ProvSec 2015 Program

2015/11/24 (Tue)
09:30 - 10:15   Registration
10:15 - 10:25 Welcoming Remarks
Session: Fundamental (Chair: Serge Vaudenay)
10:25 – 10:50 From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions PDF
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade and Tobias Nilges
10:50 – 11:15 Constrained Verifiable Random Functions from Indistinguishability Obfuscation PDF
Bei Liang, Hongda Li and Jinyong Chang
11:15 – 11:40 An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure PDF
Noboru Kunihiro
Invited Talk I (Chair: Tatsuaki Okamoto)
11:40 – 12:40 Advances in Authenticated Encryption
Phillip Rogaway
13:00 - 22:00 Excursion (Including Lunch and Dinner)
2015/11/25 (Wed)
08:30 - 8:45 Registration
Session: Protocol (Chair: Toru Nakanishi)
08:45 – 09:10 Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer PDF
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway and Björn Tackmann
09:10 – 09:35 Sound Proof of Proximity of Knowledge PDF
Serge Vaudenay
09:35 – 10:00 Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards PDF
Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto
10:00 - 10:20 Coffee Break
Session: Authenticated Encryption & Key Exchange
(Chair: Phillip Rogaway)
10:20 – 10:45 Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan
10:45 – 11:10 Full PRF-Secure Message Authentication Code based on Tweakable Block Cipher
Yusuke Naito
11:10 – 11:25 Efficient Key Authentication Service for Secure End-to-end Communications PDF
Mohammad Etemad and Alptekin Küpçü
11:25 – 11:40 PPAE : Practical Parazoa Authenticated Encryption family PDF
Donghoon Chang, Sumesh Manjunath R and Somitra Kumar Sanadhya
Invited Talk II (Chair: Man Ho Allen)
11:40 – 12:40 New Advances in Secure RAM Computation
Sanjam Garg
12:40 - 13:50 Lunch
Session: Encryption & Identification (Chair: Wen-Guey Tzeng)
13:50 – 14:15 Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach PDF
Xu Yang, Wei Wu, Joseph Liu and Xiaofeng Chen
14:15 – 14:40 Reset-Secure Identity-Based Identification Schemes without Pairings PDF
Ji-Jian Chin, Hiroaki Anada and Syh-Yuan Tan
14:40 – 15:05 Attribute-based Encryption Leakage Resilient to Auxiliary Input PDF
Zhiwei Wang and Siu Ming Yiu
15:05 – 15:30 Functional Signcryption: Notion, Construction, and Applications PDF
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay
15:30 - 15:50 Coffee Break
Session: Privacy and Cloud (Chair: Joseph Liu)
15:50 – 16:15 BetterTimes: Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields PDF
Per Hallgren, Martín Ochoa and Andrei Sabelfeld
16:15 – 16:40 Provably Secure Identity based Provable Data Possession PDF
Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo and Hongyu Liu
16:40 – 16:55 Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries PDF
Sumit Kumar Debnath and Ratna Dutta
16:55 – 17:10 A Formal Dynamic Verification of Choreographed Web Services Conversations PDF
Karim Dahmani, Mahjoub Langar and Riadh Robbana
17:10 – 17:25 Efficient Unconditionally Secure Comparison and Private Preserving Machine Learning Classification Protocols PDF
Bernardo David, Rafael Dowsley, Raj Katti and Anderson Nascimento
19:00 - 21:00 Banquet
2015/11/26 (Thu)
08:30 - 8:45 Registration
Session: Leakage-Resilient Cryptography & Lattice Cryptography
(Chair: Sanjam Garg)
08:45 – 09:10 Attribute-Based Encryption for Finite Automata from LWE
Xavier Boyen and Qinyi Li
09:10 – 09:35 On Provable Security of wPRF-based Leakage-Resilient Stream Ciphers
Maciej Skórski
09:35 – 10:00 Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders PDF
Katsuyuki Takashima and Atsushi Takayasu
10:00 - 10:20 Coffee Break
Session: Signature & Broadcast Encryption (Chair: Shoichi Hirose)
10:20 – 10:45 Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model PDF
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao and Yunlei Zhao
10:45 – 11:10 Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes PDF
David Derler and Daniel Slamanig
11:10 – 11:25 Unique Signature with Short Output from CDH Assumption PDF
Shiuan-Tzuo Shen, Amir Rezapour and Wen-Guey Tzeng
11:25 – 11:40 Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage PDF
Yohei Watanabe and Junji Shikata
Invited Talk III (Chair: Atsuko Miyaji)
11:40 – 12:40 On Privacy for RFID PDF
Serge Vaudenay
12:40 - Closing