ProvSec 2017
The 11th International Conference on Provable Security

October 23 - 25,2017,Xi'an,China

                                                                                    ProvSec 2017 Program


                                                              22nd Oct 2017

  14:00-22:00

                Registration

               Jiyuan International Hotel

                                                              23rd Oct 2017

    8:30-9:30

                           Opening and Group Photo

                                                              Keynote Speech 1
                                                  Session Chair: Tatsuaki Okamoto

   9:30-10:30

Title: Computations on Encrypted Data and Privacy
Speaker: David Pointcheval

   10:30-10:50

Tea Break

                                                                   Invited Talk 1
                                                                 Session Chair:

  10:50-11:40

Title:
Speaker: Willy Susilo

                                                                   Invited Talk 2
                                                                 Session Chair:

  11:40-12:30

Title:
Speaker: Man Ho Allen Au

  12:30-14:00

Lunch Buffet

Session 1. Public Key Encryption and Signcryption
Session Chair:




  14:00-14:25

Provable Secure Constructions for Broadcast Encryption with Personalized  Messages

KamaleshAcharya

(IIT KHARAGPUR, India)

Ratna Dutta

(IIT KHARAGPUR, India)






  14:25-14:50

Provably Secure Homomorphic Signcryption

Fatemeh  Rezaeibagha

(University of Wollongong ,Australia)

Yi  Mu

(University of Wollongong ,Australia)

Shiwei  Zhang

(University of Wollongong ,Australia)

Xiaofen  Wang

(University of Electronic Science and Technology of China ,China)

 


  14:50-15:15

Natural sd-RCCA secure Public-key encryptions

Yuan Chen

(Xidian University ,China)

Qingkuan Dong

(Xidian University ,China)

Qiqi Lai

(Shaanxi Normal University ,China)

 

 

  15:15-15:40

Homomorphic Secret Sharing from Paillier Encryption

Nelly Fazio

(City College of New York ,United States)

Rosario Gennaro

(City College of New York ,United States)

Tahereh Jafarikhah

(City College of New York ,United States)

William Skeith

(City College of New York ,United States)

15:40-16:00

Tea break

Session 2. Proxy Re-encryption and Functional Encryption
Session Chair:

 


  16:00-16:25

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing

Sharmila Deva Selvi S

(Indian Institute of Technology Madras ,India)

Arinjita  Paul

(Indian Institute of Technology Madras ,India)

Chandrasekaran  Pandurangan

(Institute of Technology Madras ,India)

 

  16:25-16:50

Mergeable Functional Encryption

Vincenzon  Iovino

(University of Luxembourg ,Luxembourg)

Karol  Zebrowski

(University of Warsaw ,Poland)

Session 3. Security Protocols
Session Chair:

 


 

  16:50-17:15

Private Subgraph Matching Protocol

Zifeng  Xu

(Northeastern University ,China)

Fucai  Zhou

(Northeastern University ,China)

Yuxi  Li

(Northeastern University ,China)

Jian  Xu

(Northeastern University ,China)

Qiang  Wang

(Northeastern University ,China)

 

 

  17:15-17:40

A New Blockchain-based Value-Added Tax System

Dimaz  Ankaa  Wijaya

(Monash University ,Australia)

Joseph K.  Liu

(Monash University ,Australia)

Dony  Suwarsono

(Directorate General of Taxes ,Indonesia)

Peng  Zhang

(Shenzhen University ,China)

 

 

 

  17:40-18:05

Verifiable Private Polynomial Evaluation

Xavier  Bultel

(Universit茅 Clermont Auvergne ,France)

Manik Lal  Das

(DA-IICT ,India)

Hardik  Gajera

(DA-IICT ,India)

David  Gerault

(Universit茅 Clermont Auvergne ,France)

Matthieu  Giraud

(Universit茅 Clermont Auvergne ,France)

Pascal  Lafourcade

(Universit茅 Clermont Auvergne ,France)

       18:30

Banquet

                                                              24th Oct 2017

                                                           Keynote Speech 2
                                                       Session Chair: Yong Yu


    8:30-9:30

Title: Editing the Immutable Blockchain
Speaker: Giuseppe Ateniese

                                                               Invited Talk 3
                                                      Session Chair: Willy Susilo


   9:30-10:20

Title: Adversarial signal processing: a game-theoretic framework
Speaker: Mauro Barni

  10:20-10:40

Tea break

Session 4. Secure Cloud Computing
Session Chair:

 

 


  10:40-11:05

Provably Secure Self-Extractable Encryption

Zhi Liang

(Beihang University, China)

Qianhong Wu

(Beihang University, China)

Weiran  Liu

(Beihang University, China)

Jianwei Liu

(Beihang University, China)

Fu Xiao

(Nanjing University of Posts and Telecommunications, China)

 

 

 


  11:05-11:30

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption

Yunling  Wang

(Xidian University ,China)

Jianfeng  Wang

(Xidian University ,China)

Shifeng  Sun

(Monash University ,Australia)

Joseph  K.   Liu

(Monash University ,Australia)

Willy  Susilo

(University of Wollongong ,Australia)

Xiaofeng  Chen

(Xidian University ,China)

 

 


 

  11:30-11:55

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups

Ru  Meng

(Shaanxi Normal University ,China)

Kaitai  Liang

(Manchester Metropolitan University ,United Kingdom)

Jianting  Ning

(National University of Singapore ,Singapore)

Jinguang  Han

(University of Surrey ,United Kingdom)

Willy  Susilo

(University of Wollongong ,Australia)

Yanwei  Zhou

(Shaanxi Normal University ,China)

 

 


  11:55-12:20

Secure Multi-label Classification over Encrypted Data in Cloud

Yang Liu

(Nanjing University of Aeronautics and Astronautics ,China)

Xingxin Li

(Nanjing University of Aeronautics and Astronautics ,China)

Youwen Zhu

(Nanjing University of Aeronautics and Astronautics ,China)

Jian Wang

(Nanjing University of Aeronautics and Astronautics ,China)

Zhe Liu

(Nanjing University of Aeronautics and Astronautics ,China)

  12:20-14:00

Lunch Buffet

                                                              Invited Talk 4
                                                             Session Chair:


  14:00-14:50

Title:(Linkable) Ring Signature and its Applications to Blockchain
Speaker: Joseph Liu

Session 5. Authenticated Encryption and Key Exchange
Session Chair:

 

 


 

  14:50-15:15

INT-RUP Security of Checksum-based Authenticated Encryption

Ping  Zhang

(University of Science and Technology of China ,China)

Peng  Wang

(Institute of Information Engineering of Chinese Academy of Sciences ,China)

Honggang  Hu

(University of Science and Technology of China ,China)

Changsong  Chen

(The Third Research Institute of Ministry of Public Security ,China)

Wenke  Kuai

(State Grid Anhui Electric Power Company ,China)

 

 

  15:15-15:40

Leakage-Resilient Non-Interactive Key Exchange in the Continuous-Memory Leakage Setting

Suvradip  Chakraborty

(Indian Institute of Technology Madras ,India)

Janaka  Alawatugoda

(University of Peradeniya ,Sri Lanka)

C Pandu  Rangan

(Institute of Technology Madras ,India)

  15:40-16:00

Tea break

Session 6. Lattice and Post-quantum Cryptography
Session Chair:


 

  16:00-16:25

Provable Secure Signature Scheme based on Isomorphism of Polynomials in Quantum Random Oracle Model

Bagus  Santoso

(University of Electro-Communications, Japan)

Chunhua  Su

(University of Aizu, Japan)

 


  16:25-16:50

Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts within Polynomial Noise

Long  Chen

(Chinese Academy of Sciences ,China)

Zhenfeng  Zhang

(Chinese Academy of Sciences ,China)

 

 

  16:50-17:15

Revocable Predicate Encryption from Lattices

San  Ling

(Nanyang Technological University, Singapore)

Khoa  Nguyen

(Nanyang Technological University, Singapore)

Huaxiong  Wang

(Nanyang Technological University, Singapore)

Juanyang  Zhang

(Nanyang Technological University, Singapore)

Session 7. Security Models
Session Chair:


 

  17:15-17:40

Impossibility of the Provable Security of the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model

Masayuki Fukumitsu

(Hokkaido Information University, Japan)

Shingo  Hasegawa

(Tohoku University, Japan)


  17:40-18:05

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem

Fangguo  Zhang

(Sun Yat-sen University ,China)

 

 

  18:05-18:30

Public-Key Encryption with Simulation-Based Sender Selective-Opening Security

Dali Zhu

(University of Chinese Academy of Sciences, China)

Renjun  Zhang

(University of Chinese Academy of Sciences, China)

Dingding  Jia

(University of Chinese Academy of Sciences, China)

       18:30

Dinner Buffet

                                                               25th Oct 2017

Session 8. Short Papers
Session Chair:

 


    8:30-8:50

Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions

Ahto  Buldas

(Tallinn University of Technology, Estonia)

Matthias  Geihs

(TU Darmstadt, Germany)

Johannes   Buchmann

(TU Darmstadt, Germany)

 

 


    8:50-9:10

Fuzzy Public-Key Encryption Based on Biometric Data

Hui Cui

(Royal Melbourne Institute of Technology, Australia)

Man Ho Au

(The Hong Kong Polytechnic University, Hong Kong)

Baodong Qin

(Xi'an University of Posts and Telecommunications, China)

Xun Yi

(Royal Melbourne Institute of Technology, Australia)

Robert.H Deng

(Singapore Management University, Singapore)

 

 

    9:10-9:30

On the Hardness of Sparsely Learning Parity with Noise

Hanlin Liu

(Shanghai JiaoTong University ,China)

Di Yan

(Shanghai JiaoTong University ,China)

Yu Yu

(Shanghai JiaoTong University ,China)

Shuoyao Zhao

(Shanghai JiaoTong University ,China)

 

 


    9:30-9:50

A Secure Cloud Backup System with Deduplication and Assured Deletion

Junzuo  Lai

(Jinan University ,China)

Jie  Xiong

(Jinan University ,China)

Chuansheng  Wang

(Jinan University ,China)

Guangzheng  Wu

(Jinan University ,China)

Yanling  Li

(Jinan University ,China)

 

 

   9:50-10:10

New framework of Password-based Authenticated Key Exchange from Only-one Lossy Encryption

Haiyang Xue

(Chinese Academy of Sciences, China)

Bao  Li

(Chinese Academy of Sciences, China)

Jingnan  He

(Chinese Academy of Sciences, China)

  10:10-10:30

Tea break

Session 9. Digital Signatures and Authentication
Session Chair:

 

 

 

  10:30-10:55

Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures

Gunnar  Hartung

(Karlsruhe Institute of Technology (KIT),Germany)

Bj枚rn    Kaidel

(Karlsruhe Institute of Technology (KIT),Germany)

Alexander  Koch

(Karlsruhe Institute of Technology (KIT),Germany)

Jessica   Koch

(Karlsruhe Institute of Technology (KIT),Germany)

Dominik  Hartmann

(Karlsruhe Institute of Technology (KIT),Germany)

 


  10:55-11:20

Verifiably Encrypted Group Signatures

Zhen Wang

(Beihang University, China)

Xiling Lou

(Beihang University, China)

Qianhong Wu

(Beihang University, China)

  11:20-11:45

Deniable Ring Authentication based on Projective Hash Functions

Shengke Zeng

(Xihua University ,China)

Yi Mu

(University of Wollongong ,Australia)

Guomin  Yang

(University of Wollongong ,Australia)

Mingxing  He

(Xihua University ,China)

  11:45-12:00

Closing

  12:00-14:00

Lunch Buffet






2016-2017 All Rights Rreserved.