ACISP 2017

22nd Australasian Conference on Information Security and Privacy
Auckland, New Zealand, 3-5 July 2017

Held in conjunction with ATIS 2017 on 6-7 July, 2017

Conference Schedule

ACISP 2017 Schedule
Monday 3 July 2017 Tuesday 4 July 2017 Wednesday 5 July 2017
Registration
08:00 – 17:10
Registration
08:30 – 17:15
Registration
08:30 – 16:30
Powhiri welcome
08:30 – 09:30

Keynote Speech 1:

Prof. L. Jean Camp
09:00 – 10:00

Keynote Speech 2:

Peter Pilley
09:00 - 10:00

Jennifer Seberry Lecture:

Prof. Clark Thomborson
09:30 – 10:30

Regular papers – Session 4A + 4B

10:00 – 11:15

Regular papers – Session 7A + 7B

10:00 – 11:15

Coffee Break (10:30 – 10:50)

Coffee Break (11:15 – 11:40)

Coffee Break (11:15 – 11:40)

Regular papers – Session 1A + 1B
11:50 – 12:30
Invited Talk 2: A/Prof Ian Welch
11:40 – 12:20
Invited Talk 5: Dr Dongxi Liu
11:40 – 12:20

Lunch (12:30 – 13:20)

Invited Talk 1:
A/Prof Henry B Wolfe
13:20 – 14:00
Invited Talk 3: Dr Surya Nepal
13:20 – 14:00
Invited Talk 6: Prof. Paul S. Pang
13:20 – 14:00

Regular papers – Session 2A + 2B
14:00 – 15:15

Invited Talk 4: Dr Dong Seong Kim
14:00 – 14:40
Regular papers – Session 8A + 8B
14:00 – 14:50
Coffee Break (15:15 – 15:40) Coffee Break (14:40 – 15:00)  Coffee Break (14:50 – 15:15)
Regular papers - Session 3A+ 3B
15:40 – 16:30
Regular papers – Session 5A + 5B
15:00 – 16:15
Regular papers – Session 9A
15:15 – 16:30
Short papers – Session 3A
15:15 – 16:30
Short papers – Session 1A + 1B
16:30 – 17:00

Regular papers – Session 6A

16:15 – 17:05

Short papers – Session 2A + 2B

16:15 – 17:05

Steering Committee Meeting
17:00 – 17:30
Welcome Reception
17:30
Break 1 hour and 55 minutes

Conference Closing

16:30

  Conference dinner
19:00
 

Technical Program

Conference Opening
08:30 – 09:30 (3 July)

Powhiri Welcome

Jennifer Seberry Invited Lecture
09:30 – 10:30 (3 July)

Contextual Privacy
Prof. Clark Thomborson

Regular Papers
11:50 – 12:30 (3 July)

Regular Papers – Session 1A: Searchable Encryption
Session chair:

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage

Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin

Multi-user Cloud-based Secure Keyword Search

Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld

Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing

Hong Zhu, Zhuolin Mei, Bing Wu, Hongbo Li and Zongmin Cui

Secure and Practical Searchable Encryption: A Position Paper

Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello


Regular Papers – Session 1B: Public Key Encryption
Session chair:

Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency

Puwen Wei, Wei Wang, Bingxin Zhu and Siu Ming Yiu

Hierarchical Functional Encryption for Linear Transformations

Shiwei Zhang, Yi Mu, Guomin Yang and Xiaofen Wang

KDM-Secure Public-Key Encryption from Constant-Noise LPN

Shuai Han and Shengli Liu

Long-Term Secure Commitments via Extractable-Binding Commitments

Ahto Buldas, Matthias Geihs and Johannes Buchmann

Invited Talk 1:
13:20 – 14:00 (3 July)

Mobile Phone and General ICT Security Issues
Associate Prof. Henry B. Wolfe

Regular papers - Session 2A+ 2B
14:00 – 15:15 (3 July)

Regular Papers – Session 2A: Attribute-based Encryption
Session chair:

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption

Katsuyuki Takashima

Attribute-Based Encryption with Expressive and Authorized Keyword Search

Hui Cui, Robert H. Deng, Joseph K. Liu and Yingjiu Li

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud

Yanjiang Yang, Joseph Liu, Zhuo Wei and Xinyi Huang


Regular Papers – Session 2B: Software Security
Session chair:

FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability

Fan Jiang, Cen Zhang and Shaoyin Cheng

Splitting Third-party Libraries Privileges from Android Apps

Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang and Yingjiao Niu

PriMal: Cloud-based Privacy-preserving Malware Detection

Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu1 and Qiaolin Hu

Regular papers - Session 3A+ 3B
15:40 – 16:30 (3 July)

Regular Papers – Session 3A: Digital Signature
Session chair:

Exploring Effect of Location Number on Map-Based Graphical Password Authentication

Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption

Xiao Zhang, Shengli Liu and Dawu Gu


Regular Papers – Session 3B: Cryptanalysis I
Session chair:

Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes

Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, and Kenneth

Koon-Ho Wong

How to Handle Rainbow Tables with External Memory

Gildas Avoine, Xavier Carpent, Barbara Kordy and Florent Tardif

Short papers – Session 1A + 1B
16:30 – 17:00 (3 July)

Short Papers – Session 1A
Session chair:

Certificate Transparency with Enhancements and Short Proofs

Abhishek Singh, Binanda Sengupta2 and Sushmita Ruj

Update-tolerant and Revocable Password Backup

Moritz Horsch, Johannes Braun, Dominique Metz and Johannes Buchmann


Short Papers – Session 1B
Session chair:

Redactable Graph Hashing, Revisited

Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kbler, Michael Kmmerlin, Jakob Laenge and Felix Rohrbach

On the Security of Designing A Cellular Automata Based Stream Cipher

Swapan Maiti, Shamit Ghosh and Dipanwita Roy Chowdhury

Keynote Speech 1:
09:00 – 10:00 (4 July)

Security as Risk Communication
Prof. L. Jean Camp

Regular papers – Session 4A + 4B
10:00 – 11:15 (4 July)

Regular Papers – Session 4A: Cryptanalysis II
Session chair:

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Mengce Zheng, Noboru Kunihiro and Honggang Hu

Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE

Suvradip Chakraborty, Goutam Paul and C. Pandu Rangan

Analysis of Toeplitz MDS Matrices

Sumanta Sarkar and Habeeb Syed


Regular Papers – Session 4B: Symmetric Cryptography
Session chair:

Improved Integral Attack on HIGHT

Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii

Reforgeability of Authenticated Encryption Schemes

Christian Forler, Eik List, Stefan Lucks and Jakob Wenzel

Indifferentiability of Double-Block-Length Hash Function without Feed-Forward Operations

Yusuke Naito

Invited Talk 2:
11:40 – 12:20 (4 July)

Software Defined Networking as a Security Enabler for Enterprises
Associate Prof. Ian Welch

Invited Talk 3:
13:20 – 14:00 (4 July)

Orchestration and Automation of Cybersecurity: Issues and Challenges
Dr. Surya Nepal

Invited Talk 4:
14:00 – 14:40 (4 July)

Graphical Security Models
Dr. Dong Seong (Dan) Kim

Regular papers – Session 5A + 5B
15:00 – 16:15 (4 July)

Regular Papers – Session 5A: Identity-based Encryption
Session chair:

Mergeable and Revocable Identity-Based Encryption

Shengmin Xu, Guomin Yang, Yi Mu and Willy Susilo

ID-based Encryption with Equality Test against Insider Attack

Tong Wu, Sha Ma, Yi Mu and Shengke Zeng

Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance

Atsushi Takayasu and Yohei Watanabe


Regular Papers – Session 5B: Privacy I
Session chair:

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

Keita Emura

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data

Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu and Ye Wang

Private Graph Intersection Protocol

Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu and Su Peng

Regular Papers – Session 6A
16:15 – 17:05 (4 July)

Regular Papers – Session 6A: Network Security
Session chair:

Prover Efficient Public Verification of Dense or Sparse/structured Matrix-vector Multiplication

Jean-Guillaume Dumas and Vincent Zucca

JSFfox: Run-timely Confining JavaScript for Firefox

Weizhong Qiang, JiaZhen Guo, Hai Jin, and Weifeng Li

Short papers – Session 2A + 2B
16:15 – 17:05 (4 July)

Short Papers – Session 2A
Session chair:

Stegogames

Clark Thomborson and Marc Jeanmougin

A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes

Dwight Horne and Suku Nair

Short Papers – Session 2B
Session chair:

Fully Context-Sensitive CFI for COTS Binaries

Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang and Guozhong Sun

Dual-Mode Cryptosystem Based on the Learning with Errors Problem

Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu and Dingding Jia

Keynote Speech 2:
09:00 - 10:00 (5 July)

I was sure that was my password... and other just so law enforcement stories
Peter Pilley

Regular papers – Session 7A + 7B
10:00 – 11:15 (5 July)

Regular Papers – Session 7A: Elliptic Curve Cryptograph
Session chair:

Generating Complete Edwards Curves

Theo Fanuela Prabowo and Chik How Tan

Secure GLS Recomposition for Sum-of-Square Cofactors

Eunkyung Kim and Mehdi Tibouchi

Differential Addition on Twisted Edwards Curves

Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini


Regular Papers – Session 7B: Authentication
Session chair:

Privacy-Preserving k-time Authenticated Secret Handshakes

Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu and Yong Yu

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pohls, Kai Samelin and Daniel Slamanig

A QR Code Watermarking Approach based on the DWT-DCT Technique

Yang-Wai Chow, Willy Susilo, Joseph Tonien and Wei Zong

Invited Talk 5:
11:40 – 12:20 (5 July)

Compact-LWE for Lightweight Public Key Encryption and Leveled IoT Authentication
Dr. Dongxi Liu

Invited Talk 6:
13:20 – 14:00 (5 July)

UniteCloud: A Resilient Private Cloud Platform for Education and Research Service
Prof. Paul S. Pang

Regular papers – Session 8A + 8B
14:00 – 14:50 (5 July)

Regular Papers – Session 8A: Malware Detection
Session chair:

SafeStack+: Enhanced Dual Stack to Combat Data-Flow Hijacking

Yan Lin, Xiaoxiao Tang and Debin Gao

A New Malware Classiffcation Approach Based on Malware Dynamic Analysis

Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang and Qiang Yang


Regular Papers – Session 8B: Privacy II
Session chair:

Computing Aggregates over Numeric Data with Personalized Local Differential Privacy

Mousumi Akter and Tanzima Hashem

An Efficient Toolkit for Computing Private Set Operations

Alex Davidson and Carlos Cid

Regular papers – Session 9A
15:15 – 16:30 (5 July)

Regular Papers – Session 9A: Cryptanalysis III
Session chair:

Cryptanalysis of Simpira v2

Ivan Tjuawinata, Tao Huang and Hongjun Wu

Statistical Integral Distinguisher with Multi-Structure and Its Application on AES

Tingting Cui, Ling Sun, Huaifeng Chen and Meiqin Wang

Conditional Differential Cryptanalysis for Kreyvium

Yuhei Watanabe, Takanori Isobe and Masakatu Morii

Short papers – Session 3A
15:15 – 16:30 (5 July)

Short Papers – Session 3A
Session chair:

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure

Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke and Ernest Foo

Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Jason H.M. Ying and Noboru Kunihiro

Conference Closing
16:30 (5 July)

Accepted Papers

ACISP 2017 Accepted Regular Papers

Authors Paper Title
Keita Emura Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Puwen Wei, Wei Wang, Bingxin Zhu and Siu Ming Yiu Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin and Daniel Slamanig Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Katsuyuki Takashima New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Fan Jiang, Cen Zhang and Shaoyin Cheng FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability
Shiwei Zhang, Yi Mu, Guomin Yang and Xiaofen Wang Hierarchical Functional Encryption for Linear Transformations
Theo Fanuela Prabowo and Chik How Tan Generating Complete Edwards Curves
Hao Sun, Xiaofeng Wang, Rongmao Chen, Jinshu Su and Yilun Wu PriMal: Cloud-based Privacy-preserving Malware Detection
Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu and Yi Wang A New Malware Classification Approach Based on Malware Dynamic Analysis
Shengmin Xu, Guomin Yang and Yi Mu Mergeable and Revocable Identity-Based Encryption
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson and Kenneth Koon-Ho Wong Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Shuai Han and Shengli Liu KDM-Secure Public-Key Encryption from Constant-Noise LPN
Eunkyung Kim and Mehdi Tibouchi Secure GLS Recomposition for Sum-of-Square Cofactors
Hui Cui, Robert H. Deng, Joseph Liu and Yingjiu Li Attribute-Based Encryption with Expressive and Authorized Keyword Search
Sumanta Sarkar and Habeeb Syed Analysis of Toeplitz MDS Matrices
Gildas Avoine, Xavier Carpent, Barbara Kordy and Florent Tardif How to Handle Rainbow Tables with External Memory
Jakob Wenzel, Eik List, Christian Forler and Stefan Lucks Reforgeability of Authenticated Encryption Schemes
Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu and Ye Wang Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage
Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu and Su Peng Private Graph Intersection Protocol
Tong Wu, Sha Ma and Yi Mu ID-based Encryption with Equality Test against Insider Attack
Jean-Guillaume Dumas and Vincent Zucca Prover efficient public verification of dense or sparse/structured matrix-vector multiplication
Yangguang Tian, Guomin Yang, Yi Mu and Shiwei Zhang Privacy-Preserving k-time Authenticated Secret Handshakes
Mousumi Akter and Tanzima Hashem Computing Aggregates over Numeric Data with Personalized Local Differential Privacy
Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang and Yingjiao Niu Splitting Third-party Libraries’ Privileges from Android Apps
Mengce Zheng, Noboru Kunihiro and Honggang Hu Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandurangan Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii Improved Integral Attack on HIGHT
Shabnam Kasra Kermanshahi, Joseph Liu and Ron Steinfeld Multi-user cloud-based secure keyword search
Ivan Tjuawinata, Tao Huang and Hongjun Wu Cryptanalysis of Simpira v2
Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu Exploring Effect of Location Number on Map-Based Graphical Password Authentication
Tingting Cui, Ling Sun, Huaifeng Chen and Meiqin Wang Statistical Integral Distinguisher with Multi-Structure and Its Application on AES
Ahto Buldas, Matthias Geihs and Johannes Buchmann Long-Term Secure Commitments via Extractable-Binding Commitments
Zhuolin Mei, Hong Zhu, Bing Wu and Hongbo Li A Searchable Encryption method supporting Fuzzy Keyword Search and Access Control
Atsushi Takayasu and Yohei Watanabe Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Yuhei Watanabe, Takanori Isobe and Masakatu Morii Conditional Differential Cryptanalysis for Kreyvium
Wei Zhong, Yang-Wai Chow, Joseph Tonien and Willy Susilo A QR Code Watermarking Approach based on the DWT-DCT Technique
Shujie Cui, Muhammad Rizwan Asghar, Steven Galbraith and Giovanni Russello Secure and Practical Searchable Encryption: A Position Paper
Alex Davidson and Carlos Cid An Efficient Toolkit for Computing Private Set Operations
Weizhong Qiang, Jiazhen Guo, Hai Jin and Weifeng Li JSFfox: Run-timely Confining JavaScript for Firefox
Xiao Zhang, Shengli Liu and Dawu Gu Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption
Yan Lin, Xiaoxiao Tang and Debin Gao SafeStack+: Enhanced Dual Stack to Combat Data-Flow Hijacking
Yusuke Naito Indifferentiability of Double-Block-Length Hash Function without Feed-Forward Operations
Yanjiang Yang, Joseph Liu, Zhuo Wei and Xinyi Huang Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud
Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini Differential Addition on Twisted Edwards Curves

ACISP 2017 Accepted Short Papers

Authors Paper Title
Abhishek Singh, Binanda Sengupta and Sushmita Ruj Certificate Transparency with Enhancements and Short Proofs
Moritz Horsch, Johannes Braun, Dominique Metz and Johannes Buchmann Update-tolerant and Revocable Password Backup
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge and Felix Rohrbach Redactable Graph Hashing, Revisited
Swapan Maiti, Shamit Ghosh and Dipanwita Roy Chowdhury On the Security of Designing A Cellular Automata Based Stream Cipher
Clark Thomborson and Marc Jeanmougin Stegogames
Dwight Horne and Suku Nair A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes
Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin and Shizhen Wang Fully Context-Sensitive CFI for COTS Binaries
Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu and Dingding Jia Dual-Mode Cryptosystem Based on the Learning with Errors Problem
Nicholas Rodofile, Thomas Schmidt, Sebastian Sherry, Christopher Djamaludin, Kenneth Radke and Ernest Foo Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
Jason Ying and Noboru Kunihiro Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Sponsors