ACNS2017 Program

July 10 2017 (Mon) - 12 presentations


09:00 - 09:50 Registration
09:50 - 10:00 Welcoming Remarks
10:00 - 11:40 Session I: Applied cryptography   Chair: Dieter

Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

Carlos Aguilar-Melchor, Martin Albrecht and Thomas Ricosset

 

Simple Security Definitions for and Constructions of 0-RTT Key Exchange

Britta Hale, Tibor Jager, Sebastian Lauer and Jörg Schwenk

 

TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF

Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu

 

Secure and Efficient Pairing at 256-bit Security Level

Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi and Tetsutaro Kobayashi

 

11:40 - 12:40 Invited talk (1)
12:40 - 13:50 Lunch
13:50 - 15:30 Session II: Data protection and Mobile security   Chair: Bhargavan

No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices

Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran

 

Are You Lying: Validating the Time-Location of Outdoor Images

Xiaopeng Li, Wenyuan Xu, Song Wang and Xianshan Qu

 

Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

Bruce Berg, Tyler Kaczmarek, Alfred Kobsa and Gene Tsudik

 

A Pilot Study of Multiple Password Interference between Text and Map-based Passwords

Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou

 

15:30 - 15:50 Coffee break
15:50 - 17:30 Session III: Security analysis   Chair: Zhou Jianying

Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security

Yi-Ruei Chen and Wen-Guey Tzeng

 

A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium

Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi and Marco Pedicini

 

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim and Gaoli Wang

 

Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables

Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez and Srinivas Vivek

 

18:00 - 22:00 Dinner (Wataya)


July 11 2017 (Tue) - 14 presentations


08:30 - 08:50 Open
08:50 - 10:05 Session IV: Cryptographic primitives 1   Chair: Stjepan Picek

An experimental study of the BDD approach for the search LWE problem

Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto and Henricksen Matt

 

Efficiently Obfuscating Re-Encryption Program under DDH Assumption

Akshayaram Srinivasan and Chandrasekaran Pandu Rangan

 

Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease

Yanhong Xu, San Ling, Khoa Nguyen and Huaxiong Wang

 

10:05 - 10:25 Coffee break
10:25 - 11:40 Session V: Side channel attack   Chair: Alan Sherman

Trade-offs for S-boxes: Cryptographic Properties and Side-channel Resilience

Claude Carlet, Annelie Heuser and Stjepan Picek

 

A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers

Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao and Yuan Ma

 

Side-Channel Attacks meet Secure Network Protocols

Alex Biryukov, Daniel Dinu and Yann Le Corre

 

11:40 - 12:40 Invited talk (2)
12:40 - 14:50 lunch and photo at Kenroku-en
14:50 - 16:30 Session VI: Cryptographic protocol 1   Chair: Mayberry Travis

Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes

Dan Boneh, Sam Kim and Valeria Nikolaenko

 

Forward-Secure Searchable Encryption on Labeled Bipartite Graphs

Russell W. F. Lai and Sherman S. M. Chow

 

Bounds in Various Generalized Settings of the Discrete Logarithm Problem

Jason Ying and Noboru Kunihiro

 

An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis

Sze Ling Yeo, Zhen Li, Khoongming Khoo and Yu Bin Low

 

16:30 - 16:50 Coffee break
16:50 - 18:30 Session VII: Data and server security   Chair: Shoichi Hirose

Accountable Storage

Giuseppe Ateniese, Michael Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas and Roberto Tamassia

 

Maliciously Secure Multi-Client ORAM

Matteo Maffei, Giulio Malavolta, Manuel Reinert and Dominique Schroeder

 

Legacy-Compliant Data Authentication for Industrial Control System Traffic

John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa

 

Multi-Client Oblivious RAM Secure Against Malicious Servers

Erik-Oliver Blass, Travis Mayberry and Guevara Noubir

 

19:30 - 21:30 Banquet (Tokyu hotel)


July 12 2017 (Wed) - 8 presentations


08:30 - 08:50 Open
08:50 - 10:30 Session VIII: Cryptographic primitives 2   Chair: Chandrasekaran Pandurangan

Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols

Ronghai Yang, Wing Cheong Lau and Shangcheng Shi

 

Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)

David Bernhard, Ngoc Khanh Nguyen and Bogdan Warinschi

 

More Efficient Construction of Bounded KDM Secure Encryption

Kaoru Kurosawa and Rie Habuka

 

Signature Schemes with Randomized Verification

Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran and Brent Waters

 

10:30 - 10:50 Coffee break
10:50 - 12:30 Session IX: Cryptographic protocol 2   Chair: S.M. Chow

SCRAPE: Scalable Randomness Attested by Public Entities

Ignacio Cascudo and Bernardo M. David

 

cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operations

David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De Ruiter and Alan T. Sherman

 

Almost Optimal Oblivious Transfer from QA-NIZK

Olivier Blazy, Céline Chevalier and Paul Germouty

 

OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks

Daniel Demmler, Marco Holz and Thomas Schneider

 

12:30 - 12:40 Closing