22nd Oct 2017 (1st Floor, Jiyuan Hotel) |
14:00-22:00 |
Registration |
Lobby of Jiyuan International Hotel |
23rd Oct 2017 AM (Jirui Hall, 1st Floor, Jiyuan Hotel) |
8:30-9:30 |
Opening and Group Photo Chair: Hui Li |
1. Opening Address 2. Introduction of ProvSec 2017 Submissions 3. Introduction of CSS 2017 Submissions 4. Group Photo |
Keynote Speech 1 Session Chair:Tatsuaki Okamoto |
9:30-10:30 |
Title: Computations on Encrypted Data and Privacy Speaker: David Pointcheval |
10:30-10:50 |
Tea Break |
Invited Talk 1 Session Chair:Yang Xiang |
10:50-11:40 |
Title: Location Privacy and Its Applications Speaker: Wanlei Zhou, Tianqing Zhu |
Invited Talk 2 Session Chair:Yong Yu |
11:40-12:30 |
Title: Digital Signatures with Tight Reductions Speaker: Willy Susilo |
12:30-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel) |
23rd Oct 2017 PM (Wenhua Hall, 5th Floor, Jiyuan Hotel) |
Session 1. Public Key Encryption and Signcryption Session Chair:Jian Shen |
14:00-14:25 |
Provable Secure Constructions for Broadcast Encryption with Personalized Messages Kamalesh Acharya(IIT KHARAGPUR, India)Ratna Dutta(IIT KHARAGPUR, India)
|
14:25-14:50 |
Provably Secure Homomorphic Signcryption Fatemeh Rezaeibagha(University of Wollongong ,Australia)Yi Mu(University of Wollongong ,Australia)Shiwei Zhang(University of Wollongong ,Australia)Xiaofen Wang(University of Electronic Science and Technology of China ,China)
|
14:50-15:15 |
Natural sd-RCCA secure Public-key encryptions Yuan Chen(Xidian University ,China)Qingkuan Dong(Xidian University ,China)Qiqi Lai(Shaanxi Normal University ,China)
|
15:15-15:40 |
Homomorphic Secret Sharing from Paillier Encryption Nelly Fazio(City College of New York ,United States)Rosario Gennaro(City College of New York ,United States)Tahereh Jafarikhah(City College of New York ,United States)William Skeith (City College of New York ,United States)
|
15:40-16:00 |
Tea break |
Session 2. Proxy Re-encryption and Functional Encryption Session Chair: Rosario Gennaro |
16:00-16:25 |
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing Sharmila Deva Selvi S(Indian Institute of Technology Madras, India)Arinjita Paul(Indian Institute of Technology Madras, India)Chandrasekaran Pandurangan(Institute of Technology Madras, India)
|
16:25-16:50 |
Mergeable Functional Encryption Vincenzon Iovino(University of Luxembourg, Luxembourg)Karol Zebrowski(University of Warsaw, Poland)
|
Session 3. Security Protocols Session Chair:Mingwu Zhang |
16:50-17:15 |
Private Subgraph Matching Protocol Zifeng Xu(Northeastern University, China)Fucai Zhou(Northeastern University, China)Yuxi Li(Northeastern University, China)Jian Xu(Northeastern University, China)Qiang Wang(Northeastern University, China)
|
17:15-17:40 |
A New Blockchain-based Value-Added Tax System Dimaz Ankaa Wijaya (Monash University, Australia) Joseph K. Liu (Monash University, Australia) Dony Suwarsono (Directorate General of Taxes, Indonesia) Peng Zhang (Shenzhen University, China) |
17:40-18:05 |
Verifiable Private Polynomial Evaluation Xavier Bultel(Université Clermont Auvergne, France)Manik Lal Das(DA-IICT, India)Hardik Gajera(DA-IICT, India)David Gerault(Université Clermont Auvergne, France)Matthieu Giraud(Université Clermont Auvergne, France)Pascal Lafourcade(Université Clermont Auvergne, France)
|
18:30 |
Banquet (Jirui Hall, 1st Floor, Jiyuan Hotel) |
24th Oct 2017 (Wenhua Hall, 5th Floor, Jiyuan Hotel) |
Invited Talk 3 Session Chair:Willy Susilo |
8:30-9:20 |
Title: Adversarial signal processing: a game-theoretic framework Speaker: Mauro Barni |
Invited Talk 4 Session Chair:Christian Esposito |
9:20-10:10 |
Title:(Linkable) Ring Signature and its Applications to Blockchain Speaker: Joseph Liu |
10:10-10:30Tea break Invited Talk 5 Session Chair:Dong Zheng |
10:30-11:20 |
Title: Accountable Anonymous Authentications Speaker: Man Ho Allen Au |
Session 4. Authenticated Encryption and Key Exchange Session Chair:Yannan Li |
11:20-11:45 |
INT-RUP Security of Checksum-based Authenticated Encryption Ping Zhang(University of Science and Technology of China ,China)Peng Wang(Institute of Information Engineering of Chinese Academy of Sciences ,China)Honggang Hu(University of Science and Technology of China ,China)Changsong Chen(The Third Research Institute of Ministry of Public Security ,China)Wenke Kuai(State Grid Anhui Electric Power Company ,China)
|
11:45-12:10 |
Leakage-Resilient Non-Interactive Key Exchange in the Continuous-Memory Leakage Setting Suvradip Chakraborty(Indian Institute of Technology Madras ,India)Janaka Alawatugoda(University of Peradeniya ,Sri Lanka)C Pandu Rangan(Institute of Technology Madras ,India)
|
12:10-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel) |
Session 5. Secure Cloud Computing Session Chair: Jiguo Li |
14:00-14:25 |
Provably Secure Self-Extractable Encryption Zhi Liang(Beihang University, China)Qianhong Wu(Beihang University, China)Weiran Liu(Beihang University, China)Jianwei Liu(Beihang University, China)Fu Xiao(Nanjing University of Posts and Telecommunications, China)
|
14:25-14:50 |
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption Yunling Wang(Xidian University ,China)Jianfeng Wang(Xidian University ,China)Shifeng Sun(Monash University ,Australia)Joseph K. Liu(Monash University ,Australia)Willy Susilo(University of Wollongong ,Australia)Xiaofeng Chen(Xidian University ,China)
|
14:50-15:15 |
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order GroupsRu Meng(Shaanxi Normal University ,China)Kaitai Liang(Manchester Metropolitan University ,United Kingdom)Jianting Ning(National University of Singapore ,Singapore)Jinguang Han(University of Surrey ,United Kingdom)Willy Susilo(University of Wollongong ,Australia)Yanwei Zhou(Shaanxi Normal University ,China)
|
15:15-15:40 |
Secure Multi-label Classification over Encrypted Data in CloudYang Liu(Nanjing University of Aeronautics and Astronautics ,China)Xingxin Li(Nanjing University of Aeronautics and Astronautics ,China)Youwen Zhu(Nanjing University of Aeronautics and Astronautics ,China)Jian Wang(Nanjing University of Aeronautics and Astronautics ,China)Zhe Liu(Nanjing University of Aeronautics and Astronautics ,China)
|
15:40-16:00 |
Tea break |
Session 6. Lattice and Post-quantum Cryptography Session Chair:Fangguo Zhang |
16:00-16:25 |
Provable Secure Signature Scheme based on Isomorphism of Polynomials in Quantum Random Oracle ModelBagus Santoso(University of Electro-Communications, Japan)Chunhua Su(University of Aizu, Japan)
|
16:25-16:50 |
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts within Polynomial Noise Long Chen(Chinese Academy of Sciences ,China)Zhenfeng Zhang(Chinese Academy of Sciences ,China)
|
16:50-17:15 |
Revocable Predicate Encryption from Lattices San Ling(Nanyang Technological University, Singapore)Khoa Nguyen(Nanyang Technological University, Singapore)Huaxiong Wang(Nanyang Technological University, Singapore)Juanyang Zhang(Nanyang Technological University, Singapore)
|
Session 7. Security Models Session Chair:Bagus Santoso |
17:15-17:40 |
Impossibility of the Provable Security of the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu(Hokkaido Information University, Japan)Shingo Hasegawa(Tohoku University, Japan)
|
17:40-18:05 |
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem Fangguo Zhang(Sun Yat-sen University ,China)
|
18:05-18:30 |
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security Dali Zhu(University of Chinese Academy of Sciences, China)Renjun Zhang(University of Chinese Academy of Sciences, China)Dingding Jia(University of Chinese Academy of Sciences, China)
|
18:30 |
Dinner Buffet (8th Floor, Jiyuan Hotel) |
25th Oct 2017 (Wenhua Hall, 5th Floor, Jiyuan Hotel) |
Session 8. Short Papers Session Chair:Shengke Zeng |
8:30-8:50 |
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions Ahto Buldas(Tallinn University of Technology, Estonia)Matthias Geihs(TU Darmstadt, Germany)Johannes Buchmann(TU Darmstadt, Germany)
|
8:50-9:10 |
Fuzzy Public-Key Encryption Based on Biometric Data Hui Cui(Royal Melbourne Institute of Technology, Australia)Man Ho Au(The Hong Kong Polytechnic University, Hong Kong)Baodong Qin(Xi'an University of Posts and Telecommunications, China)Xun Yi(Royal Melbourne Institute of Technology, Australia)Robert.H Deng(Singapore Management University, Singapore)
|
9:10-9:30 |
On the Hardness of Sparsely Learning Parity with NoiseHanlin Liu(Shanghai JiaoTong University ,China)Di Yan(Shanghai JiaoTong University ,China)Yu Yu(Shanghai JiaoTong University ,China)Shuoyao Zhao(Shanghai JiaoTong University ,China)
|
9:30-9:50 |
A Secure Cloud Backup System with Deduplication and Assured DeletionJunzuo Lai(Jinan University ,China)Jie Xiong(Jinan University ,China)Chuansheng Wang(Jinan University ,China)Guangzheng Wu(Jinan University ,China)Yanling Li(Jinan University ,China)
|
9:50-10:10 |
New framework of Password-based Authenticated Key Exchange from Only-one Lossy EncryptionHaiyang Xue(Chinese Academy of Sciences, China)Bao Li(Chinese Academy of Sciences, China)Jingnan He(Chinese Academy of Sciences, China)
|
10:10-10:30 |
Tea break |
Session 9. Digital Signatures and Authentication Session Chair:Zhe Xia |
10:30-10:55 |
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate SignaturesGunnar Hartung(Karlsruhe Institute of Technology (KIT),Germany)Bj?rn Kaidel(Karlsruhe Institute of Technology (KIT),Germany)Alexander Koch(Karlsruhe Institute of Technology (KIT),Germany)Jessica Koch(Karlsruhe Institute of Technology (KIT),Germany)Dominik Hartmann(Karlsruhe Institute of Technology (KIT),Germany)
|
10:55-11:20 |
Verifiably Encrypted Group Signatures Zhen Wang (Beihang University, China) Xiling Lou (Beihang University, China) Qianhong Wu (Beihang University, China) |
11:20-11:45 |
Deniable Ring Authentication based on Projective Hash Functions Shengke Zeng(Xihua University ,China)Yi Mu(University of Wollongong ,Australia)Guomin Yang(University of Wollongong ,Australia)Mingxing He(Xihua University ,China)
|
11:45-12:00 |
Closing |
12:00-14:00 |
Lunch Buffet (8th Floor, Jiyuan Hotel) |