ACISP 2017

22nd Australasian Conference on Information Security and Privacy
Auckland, New Zealand, 3-5 July 2017

Held in conjunction with ATIS 2017 on 6-7 July, 2017

Conference Schedule

We will announce these details later.

Accepted Papers

ACISP 2017 Accepted Regular Papers

Authors Paper Title
Keita Emura Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Puwen Wei, Wei Wang, Bingxin Zhu and Siu Ming Yiu Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin and Daniel Slamanig Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Katsuyuki Takashima New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Fan Jiang, Cen Zhang and Shaoyin Cheng FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability
Shiwei Zhang, Yi Mu, Guomin Yang and Xiaofen Wang Hierarchical Functional Encryption for Linear Transformations
Theo Fanuela Prabowo and Chik How Tan Generating Complete Edwards Curves
Hao Sun, Xiaofeng Wang, Rongmao Chen, Jinshu Su and Yilun Wu PriMal: Cloud-based Privacy-preserving Malware Detection
Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu and Yi Wang A New Malware Classification Approach Based on Malware Dynamic Analysis
Shengmin Xu, Guomin Yang and Yi Mu Mergeable and Revocable Identity-Based Encryption
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson and Kenneth Koon-Ho Wong Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Shuai Han and Shengli Liu KDM-Secure Public-Key Encryption from Constant-Noise LPN
Eunkyung Kim and Mehdi Tibouchi Secure GLS Recomposition for Sum-of-Square Cofactors
Hui Cui, Robert H. Deng, Joseph Liu and Yingjiu Li Attribute-Based Encryption with Expressive and Authorized Keyword Search
Sumanta Sarkar and Habeeb Syed Analysis of Toeplitz MDS Matrices
Gildas Avoine, Xavier Carpent, Barbara Kordy and Florent Tardif How to Handle Rainbow Tables with External Memory
Jakob Wenzel, Eik List, Christian Forler and Stefan Lucks Reforgeability of Authenticated Encryption Schemes
Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu and Ye Wang Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu and Hai Jin Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage
Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu and Su Peng Private Graph Intersection Protocol
Tong Wu, Sha Ma and Yi Mu ID-based Encryption with Equality Test against Insider Attack
Jean-Guillaume Dumas and Vincent Zucca Prover efficient public verification of dense or sparse/structured matrix-vector multiplication
Yangguang Tian, Guomin Yang, Yi Mu and Shiwei Zhang Privacy-Preserving k-time Authenticated Secret Handshakes
Mousumi Akter and Tanzima Hashem Computing Aggregates over Numeric Data with Personalized Local Differential Privacy
Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang and Yingjiao Niu Splitting Third-party Libraries’ Privileges from Android Apps
Mengce Zheng, Noboru Kunihiro and Honggang Hu Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandurangan Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii Improved Integral Attack on HIGHT
Shabnam Kasra Kermanshahi, Joseph Liu and Ron Steinfeld Multi-user cloud-based secure keyword search
Ivan Tjuawinata, Tao Huang and Hongjun Wu Cryptanalysis of Simpira v2
Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu Exploring Effect of Location Number on Map-Based Graphical Password Authentication
Tingting Cui, Ling Sun, Huaifeng Chen and Meiqin Wang Statistical Integral Distinguisher with Multi-Structure and Its Application on AES
Ahto Buldas, Matthias Geihs and Johannes Buchmann Long-Term Secure Commitments via Extractable-Binding Commitments
Zhuolin Mei, Hong Zhu, Bing Wu and Hongbo Li A Searchable Encryption method supporting Fuzzy Keyword Search and Access Control
Atsushi Takayasu and Yohei Watanabe Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Yuhei Watanabe, Takanori Isobe and Masakatu Morii Conditional Differential Cryptanalysis for Kreyvium
Wei Zhong, Yang-Wai Chow, Joseph Tonien and Willy Susilo A QR Code Watermarking Approach based on the DWT-DCT Technique
Shujie Cui, Muhammad Rizwan Asghar, Steven Galbraith and Giovanni Russello Secure and Practical Searchable Encryption: A Position Paper
Alex Davidson and Carlos Cid An Efficient Toolkit for Computing Private Set Operations
Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin and Shizhen Wang Fully Context-Sensitive CFI for COTS Binaries
Xiao Zhang, Shengli Liu and Dawu Gu Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption
Yan Lin, Xiaoxiao Tang and Debin Gao SafeStack+: Enhanced Dual Stack to Combat Data-Flow Hijacking
Yusuke Naito Indifferentiability of Double-Block-Length Hash Function without Feed-Forward Operations
Yanjiang Yang, Joseph Liu, Zhuo Wei and Xinyi Huang Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud
Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini Differential Addition on Twisted Edwards Curves

ACISP 2017 Accepted Short Papers

Authors Paper Title
Abhishek Singh, Binanda Sengupta and Sushmita Ruj Certificate Transparency with Enhancements and Short Proofs
Moritz Horsch, Johannes Braun, Dominique Metz and Johannes Buchmann Update-tolerant and Revocable Password Backup
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge and Felix Rohrbach Redactable Graph Hashing, Revisited
Swapan Maiti, Shamit Ghosh and Dipanwita Roy Chowdhury On the Security of Designing A Cellular Automata Based Stream Cipher
Clark Thomborson and Marc Jeanmougin Stegogames
Dwight Horne and Suku Nair A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes
Weizhong Qiang, Jiazhen Guo, Hai Jin and Weifeng Li JSFfox: Run-timely Confining JavaScript for Firefox
Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu and Dingding Jia Dual-Mode Cryptosystem Based on the Learning with Errors Problem
Nicholas Rodofile, Thomas Schmidt, Sebastian Sherry, Christopher Djamaludin, Kenneth Radke and Ernest Foo Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
Jason Ying and Noboru Kunihiro Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Sponsors