The 13th International Conference on Information Security and Cryptology
(INSCRYPT 2017)

November 3-5, 2017, Xi'an, China


Sponsored by












Program



Nov 2, 2017
Registration
14:00-21:00
Nov 3, 2017 HuaE Palace
Opening
08:30-09:00
Keynote 1
09:00-10:00
On Crossroads of Privacy Protection
Mirosław Kutyłowski, Wroclaw University of Science and Technology, Poland
Coffee Break
10:00-10:20
Session 1:
10:20-12:00
10:20-10:45 State-of-the-Art: Security Competition in Talent Education
Xiu Zhang
10:45-11:10 NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries
Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li and Dawu Gu
11:10-11:35 A New Lattice Sieving Algorithm Base On Angular Locality-sensitive Hashing
Ping Wang and Dongdong Shang
11:35-12:00 Hashing into Twisted Jacobi Intersection Curves
Xiaoyang He, Wei Yu and Kunpeng Wang
Lunch
12:00-14:00
Keynote 2
14:00-15:00
Security and Privacy in the IoT
Elisa Bertino, Purdue University, United States
Session 2
15:00-16:15
15:00-15:25 A Game-based Framework towards Cyber-Attacks on State Estimation in ICSs
Cong Chen, Dongdai Lin, Wei Zhang and Xiaojun Zhou
15:25-15:50 BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces
Biao Qi, Zhixin Shi and Jianguo Jiang
15:50-16:15 Meet in the Middle Attack on Type-1 Feistel Construction
Yuanhao Deng, Chenhui Jin and Rongjia Li
Coffee Break
16:15-16:35
Session 3
16:35-17:50
16:35-17:00 Parallel Long Messages Encryption Scheme based on Certificateless Cryptosystem for Big Data
Xuguang Wu
17:00-17:25 Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size
Geng Wang, Xiao Zhang and Yanmei Li
17:25-17:50 Post-quantum secure remote password protocol from RLWE problem
Xinwei Gao, Jintai Ding, Jiqiang Liu and Jin Li
Banquet
17:50-20:00
Nov 4 , 2017 HuaE Palace
Keynote 3
08:30-09:30
Generic and Efficient Lattice-Based Key Exchange from Key Consensus with Noise
Yunlei Zhao, Fudan University, China
Session 4
09:30-10:20
09:30-09:55 Cryptanalysis of Acorn in Nonce-reuse Setting
Xiaojuan Zhang and Dongdai Lin
09:55-10:20 Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling
Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma and Fushan Wei
Coffee Break
10:20-10:40
Session 5
10:40-11:55
10:40-11:05 Identity-Based Key-Insulated Aggregate Signatures, Revisited
Kitajima Nobuaki, Naoto Yanai and Takashi Nishide
11:05-11:30 Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme
Xiaodong Yang and Caifen Wang
11:30-11:55 A Universal Designated Multi-Verifiers Transitive Signature Scheme
Fei Zhu, Yuexin Zhang, Chao Lin and Wei Wu
Lunch
11:55-14:00
Keynote 4
14:00-15:00
AI-Driven Cyber Security
Yang Xiang, Swinburne University of Technology, Australia
Session 6
15:00-16:15
15:00-15:25 A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes
Shanding Xu, Xiwang Cao and Chunming Tang
15:25-15:50 Leveled FHE with Matrix Message Space
Biao Wang, Xueqing Wang and Rui Xue
15:50-16:15 Influence of Error and Hamming Weights on ASCA
Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu and Waldemar Cruz
Coffee Break
16:15-16:35
Session 7
16:35-18:15
16:35-17:00 Implementing Indistinguishability Obfuscation Using GGH15
Zheng Zhang, Fangguo Zhang and Huang Zhang
17:00-17:25 A Modified Fuzzy Fingerprint Vault based on Pair-Polar Minutiae Structures
Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan and Siyun Yan
17:25-17:50 Predicate Fully Homomorphic Encryption: Achieving Fine-grained Access Control over Manipulable Ciphertext
Hanwen Feng, Jianwei Liu, Qianhong Wu and Weiran Liu
17:50-18:15 Bypassing Black-box Lower-bounds: From Attack on Feige-Shamir to Construction of Oblivious Transfer
Jingyue Yu, Yi Deng and Yu Chen
Dinner
18:15-20:00
Nov 5 , 2017 HuaE Palace
Keynote 5
08:30-09:30
The Dual Role of Smartphones in IoT Security
Kui Ren, University at Buffalo, United States
Session 8
09:30-10:20
09:30-09:55 NOR: Towards Non-intrusive, Real-time and OS-agnostic Introspection for Virtual Machines in Cloud Environment
Chonghua Wang, Zhiyu Hao and Xiaochun Yun
09:55-10:20 A Simpler Bitcoin Voting Protocol
Haibo Tian, Liqing Fu and Jiejie He
Coffee Break
10:20-10:40
Session 9
10:40-11:55
10:40-11:05 An improved method to unveil malware’s hidden behavior
Qiang Li, Yunan Zhang, Yang Wu, Liya Su, Xinjian Ma and Zeming Yang
11:05-11:30 A New Constant-size Accountable Ring Signature Without Random Oracles
Sudhakar Kumawat and Souradyuti Paul
11:30-11:55 Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing
Liquan Chen, Ming Lim and Muyang Wang
Lunch
11:55-14:00

The 13th International Conference on Information Security and Cryptology (INSCRYPT 2017)
Copyright © 2016-2017 INSCRYPT 2017. All rights reserved.