Conference Program | ||
Notes: All times and dates are shown in UTC+8. | ||
Day 1 (20/10/2023) | ||
10:00-20:00 |
On-site Registration Location: Lobby of Hongshan Hotel |
|
Session Chair: Jiagen Chen/CCNU Yuntao Wang/Osaka University |
||
14:00-14:30 | Solving Lattice SVP Challenges by a Trade-off Strategy | Leizhang Wang Osaka University |
14:30-15:00 | Privacy Preserving Data Processing for Cloud Computing with Fine-Grained Access Control | Ting Liang Wuhan University of Technology |
15:00-15:30 | Recent Progress on Lattice-based Group Signature | Simin Chen Central China Normal University |
15:30-16:00 | Coffee Break | |
16:00-16:30 | Secure Multi-party Signing Techniques and Key Protection | Qi Feng Wuhan University |
16:30-17:00 | Behind the Smart Devices: A Deep Dive into IoT Privacy Concerns | Yudi Zhang University of Wollongong |
Day 2 (21/10/2023) | ||
08:30-09:00 | Inauguration | |
09:00-09:50 |
Title: Recent Developments in Post-Quantum Cryptography Speaker: Tsuyoshi Takagi Session Chair: Bingbing Li |
|
09:50-10:05 | Coffee Break | |
10:05-11:05 |
Session Chair: Yuntao Wang |
|
10:05-10:25 | Threshold Ring Signature Scheme from Cryptographic Group Action | Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo |
10:25-10:45 | An Efficient Keyword-based Ciphertext Retrieval Scheme | Zihao Liu, Ruixuan Deng, Chongxi Guan, Hua Shen |
10:45-11:05 | Identity-based Matchmaking Encryption Secure against Key Generation Center | Sohto Chiku, Keisuke Hara, Junji Shikata |
11:05-11:20 | Coffee Break | |
11:20-12:10 |
Title: Pragmatic Cryptography for Cloud Computing Security Speaker: Willy Susilo Session Chair: Xiaofeng Chen |
|
12:10-13:30 | Lunch Break | |
13:30-14:20 |
Title: Toward Data Security on AI Systems Speaker: Qian Wang Session Chair: Youwen Zhu |
|
14:20-15:20 |
Session Chair: Masahito Ishizaka |
|
14:20-14:40 | Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions | Jiaming Wen, Houzhen Wang, Huanguo Zhang |
14:40-15:00 | Constant-size Group Signatures with Message-Dependent Opening from Lattices | Simin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen |
15:00-15:20 | Multi-Input Functional Encryption for Unbounded Inner Products | Bishnu Charan Behera, Somindu C. Ramanna |
15:20-15:35 | Coffee Break | |
15:35-16:25 |
Title: Searchable Symmetric Encryption and its attacks Speaker: Kaitai Liang Session Chair: Zhe Xia |
|
16:25-17:05 |
Session Chair: Yudi Zhang |
|
16:25-16:45 | Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement | Yuan Tian, Xinke Tian, Yongda Pang |
16:45-17:05 | Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation | Fuhu Wu, Lin Wang, Shun Zhang, Jie Cui, Hong Zhong |
18:00-20:30 | Conference Banquet | |
Day 3 (22/10/2023) | ||
08:30-09:30 |
Session Chair: Cong Peng |
|
08:30-08:50 | A Privacy-Preserving Takeaway Delivery Service Scheme | Lang Xu, Jiqiang Li, Hao Zhang, Hua Shen |
08:50-09:10 | Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency | Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng |
09:10-09:30 | Privacy Preserving Outsourced K-means Clustering using Kd-tree | Yanxiang Deng, Lin Liu, Shaojing Fu, Yuchuan Luo, Wei Wu, Shixiong Wang |
09:30-09:45 | Coffee Break | |
09:45-10:45 |
Session Chair: Guohua Tian |
|
09:45-10:05 | SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC | Yibing Wang, Xiaoxiao Wang, Chin-tser Huang, Dejun Wang, Binhao Ma, Bo Meng |
10:05-10:25 | Homomorphic Witness Encryption from Indistinguishable Obfuscation | Yuzhu Wang, Mingwu Zhang, Xingbo Wang |
10:25-10:45 | A Certificateless Aggregate Signature Scheme with Better Security | Ran Xu, Yanwei Zhou, Yu Han, Bo Yang |
10:45-11:00 | Coffee Break | |
11:00-11:40 |
Session Chair: Jian Shen |
|
11:10-11:20 | CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest | Meng Huang, Jia Yang, Cong Liu |
11:20-11:40 | simuBits: Pool Security Verification of Novel Mining Attacks | Zunlong Zhou, Wen Chen, Linrui Li, Yilin Zhang |
11:40-13:30 | Lunch Break | |
13:30-14:30 |
Session Chair: Rui Xu |
|
13:30-13:50 | FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme | Weihan Huang, Min Luo, Cong Peng, Debiao He |
13:50-14:10 | A New Revocable Attribute Based Encryption on Lattice | Lifeng Guo, Lingxia Wang, Xueke Ma, Qianli Ma |
14:10-14:30 | Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications | Masahito Ishizaka |
14:30-14:45 | Coffee Break | |
14:45-16:05 |
Session Chair: Chi Cheng |
|
14:45-15:05 | Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs | Wenhao Shi, Jiang Han, Haodong Jiang, Zhi Ma |
15:05-15:25 | Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections | Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma |
15:25-15:45 | Linear Cryptanalysis of Lightweight Block Cipher WARP | Hong Xu, Chunyu Hao, Zhichao Xu, Wenfeng Qi |
15:45-16:05 | Linicrypt in the Ideal Cipher Model | Zahra Javar, Bruce M. Kapron |
16:05-16:30 |