您所在的位置: 首页 >> 学术活动 >> 正文

学术活动

第11届可证明安全国际会议(ProvSec 2017)会议通知
发布时间:2017-10-23     来源:太阳成集团tyc4633   分享到:


活动类别:第11届可证明安全国际会议(ProvSec 2017)

活动时间:2017年10月23日(周一)上午8:30

活动地点:长安区吉源酒店一层吉瑞厅

会议议程:

22nd Oct 2017

(1st Floor, Jiyuan Hotel)

14:00-22:00

Registration

Lobby of Jiyuan   International Hotel

23rd Oct 2017 AM

(Jirui Hall, 1st   Floor, Jiyuan Hotel)

8:30-9:30

Opening   and Group Photo

Chair:   Hui Li

1. Opening   Address

2. Introduction   of ProvSec 2017 Submissions

3. Introduction   of CSS 2017 Submissions

4. Group Photo

Keynote Speech   1

Session ChairTatsuaki   Okamoto

9:30-10:30

Title: Computations on Encrypted Data and   Privacy

Speaker: David Pointcheval

10:30-10:50

Tea   Break

Invited Talk 1

Session ChairYang   Xiang

10:50-11:40

Title: Location Privacy and Its Applications

Speaker: Wanlei Zhou,   Tianqing Zhu

Invited Talk 2

Session ChairYong   Yu

11:40-12:30

Title: Digital Signatures with Tight Reductions

Speaker: Willy Susilo

12:30-14:00

Lunch Buffet (8th Floor,   Jiyuan Hotel)

23rd Oct 2017 PM

(Wenhua   Hall, 5th Floor, Jiyuan Hotel)

Session 1. Public Key   Encryption and Signcryption

Session ChairJian   Shen

 

 

14:00-14:25

Provable Secure Constructions for     Broadcast Encryption with Personalized Messages

 

Kamalesh Acharya(IIT KHARAGPUR, India)Ratna Dutta(IIT KHARAGPUR, India)


 

 

 

14:25-14:50

Provably Secure Homomorphic     Signcryption

 

Fatemeh  Rezaeibagha(University of     Wollongong ,Australia)Yi  Mu(University of     Wollongong ,Australia)Shiwei  Zhang(University of     Wollongong ,Australia)Xiaofen  Wang(University of     Electronic Science and Technology of China ,China)


 

 

14:50-15:15

Natural sd-RCCA secure Public-key     encryptions

 

Yuan Chen(Xidian University ,China)Qingkuan Dong(Xidian University ,China)Qiqi Lai(Shaanxi Normal University ,China)


 

 

 

15:15-15:40

Homomorphic Secret Sharing from     Paillier Encryption

 

Nelly Fazio(City College of New York ,United States)Rosario Gennaro(City College of New York ,United States)Tahereh Jafarikhah(City College of New York ,United States)William Skeith    (City College     of New York ,United States)


15:40-16:00

                    Tea break

Session 2. Proxy Re-encryption and Functional   Encryption

Session Chair: Rosario Gennaro

 

 

 

 

16:00-16:25

An Efficient Certificateless Proxy     Re-Encryption Scheme without Pairing

 

Sharmila Deva Selvi S(Indian Institute of     Technology Madras, India)Arinjita  Paul(Indian Institute of     Technology Madras, India)Chandrasekaran  Pandurangan(Institute of Technology     Madras, India)


 

 

16:25-16:50

Mergeable Functional Encryption

 

Vincenzon  Iovino(University of     Luxembourg, Luxembourg)Karol  Zebrowski(University of Warsaw, Poland)


Session 3. Security Protocols

Session ChairMingwu   Zhang

 

 

 

 

16:50-17:15

Private Subgraph Matching Protocol

 

Zifeng  Xu(Northeastern University,     China)Fucai  Zhou(Northeastern University,     China)Yuxi  Li(Northeastern University,     China)Jian  Xu(Northeastern University,     China)Qiang  Wang(Northeastern University,     China)


 

 

17:15-17:40

A New   Blockchain-based Value-Added Tax System

Dimaz  Ankaa Wijaya (Monash University, Australia)

Joseph K. Liu        (Monash University, Australia)

Dony    Suwarsono    (Directorate General of Taxes, Indonesia)

Peng    Zhang         (Shenzhen University, China)

 

 

 

 

17:40-18:05

Verifiable Private Polynomial Evaluation

 

Xavier  Bultel(Université Clermont     Auvergne, France)Manik Lal  Das(DA-IICT, India)Hardik  Gajera(DA-IICT, India)David  Gerault(Université Clermont     Auvergne, France)Matthieu  Giraud(Université Clermont     Auvergne, France)Pascal  Lafourcade(Université Clermont     Auvergne, France)


18:30

Banquet (Jirui   Hall, 1st Floor, Jiyuan Hotel)

24th Oct 2017

(Wenhua Hall,   5th Floor, Jiyuan Hotel)

Invited Talk 3

Session ChairWilly   Susilo

 

8:30-9:20

Title: Adversarial signal processing: a   game-theoretic framework

Speaker: Mauro   Barni

Invited Talk 4

Session ChairChristian   Esposito

 

9:20-10:10

Title:(Linkable) Ring Signature and its   Applications to Blockchain

Speaker: Joseph Liu

10:10-10:30Tea     break

 Invited Talk 5

Session ChairDong   Zheng

 

10:30-11:20

Title: Accountable Anonymous Authentications

Speaker: Man Ho Allen Au

Session 4. Authenticated Encryption and Key Exchange

Session ChairYannan   Li

 

 

 

 

11:20-11:45

INT-RUP Security of Checksum-based     Authenticated Encryption

 

Ping       Zhang(University of     Science and Technology of China ,China)Peng  Wang(Institute of     Information Engineering of Chinese Academy of Sciences ,China)Honggang  Hu(University of     Science and Technology of China ,China)Changsong  Chen(The Third     Research Institute of Ministry of Public Security ,China)Wenke  Kuai(State Grid     Anhui Electric Power Company ,China)


 

 

 

11:45-12:10

Leakage-Resilient Non-Interactive Key     Exchange in the Continuous-Memory Leakage Setting

 

Suvradip  Chakraborty(Indian Institute of Technology Madras     ,India)Janaka  Alawatugoda(University of Peradeniya ,Sri Lanka)C     Pandu  Rangan(Institute of Technology Madras ,India)


12:10-14:00

Lunch Buffet (8th Floor,   Jiyuan Hotel)

Session 5. Secure Cloud Computing

Session Chair: Jiguo Li

 

 

 

 

14:00-14:25

Provably Secure Self-Extractable Encryption

 

Zhi Liang(Beihang University,     China)Qianhong Wu(Beihang University,     China)Weiran  Liu(Beihang University,     China)Jianwei Liu(Beihang University,     China)Fu Xiao(Nanjing University of     Posts and Telecommunications, China)


 

 

 

 

14:25-14:50

Towards Multi-user Searchable Encryption     Supporting Boolean Query and Fast Decryption

 

Yunling  Wang(Xidian     University ,China)Jianfeng  Wang(Xidian     University ,China)Shifeng  Sun(Monash     University ,Australia)Joseph      K. Liu(Monash     University ,Australia)Willy  Susilo(University of     Wollongong ,Australia)Xiaofeng  Chen(Xidian     University ,China)


 

 

 

 

14:50-15:15

An Efficient Key-Policy Attribute-Based Searchable Encryption in   Prime-Order Groups

Ru  Meng(Shaanxi     Normal University ,China)Kaitai  Liang(Manchester     Metropolitan University ,United Kingdom)Jianting  Ning(National University of Singapore     ,Singapore)Jinguang  Han(University of Surrey ,United Kingdom)Willy  Susilo(University of Wollongong ,Australia)Yanwei  Zhou(Shaanxi Normal University ,China)


 

 

 

 

 

15:15-15:40

Secure Multi-label Classification over Encrypted Data in Cloud

Yang Liu(Nanjing University of     Aeronautics and Astronautics ,China)Xingxin Li(Nanjing University of     Aeronautics and Astronautics ,China)Youwen Zhu(Nanjing University of     Aeronautics and Astronautics ,China)Jian Wang(Nanjing University of     Aeronautics and Astronautics ,China)Zhe Liu(Nanjing University of     Aeronautics and Astronautics ,China)


15:40-16:00

Tea break

Session 6. Lattice and   Post-quantum Cryptography

Session ChairFangguo   Zhang

 

 

16:00-16:25

Provable Secure Signature Scheme based on     Isomorphism of Polynomials in Quantum Random Oracle ModelBagus  Santoso(University of     Electro-Communications, Japan)Chunhua  Su(University of     Aizu, Japan)


 

 

16:25-16:50

Bootstrapping Fully Homomorphic     Encryption with Ring Plaintexts within Polynomial Noise

 

Long  Chen(Chinese     Academy of Sciences ,China)Zhenfeng  Zhang(Chinese Academy of Sciences ,China)


 

 

 

16:50-17:15

Revocable Predicate Encryption from     Lattices

 

San  Ling(Nanyang     Technological University, Singapore)Khoa  Nguyen(Nanyang     Technological University, Singapore)Huaxiong  Wang(Nanyang     Technological University, Singapore)Juanyang  Zhang(Nanyang     Technological University, Singapore)


Session 7. Security Models

Session ChairBagus Santoso

 

 

 

17:15-17:40

Impossibility of the Provable Security of     the Schnorr Signature from the One-more DL Assumption in the     Non-programmable Random Oracle Model

 

Masayuki Fukumitsu(Hokkaido Information University, Japan)Shingo  Hasegawa(Tohoku University, Japan)


 

17:40-18:05

Bit Security of the Hyperelliptic Curves     Diffie-Hellman Problem

 

Fangguo      Zhang(Sun Yat-sen     University ,China)


 

 

 

18:05-18:30

Public-Key Encryption with     Simulation-Based Sender Selective-Opening Security

 

Dali Zhu(University of     Chinese Academy of Sciences, China)Renjun  Zhang(University of     Chinese Academy of Sciences, China)Dingding  Jia(University of     Chinese Academy of Sciences, China)


18:30

Dinner Buffet (8th   Floor, Jiyuan Hotel)

25th Oct 2017

(Wenhua Hall,   5th Floor, Jiyuan Hotel)

Session 8. Short Papers

Session ChairShengke   Zeng

 

 

8:30-8:50

Long-Term Secure Time-Stamping using     Preimage-Aware Hash Functions

 

Ahto      Buldas(Tallinn     University of Technology, Estonia)Matthias  Geihs(TU Darmstadt,     Germany)Johannes       Buchmann(TU Darmstadt, Germany)


 

 

 

 

8:50-9:10

Fuzzy Public-Key Encryption Based on     Biometric Data

 

Hui Cui(Royal     Melbourne Institute of Technology, Australia)Man Ho Au(The Hong Kong     Polytechnic University, Hong Kong)Baodong Qin(Xi'an     University of Posts and Telecommunications, China)Xun Yi(Royal     Melbourne Institute of Technology, Australia)Robert.H Deng(Singapore Management University,     Singapore)


 

 

 

9:10-9:30

On the Hardness of Sparsely Learning     Parity with NoiseHanlin Liu(Shanghai     JiaoTong University ,China)Di Yan(Shanghai     JiaoTong University ,China)Yu Yu(Shanghai     JiaoTong University ,China)Shuoyao Zhao(Shanghai     JiaoTong University ,China)


 

 

 

 

9:30-9:50

A Secure Cloud Backup System with     Deduplication and Assured DeletionJunzuo  Lai(Jinan     University ,China)Jie  Xiong(Jinan     University ,China)Chuansheng  Wang(Jinan     University ,China)Guangzheng  Wu(Jinan University     ,China)Yanling  Li(Jinan     University ,China)


 

 

 

9:50-10:10

New framework of Password-based     Authenticated Key Exchange from Only-one Lossy EncryptionHaiyang Xue(Chinese     Academy of Sciences, China)Bao  Li(Chinese     Academy of Sciences, China)Jingnan  He(Chinese     Academy of Sciences, China)


10:10-10:30

Tea break

Session 9. Digital Signatures and   Authentication

Session ChairZhe   Xia

 

 

 

10:30-10:55

Practical and Robust Secure Logging from     Fault-Tolerant Sequential Aggregate SignaturesGunnar      Hartung(Karlsruhe     Institute of Technology (KIT),Germany)Bj?rn        Kaidel(Karlsruhe     Institute of Technology (KIT),Germany)Alexander      Koch(Karlsruhe     Institute of Technology (KIT),Germany)Jessica       Koch(Karlsruhe     Institute of Technology (KIT),Germany)Dominik      Hartmann(Karlsruhe     Institute of Technology (KIT),Germany)


 

10:55-11:20

Verifiably Encrypted Group Signatures

Zhen  Wang   (Beihang University, China)

Xiling  Lou   (Beihang   University, China)

Qianhong Wu  (Beihang   University, China)

 

 

 

11:20-11:45

Deniable Ring Authentication based on     Projective Hash Functions

 

Shengke Zeng(Xihua University ,China)Yi Mu(University of Wollongong ,Australia)Guomin  Yang(University of Wollongong ,Australia)Mingxing  He(Xihua University ,China)


11:45-12:00

Closing

12:00-14:00

Lunch Buffet (8th Floor,   Jiyuan Hotel)