Accepted Papers
8: A Deterministic Algorithm for Computing Divisors in an Interval
Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang and Lei Hu
15: Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard Heys
20: Forward Secure Linkable Ring Signatures
Thomas Haines and Xavier Boyen
25: Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing
Yan Xu, Ran Ding, Jie Cui and Hong Zhong
27: Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08
Haoyu Li, Renzhang Liu, Abderrahmane Nitaj and Yanbin Pan
30: Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
Ziyuan Hu, Shengli Liu, Kefei Chen and Joseph K. Liu
31: Secure Contactless Payment
Handan Kilinc and Serge Vaudenay
33: New Iterated RC4 Key Correlations
Ryoma Ito and Atsuko Miyaji
37: Automatically Identifying Security Bug Reports via Multitype Features Analysis
Deqing Zou, Zhijun Deng, Zhen Li and Hai Jin
39: Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing
Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen and Mingwu Zhang
40: Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
Jintai Ding, Scott Fluhrer and Saraswathy Rv
43: Efficient Decryption Algorithms for EFC Type Encryption Schemes
Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong and Tsuyoshi Takagi
47: A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Ye Chen-Dong and Tian Tian
48: Fast Lottery-based Micropayments for Decentralized Currencies
Kexin Hu and Zhenfeng Zhang
51: Differential Attacks on Reduced Round LILLIPUT
Nicolas Marriere, Valerie Nachef and Emmanuel Volte
53: Bounds on the Differential and Linear Branch Number of Permutations
Sumanta Sarkar and Habeeb Syed
56: Private Functional Signatures: Definition and Construction
Shimin Li, Bei Liang and Rui Xue
59: Z-Channel: Scalable and Efficient Scheme in Zerocash
Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu and Dawu Gu
62: Reusable Fuzzy Extractor from LWE
Yunhua Wen and Shengli Liu
69: Revisiting the Incentive Mechanism of Bitcoin-NG
Jiayuan Yin, Changren Wang, Zongyang Zhang and Jianwei Liu
74: A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et.al.'s Construction
Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim and Jong Chan Lee
76: Keyed Sponge with Prefix-Free Padding: Independence between Capacity and Online Queries without the Suffix Key
Yusuke Naito
86: Decentralized Blacklistable Anonymous Credentials with Reputation
Rupeng Yang, Man Ho Au, Qiuliang Xu and Zuoxia Yu
87: Lattice-Based Universal Accumulator with Efficient Zero-Knowledge Arguments
Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai and Qiuliang Xu
90: A Practical Privacy Preserving Protocol in Database-driven Cognitive Radio Networks
Yali Zeng, Li Xu, Xu Yang and Qikui Xu
93: TDDAD: Time-based Detection and Defense Scheme Against DDoS Attack on SDN Controller
Jie Cui, Jiantao He, Yan Xu and Hong Zhong
96: Lattice-Based Dual Receiver Encryption and More
Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue and Jie Li
101: Linkable Group Signature for Auditing Anonymous Communication
Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He and Jianwei Liu
103: Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model
Qiqi Lai, Bo Yang, Yong Yu, Chen Yuan and Liju Dong
104: 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David, Rafael Dowsley and Mario Larangeira
106: Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada and Koji Chida
110: Auditable Hierarchy-private Public-key Encryption
Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng and Jianwei Liu
113: Key-updatable Public-key Encryption with Keyword Search: Models and Generic Constructions
Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki and Yohei Watanabe
116: Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems
Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou and Mingwu Zhang
124: Post-Quantum Secure Confidential Transactions (Lattice RingCT v1.0)
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph Liu, Nandita Bhattacharjee, Man Ho Au and Jacob Cheng
126: Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
Eunkyung Kim, Hyang-Sook Lee and Jeongeun Park
127: Anonymous Identity-Based Encryption with Identity Recovery
Xuecheng Ma, Xin Wang and Dongdai Lin
128: Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties
Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen and Hofung Leung
130: Asymmetric Subversion Attacks on Signature Schemes
Chi Liu, Rongmao Chen, Yi Wang and Yongjun Wang
131: Robust Multiparty Computation with Faster Verification Time
Souradyuti Paul and Ananya Shrivastava
135: New Attacks and Secure Design for Anonymous Distance-Bounding
Ahmad Ahmadi, Reihaneh Safavi-Naini and Mamunur Akand
short paper
38: Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing
Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst
114: CRT-KPS And Variants : Resilient Key Predistribution Schemes For (Low Cost) Networks Using CRT
Pinaki Sarkar, Mayank Baranwal and Sukumar Nandi
46: Live Path CFI Against Control Flow Hijacking Attacks
Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen and Jingling Xue
92: ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps
Yeali Sun, Shun-Wen Hsiao and Meng Chang Chen
99: Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-Encryption from Indistinguishability Obfuscation
Junzuo Lai, Zhengan Huang, Man Ho Au and Xianping Mao
107: Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction
Xingye Lu, Zhenfei Zhang and Man Ho Au
67: Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang and Kai Zhang
21: Revocable certificateless encryption with ciphertext evolution
Yinxia Sun, Futai Zhang and Anmin Fu
28: A New Encryption Scheme Based on Rank Metric Codes
Terry S. C. Lau and Chik How Tan
83: Improving the BKZ Reduction Algorithm by Quick Reordering Technique
Yuntao Wang and Tsuyoshi Takagi