Program


November 29 (Wednesday)

17:30 - 19:30
(YIA Lobby)
Welcome Reception
Yasumoto International Academic Park (康本國際學術園)
Check our Facebook page for photos of the buildings.

November 30 (Thursday)

08:40 - 08:45
(YIA LT3)
Opening Remarks
08:45 - 09:45
(YIA LT3)
Session 1: Embedded System Security (Session Chair: Kehuan Zhang)
09:45 - 10:05 Coffee Break
10:05 - 11:05
(YIA LT3)
Keynote Talk 1 (Session Chair: Srđan Čapkun)
  • Hardware-Assisted Security: From PUF to SGX
  • Ahmad-Reza Sadeghi (Technische Universität Darmstadt, Germany)
11:15 - 12:15
(AIT G02: Main)
(WMY 404: Mirror)
CANS/ICITS Joint Invited Talk 1
  • Physical Assumptions for Long-term Secure Communication
  • Rei Safavi-Naini (University of Calgary, Canada)
11:15 - 12:15
(Outside YIA LT3)
Cryptography and System Security Research in CUHK (Informal Poster Presentation, Session Chair: Kehuan Zhang)
12:30 - 14:00 Lunch
14:15 - 14:30
(CYT Stair)
Group Photo
14:30 - 15:30
(CYT LT7)
Session 2: Anonymous and Virtual Private Networks (Session Chair: Ahmad-Reza Sadeghi)
  • Oh-Pwn-VPN! Security Analysis of OpenVPN-based Android Apps
  • Qi Zhang*, Juanru Li, Yuanyuan Zhang, Hui Wang, and Dawu Gu (Shanghai Jiao Tong University, China).
  • Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
  • Nethanel Gelernter (College of Management Academic Studies, Israel), Amir Herzberg, and Hemi Leibowitz* (Bar Ilan University, Israel).
15:30 - 15:50 Tea Break
15:50 - 16:50
(CYT LT7)
Session 3: Bitcoin and Blockchain (Session Chair: Yvo Desmedt)
  • A New Approach to Deanonymization of Unreachable Bitcoin Nodes
  • Indra Deep Mastan (Indian Institute of Technology Gandhinagar), and Souradyuti Paul* (Indian Institute of Technology Bhilai).
  • Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
  • Christos Patsonakis*, Katerina Samari^ (National and Kapodistrian University of Athens, Greece), Aggelos Kiayias (The University of Edinburgh, UK), and Mema Roussopoulos (University of Athens).
16:50 - 17:10 Tea Break
17:10 - 18:00
(CYT LT7)
Session 4: Visual Context for Security (Session Chair: Gerhard Hancke)
  • Out of the Dark: UI Redressing and Trustworthy Events
  • Marcus Niemietz*, and Jörg Schwenk (Horst Gortz Institute for IT-Security, Chair for Network and Data Security, Ruhr-University Bochum).
  • VisAuth: Authentication over a Visual Channel using an Embedded Image (Short Paper)
  • Jack Sturgess*, and Ivan Martinovic^ (University of Oxford, UK).
18:20 (CYT
Ground floor)
Pick-up for Banquet
19:00 - 21:30 Banquet: House of Canton (翰騰閣), Festival Walk, Kowloon Tong

December 01 (Friday)

09:15 - 10:15
(WMY 305)
Session 5: Wireless and Physical Layer Security (Session Chair: Ivan Martinovic)
  • Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
  • Daniele Antonioli*, Sandra Siby, and Nils Ole Tippenhauer (Singapore University of Technology and Design).
  • A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems
  • Mohammad Hossein Chinaei* (University of New South Wales, Sydney, Australia), Diethelm Ostry (Data61, CSIRO), and Vijay Sivaraman (University of New South Wales).
10:15 - 10:35 Coffee Break
10:35 - 11:15
(WMY 305)
Session 6: Network Security (Session Chair: Yuanyuan Zhang)
  • A New Direction for Research on Data Origin Authentication in Group Communication (Short Paper)
  • Robert Annessi*, Tanja Zseby, and Joachim Fabini (TU Wien: Vienna University of Technology, Austria).
  • Modelling Traffic Analysis in Home Automation Systems (Short Paper)
  • Frederik Möllers* (CISPA, Saarland University, Germany), Stephanie Vogelgesang (Ministry of Justice, Saarland, Germany), Jochen Krüger (CISPA, Saarland University), Isao Echizen (National Institute of Informatics, Japan), and Christoph Sorge (CISPA, Saarland University).
11:15 - 12:05
(WMY 305)
Session 7: Processing Encrypted Data (Session Chair: Qian Wang)
  • A New Secure Matrix Multiplication from Ring-LWE
  • Lihua Wang*, Yoshinori Aono, and Le Trieu Phong (National Institute of Information and Communications Technology, Japan).
  • (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation (Short Paper)
  • Angela Jäschke*, and Frederik Armknecht (University of Mannheim, Germany).
12:05 - 14:00 Lunch
14:00 - 15:00
(WMY 305)
Session 8: Queries to Encrypted Data (Session Chair: Miyako Ohkubo)
  • On the Security of Frequency-Hiding Order-Preserving Encryption
  • Matteo Maffei (TU Wien: Vienna University of Technology, Austria), Manuel Reinert* (CISPA, Saarland University, Germany), and Dominique Schroeder (Friedrich-Alexander-Universiat Erlangen-Nurnberg, Germany).
  • Privacy-Preserving Whole-Genome Variant Queries
  • Daniel Demmler*, Kay Hamacher, Thomas Schneider, and Sebastian Stammler* (TU Darmstadt, Germany).
15:00 - 15:20 Tea Break
15:20 - 16:20
(WMY 305)
Session 9: Query Privacy and Signature Privacy (Session Chair: Nico Döttling)
  • Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
  • Xavier Bultel (Universite d'Auvergne, France), and Pascal Lafourcade* (Universite Clermont Auvergne, France).
  • A Paged Domain Name System for Query Privacy
  • Daniele E. Asoni*, Samuel Hitz, and Adrian Perrig (ETH Zurich).
16:20 - 16:50 Tea Break
16:50 - 17:50
(WMY 301: main)
(WMY 305: mirror)
CANS/ICITS Joint Invited Talk 2
  • Secret Sharing Schemes: Some New Approaches and Problems
  • Huaxiong Wang (Nanyang Technological University, Singapore)

December 02 (Saturday)

09:10 - 09:50
(WMY 304)
Session 10: Another Look (Session Chair: Kwangjo Kim)
  • A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model (Short Paper)
  • Sharmila Deva Selvi S, Arinjita Paul, and Chandrasekaran Pandurangan* (Indian Institute of Technology Madras, Chennai, India).
  • Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin (Short Paper)
  • Mayur Punekar, Qutaibah Malluhi (Qatar University, Qatar), Yvo Desmedt* (The University of Texas at Dallas, USA), and Yongee Wang (UNC Charlotte, USA).
09:50 - 10:10 Coffee Break
10:10 - 11:10
(WMY 304)
Keynote Talk 2 (Session Chair: Sherman S.M. Chow)
  • Identity-Based Encryption from Standard Assumptions
    (or the unexpected virtue of garbled circuits)
  • Nico Döttling (Friedrich-Alexander-University Erlangen Nürnberg, Germany)
11:10 - 11:30 Coffee Break
11:30 - 12:30
(WMY 304)
Session 11: Predicate Encryption (Session Chair: Vincenzo Iovino)
  • Subset Predicate Encryption and Its Applications
  • Jonathan Katz (University of Maryland, USA), Matteo Maffei (TU Wien: Vienna University of Technology, Austria), Giulio Malavolta*, and Dominique Schroeder (Friedrich-Alexander-Universiat Erlangen-Nurnberg, Germany).
  • Multi-client Predicate-only Encryption for Conjunctive Equality Tests
  • Tim R. van de Kamp*, Andreas Peter (University of Twente, Netherlands), Maarten Everts (TNO, Netherlands), and Willem Jonker (University of Twente, Netherlands).
12:30 - 13:40 Lunch
13:40 - 14:20
(WMY 304)
Session 12: Attribute-Based Cryptography (Session Chair: Yongjun Zhao)
  • An Efficient Attribute-Based Authenticated Key Exchange Protocol (Short Paper)
  • Suvradip Chakraborty (IIT Madras, India), Y. Sreenivasa Rao (IIIT D&M Kurnool, India), and Chandrasekaran Pandurangan* (IIT Madras, India).
  • Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure (Short Paper)
  • Baodong Qin, Dong Zheng (Xi'an University of Posts and Telecommunications, China), Qinglan Zhao (Shanghai Jiao Tong University, China), Hui Cui (RMIT University, Australia).
14:20 - 15:20
(WMY 304)
Session 13: Credentials and Authentication (Session Chair: Masayuki Abe)
  • Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are you Private Enough?
  • Elena Pagnin*, Jing Liu, and Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden).
  • Towards Attribute-Based Credentials in the Cloud
  • Stephan Krenn*, Thomas Lorünser, Anja Salzer, and Christoph Striecks (Austrian Institute of Technology, Vienna).
15:20 - 15:40 Tea Break
15:40 - 16:40
(WMY 304)
Session 14: Foundation of Applied Cryptography (Session Chair: Tatsuaki Okamoto)
  • Forward-Security under Continual Leakage
  • Mihir Bellare (University of California, San Diego, USA), Adam O'Neill* (Georgetown University, USA), and Igors Stepanovs (University of California, San Diego).
  • Tightly-Secure PAK(E)
  • Jose Becerra^, Vincenzo Iovino^, Dimiter Ostrev, Petra Sala^ (U. of Luxembourg and L'Ecole normale superieure), and Marjan Skrobot* (all: University of Luxembourg).
16:40 - 16:45
(WMY 304)
Closing Remarks

Regular talk: 30 mins. Short talk: 20 mins. (Q&A included)

* marked the tentative presenting author. ^ marked as non-presenting participants. Please email Sherman S.M. Chow for any update.

YIA: Yasumoto International Academic Park | AIT: An Integrated Teaching Building | WMY: Wu Ho Man Yuen Building | CYT: Cheng Yu Tung Building

Like/Follow our Facebook page for latest updates.