Accepted Papers
Foundation of Applied Cryptography
-
Mihir Bellare (University of California, San Diego, USA), Adam O'Neill* (Georgetown University), and Igors Stepanovs (University of California, San Diego, USA).
-
Forward-Security under Continual Leakage
[ePrint]
-
Jose Becerra,
Vincenzo Iovino,
Dimiter Ostrev,
Petra Sala (U. Luxembourg and L'Ecole normale superieure)
and Marjan Skrobot* (all others: University of Luxembourg).
-
Tightly-Secure PAK(E)
[ePrint]
Predicate Encryption
-
Jonathan Katz (University of Maryland, USA),
Matteo Maffei (TU Wien: Vienna University of Technology, Austria),
Giulio Malavolta*, and Dominique Schroeder (Friedrich-Alexander-Universiat Erlangen-Nurnberg, Germany).
-
Subset Predicate Encryption, and Its Applications
-
Tim R. van de Kamp*, Andreas Peter (University of Twente, Netherlands), Maarten Everts
(TNO, Netherlands)
and Willem Jonker (University of Twente, Netherlands).
-
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
[GitHub]
Processing Encrypted Data
-
Lihua Wang*, Yoshinori Aono, and Le Trieu Phong (National Institute of Information and Communications Technology, Japan).
-
A New Secure Matrix Multiplication from Ring-LWE
-
Angela Jäschke*, and Frederik Armknecht (University of Mannheim, Germany).
-
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
(Short Paper)
[ePrint]
Queries to Encrypted Data
-
Matteo Maffei (TU Wien: Vienna University of Technology, Austria),
Manuel Reinert (CISPA, Saarland University, Germany)*, and Dominique Schroeder (Friedrich-Alexander-Universiat Erlangen-Nurnberg, Germany).
-
On the Security of Frequency-Hiding Order-Preserving Encryption
-
Daniel Demmler*,
Kay Hamacher, Thomas Schneider, and Sebastian Stammler (TU Darmstadt, Germany).
-
Privacy-Preserving Whole-Genome Variant Queries
Query Privacy
-
Elena Pagnin*, Jing Liu, and Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden).
-
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are you Private Enough?
-
Daniele E. Asoni*, Samuel Hitz, and Adrian Perrig (ETH Zurich).
-
A Paged Domain Name System for Query Privacy
Signatures and Credentials
-
Xavier Bultel (Universite d'Auvergne, France), and Pascal Lafourcade* (Universite Clermont Auvergne, France).
-
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
[ePrint]
-
Stephan Krenn*, Thomas Lorünser, Anja Salzer, and Christoph Striecks (Austrian Institute of Technology, Vienna).
-
Towards Attribute-Based Credentials in the Cloud
[Abstract,
Tweet]
Bitcoin and Blockchain
-
Indra Deep Mastan (Indian Institute of Technology Gandhinagar), and Souradyuti Paul* (Indian Institute of Technology Bhilai).
-
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
-
Christos Patsonakis*, Katerina Samari (National and Kapodistrian University of Athens, Greece), Aggelos Kiayias (The University of Edinburgh, UK), and Mema Roussopoulos (University of Athens).
-
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
Anonymous and Virtual Private Networks
-
Nethanel Gelernter (College of Management Academic Studies, Israel), Amir Herzberg, and Hemi Leibowitz* (Bar Ilan University, Israel).
-
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
[ePrint, GitHub]
-
Qi Zhang*, Juanru Li, Yuanyuan Zhang, Hui Wang, and Dawu Gu (Shanghai Jiao Tong University, China).
-
Oh-Pwn-VPN! Security Analysis of OpenVPN-based Android Apps
Embedded System Security
-
Wei Feng*, Yu Qin, Shijun Zhao, and Dengguo Feng (Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, China).
-
Secure Code Updates for Smart Embedded Devices based on PUFs
[ePrint]
-
Tomer Ashur,
Jeroen Delvaux,
Sanghan Lee (The Attached Institute of ETRI, South Korea),
Pieter Maene*,
Eduard Marin,
Svetla Nikova,
Oscar Reparaz,
Vladimir Rozic,
Dave Singelee, Bohan Yang, and
Bart Preneel (all others: imec-COSIC KU Leuven, Belgium).
-
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
Visual Context for Security
-
Marcus Niemietz*, and Jörg Schwenk (Horst Gortz Institute for IT-Security, Chair for Network and Data Security, Ruhr-University Bochum).
-
Out of the Dark: UI Redressing and Trustworthy Events
[Abstract, Tweet]
-
Jack Sturgess*, and Ivan Martinovic (University of Oxford, UK).
-
VisAuth: Authentication over a Visual Channel using an Embedded Image
(Short Paper)
Wireless and Physical Layer Security
-
Daniele Antonioli*, Sandra Siby, and
Nils Ole Tippenhauer (Singapore University of Technology and Design).
-
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
[Abstract]
-
Mohammad Hossein Chinaei* (University of New South Wales, Sydney, Australia), Diethelm Ostry (Data61, CSIRO), and Vijay Sivaraman (University of New South Wales).
-
A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems
Attribute-Based Cryptography
-
Baodong Qin*,
Dong Zheng (Xi'an University of Posts and Telecommunications, China),
Qinglan Zhao (Shanghai Jiao Tong University, China),
Hui Cui (RMIT University, Australia)
-
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
(Short Paper)
-
Suvradip Chakraborty* (IIT Madras, India),
Y. Sreenivasa Rao (IIIT D&M Kurnool, India), and
Chandrasekaran Pandurangan (IIT Madras, India).
-
An Efficient Attribute-Based Authenticated Key Exchange Protocol
(Short Paper)
Network Security
-
Robert Annessi*, Tanja Zseby, and Joachim Fabini (TU Wien: Vienna University of Technology, Austria).
-
A New Direction for Research on Data Origin Authentication in Group Communication
(Short Paper)
-
Frederik Möllers* (CISPA, Saarland University, Germany),
Stephanie Vogelgesang (Ministry of Justice, Saarland, Germany),
Jochen Krüger (CISPA, Saarland University), Isao Echizen (National Institute of Informatics, Japan), and Christoph Sorge (CISPA, Saarland University).
-
Modelling Traffic Analysis in Home Automation Systems
(Short Paper)
[Tweet]
Another Look
-
Sharmila Deva Selvi S, Arinjita Paul*, and Chandrasekaran Pandurangan (Indian Institute of Technology Madras, Chennai, India).
-
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
(Short Paper)
-
Mayur Punekar, Qutaibah Malluhi (Qatar University, Qatar), Yvo Desmedt* (The University of Texas at Dallas, USA), and Yongee Wang (UNC Charlotte, USA).
-
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
(Short Paper)
If any of your online presence has linked to CANS 2017, drop us a message and we will add a link back!
The accepted papers have appeared in the proceedings published by Springer.