Participants of the conference can download soft copies of the papers here.
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            
Conference Program
Notes: All times and dates are shown in UTC+8.
Day 1 (20/10/2023)
10:00-20:00
On-site Registration
Location: Lobby of Hongshan Hotel

Session Chair: Jiagen Chen/CCNU
           Yuntao Wang/Osaka University
14:00-14:30Solving Lattice SVP Challenges by a Trade-off Strategy
Leizhang Wang
Osaka University
14:30-15:00Privacy Preserving Data Processing for Cloud Computing with Fine-Grained Access Control
Ting Liang
Wuhan University of Technology
15:00-15:30Recent Progress on Lattice-based Group Signature
Simin Chen
Central China Normal University
15:30-16:00 Coffee Break
16:00-16:30Secure Multi-party Signing Techniques and Key Protection
Qi Feng
Wuhan University
16:30-17:00Behind the Smart Devices: A Deep Dive into IoT Privacy Concerns
Yudi Zhang
University of Wollongong
Day 2 (21/10/2023)
08:30-09:00 Inauguration
09:00-09:50
Title: Recent Developments in Post-Quantum Cryptography
Speaker: Tsuyoshi Takagi
Session Chair: Bingbing Li
09:50-10:05 Coffee Break
10:05-11:05
Session Chair: Yuntao Wang
10:05-10:25Threshold Ring Signature Scheme from Cryptographic Group ActionMinh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo
10:25-10:45An Efficient Keyword-based Ciphertext Retrieval SchemeZihao Liu, Ruixuan Deng, Chongxi Guan, Hua Shen
10:45-11:05Identity-based Matchmaking Encryption Secure against Key Generation CenterSohto Chiku, Keisuke Hara, Junji Shikata
11:05-11:20 Coffee Break
11:20-12:10
Title: Pragmatic Cryptography for Cloud Computing Security
Speaker: Willy Susilo
Session Chair: Xiaofeng Chen
12:10-13:30 Lunch Break
13:30-14:20
Title: Toward Data Security on AI Systems
Speaker: Qian Wang
Session Chair: Youwen Zhu
14:20-15:20
Session Chair: Masahito Ishizaka
14:20-14:40Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix CompletionsJiaming Wen, Houzhen Wang, Huanguo Zhang
14:40-15:00Constant-size Group Signatures with Message-Dependent Opening from LatticesSimin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen
15:00-15:20Multi-Input Functional Encryption for Unbounded Inner ProductsBishnu Charan Behera, Somindu C. Ramanna
15:20-15:35 Coffee Break
15:35-16:25
Title: Searchable Symmetric Encryption and its attacks
Speaker: Kaitai Liang
Session Chair: Zhe Xia
16:25-17:05
Session Chair: Yudi Zhang
16:25-16:45Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable EnhancementYuan Tian, Xinke Tian, Yongda Pang
16:45-17:05Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse RepresentationFuhu Wu, Lin Wang, Shun Zhang, Jie Cui, Hong Zhong
18:00-20:30 Conference Banquet
Day 3 (22/10/2023)
08:30-09:30
Session Chair: Cong Peng
08:30-08:50A Privacy-Preserving Takeaway Delivery Service SchemeLang Xu, Jiqiang Li, Hao Zhang, Hua Shen
08:50-09:10Fuzzy Deduplication Scheme Supporting Pre-verification of Label ConsistencyZehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
09:10-09:30Privacy Preserving Outsourced K-means Clustering using Kd-treeYanxiang Deng, Lin Liu, Shaojing Fu, Yuchuan Luo, Wei Wu, Shixiong Wang
09:30-09:45 Coffee Break
09:45-10:45
Session Chair: Guohua Tian
09:45-10:05SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBCYibing Wang, Xiaoxiao Wang, Chin-tser Huang, Dejun Wang, Binhao Ma, Bo Meng
10:05-10:25Homomorphic Witness Encryption from Indistinguishable ObfuscationYuzhu Wang, Mingwu Zhang, Xingbo Wang
10:25-10:45A Certificateless Aggregate Signature Scheme with Better SecurityRan Xu, Yanwei Zhou, Yu Han, Bo Yang
10:45-11:00 Coffee Break
11:00-11:40
Session Chair: Jian Shen
11:10-11:20CDRF: A Detection Method of Smart Contract Vulnerability Based on Random ForestMeng Huang, Jia Yang, Cong Liu
11:20-11:40simuBits: Pool Security Verification of Novel Mining AttacksZunlong Zhou, Wen Chen, Linrui Li, Yilin Zhang
11:40-13:30 Lunch Break
13:30-14:30
Session Chair: Rui Xu
13:30-13:50FleS: a compact and parameter-flexible supersingular isogeny based public key encryption schemeWeihan Huang, Min Luo, Cong Peng, Debiao He
13:50-14:10A New Revocable Attribute Based Encryption on LatticeLifeng Guo, Lingxia Wang, Xueke Ma, Qianli Ma
14:10-14:30Key-Range Attribute-Based Signatures for Range of Inner Product and Its ApplicationsMasahito Ishizaka
14:30-14:45 Coffee Break
14:45-16:05
Session Chair: Chi Cheng
14:45-15:05Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMsWenhao Shi, Jiang Han, Haodong Jiang, Zhi Ma
15:05-15:25Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure ConnectionsHao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma
15:25-15:45Linear Cryptanalysis of Lightweight Block Cipher WARPHong Xu, Chunyu Hao, Zhichao Xu, Wenfeng Qi
15:45-16:05Linicrypt in the Ideal Cipher ModelZahra Javar, Bruce M. Kapron
16:05-16:30