Accepted Papers

Accepted Papers:

Title: Unique Signature with Short Output from CDH Assumption
Authors: Shiuan-Tzuo Shen, Amir Rezapour and Wen-Guey Tzeng
Affiliations: National Chiao Tung University
Title: Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards
Authors: Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto
Affiliations: University of Tsukuba, National Institute of Advanced Industrial Science and Technology, Tohoku University
Title: From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Authors: Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade and Tobias Nilges
Affiliations: Aarhus University, TNG Technology Consulting GmbH, Karlsruhe Institute of Technology
Title: Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
Authors: Suvradip Chakraborty, Goutam Paul and C. Pandu Rangan
Affiliations: Indian Institute of Technology Madras, Indian Statistical Institute
Title: Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach
Authors: Xu Yang, Joseph Liu, Wei Wu and Xiaofeng Chen
Affiliations: Fujian Normal University, P. O. Box 5159, Monash University, Xidian University
Title: Reset-Secure Identity-Based Identification Schemes without Pairings
Authors: Ji-Jian Chin, Hiroaki Anada and Syh-Yuan Tan
Affiliations: Multimedia University, Institute of Systems, Information Technologies and Nanotechnologies
Title: Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
Authors: Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao and Yunlei Zhao
Affiliations: National Institute of Advanced Industrial Science and Technology, Chinese Academy of Sciences, Chinese University of Hong Kong, East China Normal University
Title: Sound Proof of Proximity of Knowledge
Authors: Serge Vaudenay
Affiliations: EPFL CH-1015 Lausanne
Title: Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
Authors: David Derler and Daniel Slamanig
Affiliations: IAIK, Graz University of Technology
Title: Attribute-based Encryption Leakage Resilient to Auxiliary Input
Authors: Zhiwei Wang and Siu Ming Yiu
Affiliations: Nanjing University of Posts and Telecommunications, University of Hong Kong
Title: Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries
Authors: Sumit Kumar Debnath and Ratna Dutta
Affiliations: Indian Institute of Technology Kharagpur
Title: Constrained Verifiable Random Functions from Indistinguishability Obfuscation
Authors: Bei Liang, Hongda Li and Jinyong Chang
Affiliations: Institute of Information Engineering of Chinese Academy of Sciences, Data Assurance and Communication Security Research Center of Chinese Academy of Sciences, ChinaUniversity of Chinese Academy of Sciences
Title: An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
Authors: Noboru Kunihiro
Affiliations: The University of Tokyo
Title: Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Authors: Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway and Björn Tackmann
Affiliations: ETH Zurich, University of California, Davis, University of California, San Diego
Title: BetterTimes: Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields
Authors: Per Hallgren, Martín Ochoa and Andrei Sabelfeld
Affiliations: Technische Universität at München, Singapore University of Technology and Design
Title: Functional Signcryption: Notion, Construction, and Applications
Authors: Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay
Affiliations: Indian Institute of Technology Kharagpur
Title: On Provable Security of wPRF-based Leakage-Resilient Stream Ciphers
Authors: Maciej Skórski
Affiliations: University of Warsaw
Title: Full PRF-Secure Message Authentication Code based on Tweakable Block Cipher
Authors: Yusuke Naito
Affiliations: Mitsubishi Electric Corporation
Title: A Formal Dynamic Verification of Choreographed Web Services Conversations
Authors: Karim Dahmani, Mahjoub Langar and Riadh Robbana
Affiliations: Faculté des Sciences de Tunis
Title: Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders
Authors: Katsuyuki Takashima and Atsushi Takayasu
Affiliations: Mitsubishi Electric, The University of Tokyo
Title: Efficient Unconditionally Secure Comparison and Private Preserving Machine Learning Classification Protocols
Authors: Bernardo David, Rafael Dowsley, Raj Katti and Anderson Nascimento
Affiliations: Aarhus University, Karlsruhe Institute of Technology, University of Washington Tacoma
Title: Efficient Key Authentication Service for Secure End-to-end Communications
Authors: Mohammad Etemad and Alptekin Küpçü
Affiliations: Koç University
Title: PPAE : Practical Parazoa Authenticated Encryption family
Authors: Donghoon Chang, R Sumesh Manjunath and Somitra Sanadhya
Affiliations: TCS Innovation Labs, Indraprastha Institute of Information Technology
Title: Provably Secure Identity based Provable Data Possession
Authors: Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo and Hongyu Liu
Affiliations: University of Electronic Science and Technology of China, Chinese Academy of Sciences, University of Wollongong, Australia
Title: Attribute-Based Encryption for Finite Automata from LWE
Authors: Xavier Boyen and Qinyi Li
Affiliations: Queensland University of Technology
Title: Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage
Authors: Yohei Watanabe and Junji Shikata
Affiliations: Yokohama National University