
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Bedeuro Kim (Sungkyunkwan University, Korea)
Abuadbba Sharif (Data61, Australia)
Hyoungshick Kim (Sungkyunkwan University, Korea)

Attack

Rolling Attack: An Efficient Way to Reduce Armors of OA Devices
Linyu Li (Chinese Academy of Sciences, China)
Lei Yu (Chinese Academy of Sciences, China)
Can Yang (Chinese Academy of Sciences, China)
Jiawei Yin (Chinese Academy of Sciences, China)
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada (University of Tokyo, Japan)
Yuntao Wang (University of Tokyo, Japan)
Tsuyoshi Takagi (University of Tokyo, Japan)
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
Anubhab Baksi (Nanyang Technological University, Singapore)
Vinay B. Y. Kumar (Nanyang Technological University, Singapore)
Banashri Karmakar (Indian Institute of Technology Bhilai, India)
Shivam Bhasin (Temasek Labs@NTU, Singapore)
Dhiman Saha (Indian Institute of Technology Bhilai, India)
Anupam Chattopadhyay (Nanyang Technological University, Singapore)
Design and Evaluation of Enumeration Attacks on Package Tracking Systems
Hanbin Jang (Sungkyunkwan University, Korea)
Woojoong Ji (Sungkyunkwan University, Korea)
Simon S. Woo (Sungkyunkwan University, Korea)
Hyoungshick Kim (Sungkyunkwan University, Korea)

Privacy

JTaint: Finding Privacy-Leakage in Chrome Extensions
Mengfei Xie (Wuhan University, China)
Jianming Fu (Wuhan University, China)
Jia He (Wuhan University, China)
Chenke Luo (Wuhan University, China)
Guojun Peng (Wuhan University. China)
Unlinkable Updatable Databases and Oblivious Transfer with Access Control
Aditya Damodaran (University of Luxembourg, Luxembourg)
Alfredo Rial (University of Luxembourg, Luxembourg)

Short Papers

Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin (Osaka University, Japan)
Atsuko Miyaji (Osaka University, Japan)
User Identity Linkage across Social Networks via Community Preserving Network Embedding
Xiaoyu Guo (PLA Information Engineering University, China)
Yan Liu (PLA Information Engineering University, China)
Xuzhong Wang (PLA Information Engineering University, China)
Jing Chen (PLA Information Engineering University, China)
Improvement of Fuzzy Identity-Based Encryption and Attribute-Based Encryption using Blakley Secret Sharin
Zhe Xia (Wuhan University of Technology, China)
Bo Yang (Shaanxi Normal University, China)
Yanwei Zhou (Shaanxi Normal University, China)
Mingwu Zhang (Hubei University of Technology, China)
Yi Mu (Fujian Normal University, China)
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method
Kento Oonishi (University of Tokyo, Japan)
Noboru Kunihiro (University of Tsukuba, Japan)
Security Analysis on Tangle-based Blockchain through Simulation
Bozhi Wang (University of New South Wales and Data61, Australia)
Qin Wang (Swinburne University of Technology and Data61, Australia)
Shiping Chen (Data61, Australia)
Yang Xiang (Swinburne University of Technology, Australia)
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications
Xiangyu Liu (Shanghai Jiao Tong University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Dawu Gu (Shan ghai Jiao Tong University, China)
Monash University
NSCLab
Springer