23rd Australasian Conference on Information Security and Privacy
July 11-13, 2018, Wollongong, Australia

Accepted Papers

8: A Deterministic Algorithm for Computing Divisors in an Interval

Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang and Lei Hu

15: Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)

Howard Heys

20: Forward Secure Linkable Ring Signatures

Thomas Haines and Xavier Boyen

25: Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing

Yan Xu, Ran Ding, Jie Cui and Hong Zhong

27: Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08

Haoyu Li, Renzhang Liu, Abderrahmane Nitaj and Yanbin Pan

30: Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem

Ziyuan Hu, Shengli Liu, Kefei Chen and Joseph K. Liu

31: Secure Contactless Payment

Handan Kilinc and Serge Vaudenay

33: New Iterated RC4 Key Correlations

Ryoma Ito and Atsuko Miyaji

37: Automatically Identifying Security Bug Reports via Multitype Features Analysis

Deqing Zou, Zhijun Deng, Zhen Li and Hai Jin

39: Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing

Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen and Mingwu Zhang

40: Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage

Jintai Ding, Scott Fluhrer and Saraswathy Rv

43: Efficient Decryption Algorithms for EFC Type Encryption Schemes

Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong and Tsuyoshi Takagi

47: A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers

Ye Chen-Dong and Tian Tian

48: Fast Lottery-based Micropayments for Decentralized Currencies

Kexin Hu and Zhenfeng Zhang

51: Differential Attacks on Reduced Round LILLIPUT

Nicolas Marriere, Valerie Nachef and Emmanuel Volte

53: Bounds on the Differential and Linear Branch Number of Permutations

Sumanta Sarkar and Habeeb Syed

56: Private Functional Signatures: Definition and Construction

Shimin Li, Bei Liang and Rui Xue

59: Z-Channel: Scalable and Efficient Scheme in Zerocash

Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu and Dawu Gu

62: Reusable Fuzzy Extractor from LWE

Yunhua Wen and Shengli Liu

69: Revisiting the Incentive Mechanism of Bitcoin-NG

Jiayuan Yin, Changren Wang, Zongyang Zhang and Jianwei Liu

74: A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et.al.'s Construction

Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim and Jong Chan Lee

76: Keyed Sponge with Prefix-Free Padding: Independence between Capacity and Online Queries without the Suffix Key

Yusuke Naito

86: Decentralized Blacklistable Anonymous Credentials with Reputation

Rupeng Yang, Man Ho Au, Qiuliang Xu and Zuoxia Yu

87: Lattice-Based Universal Accumulator with Efficient Zero-Knowledge Arguments

Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai and Qiuliang Xu

90: A Practical Privacy Preserving Protocol in Database-driven Cognitive Radio Networks

Yali Zeng, Li Xu, Xu Yang and Qikui Xu

93: TDDAD: Time-based Detection and Defense Scheme Against DDoS Attack on SDN Controller

Jie Cui, Jiantao He, Yan Xu and Hong Zhong

96: Lattice-Based Dual Receiver Encryption and More

Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue and Jie Li

101: Linkable Group Signature for Auditing Anonymous Communication

Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He and Jianwei Liu

103: Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model

Qiqi Lai, Bo Yang, Yong Yu, Chen Yuan and Liju Dong

104: 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State

Bernardo David, Rafael Dowsley and Mario Larangeira

106: Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority

Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada and Koji Chida

110: Auditable Hierarchy-private Public-key Encryption

Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng and Jianwei Liu

113: Key-updatable Public-key Encryption with Keyword Search: Models and Generic Constructions

Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki and Yohei Watanabe

116: Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems

Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou and Mingwu Zhang

124: Post-Quantum Secure Confidential Transactions (Lattice RingCT v1.0)

Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph Liu, Nandita Bhattacharjee, Man Ho Au and Jacob Cheng

126: Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS

Eunkyung Kim, Hyang-Sook Lee and Jeongeun Park

127: Anonymous Identity-Based Encryption with Identity Recovery

Xuecheng Ma, Xin Wang and Dongdai Lin

128: Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties

Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen and Hofung Leung

130: Asymmetric Subversion Attacks on Signature Schemes

Chi Liu, Rongmao Chen, Yi Wang and Yongjun Wang

131: Robust Multiparty Computation with Faster Verification Time

Souradyuti Paul and Ananya Shrivastava

135: New Attacks and Secure Design for Anonymous Distance-Bounding

Ahmad Ahmadi, Reihaneh Safavi-Naini and Mamunur Akand

short paper


38: Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst

114: CRT-KPS And Variants : Resilient Key Predistribution Schemes For (Low Cost) Networks Using CRT

Pinaki Sarkar, Mayank Baranwal and Sukumar Nandi

46: Live Path CFI Against Control Flow Hijacking Attacks

Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen and Jingling Xue

92: ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps

Yeali Sun, Shun-Wen Hsiao and Meng Chang Chen

99: Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-Encryption from Indistinguishability Obfuscation

Junzuo Lai, Zhengan Huang, Man Ho Au and Xianping Mao

107: Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction

Xingye Lu, Zhenfei Zhang and Man Ho Au

67: Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017

Hyung Tae Lee, Huaxiong Wang and Kai Zhang

21: Revocable certificateless encryption with ciphertext evolution

Yinxia Sun, Futai Zhang and Anmin Fu

28: A New Encryption Scheme Based on Rank Metric Codes

Terry S. C. Lau and Chik How Tan

83: Improving the BKZ Reduction Algorithm by Quick Reordering Technique

Yuntao Wang and Tsuyoshi Takagi