Time Table (Last Update: August 26, 2015)

August 26, 2015

Time Session
13:00-13:10 Opening
13:10-14:10 Keynote 1
14:15-15:10 Identity-based Encryption
15:10-15:40 Coffee Break
15:40-16:30 Elliptic Curve Cryptography
16:30-16:50 Factoring
17:30-19:00 Welcome & Poster Session

August 27, 2015

Time Session
09:30-10:30 Keynote 2
10:35-11:30 Symmetric Cryptanalysis
11:30-13:00 Lunch
13:00-14:15 Provable Security
14:15-14:40 Coffee Break
14:40-15:30 LWE-based Encryption
15:30-18:30 Excursion
19:00-21:00 Banquet

August 28, 2015

Time Session
09:30-09:55 Secret Sharing
09:55-11:10 Privacy-Preserving and Anonymity
11:10-11:35 Secure Protocol
11:35-13:00 Lunch
13:00-14:10 Systems Security
14:10-14:30 Security in Hardware
14:30-17:00 Snacks & CSS/SCIS Invited Session
17:05 Adjourn

Program of IWSEC2015

Keynote 1

13:10-14:10 August 26, 2015

Session Chair: Keisuke Tanaka

  • Cryptographic Protocol is and isn't like LEGO
    Shin'ichiro Matsuo

Identity-based Encryption

14:15-15:10 August 26, 2015

Session Chair: Satoshi Obana

  • Identity-based Lossy Encryption from Learning with Errors
    Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue and Xiaochao Sun
  • Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Jae Hong Seo and Keita Emura

Elliptic Curve Cryptography

15:40-16:30 August 26, 2015

Session Chair: Noboru Kunihiro

  • Invalid Curve Attacks in a GLS Setting
    Taechan Kim and Mehdi Tibouchi
  • <CANCELED> New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates
    Wei Yu, Kwang Ho Kim and Myong Song Jo

Factoring

16:30-16:50 August 26, 2015

Session Chair: Noboru Kunihiro

  • (short paper) Implicit Factorization of RSA Moduli Revisited
    Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang and Jun Xu

Keynote 2

09:30-10:30 August 27, 2015

Session Chair: Yuji Suga

  • Recent Applications of Hellman's Time-Memory Tradeoff
    Yu Sasaki

Symmetric Cryptanalysis

10:35-11:30 August 27, 2015

Session Chair: Yosuke Todo

  • Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Groestl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions
    Bingke Ma, Bao Li, Ronglin Hao and Xiaoqian Li
  • <CANCELED> Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s
    Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan and Ling Song

Provable Security

13:00-14:15 August 27, 2015

Session Chair: Mitsugu Iwamoto

  • NM-CPA secure encryption with proofs of plaintext knowledge
    Ben Smyth, Yoshikazu Hanatani and Hirofumi Muratani
  • Improvement of UC Secure Searchable Symmetric Encryption Scheme
    Shunsuke Taketani and Wakaha Ogata
  • Fully Leakage-Resilient Non-Malleable Identification Schemes in the Bounded-Retrieval Mode
    Tingting Zhang and Hongda Li

LWE-based Encryption

14:40-15:30 August 27, 2015

Session Chair: Takeshi Koshiba

  • LWE-Based FHE with Better Parameters
    Fuqun Wang, Kunpeng Wang and Bao Li
  • Improved Efficiency of MP12
    Fuyang Fang, Bao Li, Xianhui Lu and Xiaochao Sun

Secrect Sharing

09:30-09:55 August 28, 2015

Session Chair: Kazuo Sakiyama

  • Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hidetaka Hoshino and Satoshi Obana

Privacy-Preserving and Anonymity

09:55-11:10 August 28, 2015

Session Chair: Kazuo Sakiyama

  • k-anonymous Microdata Release via Post Randomisation Method
    Dai Ikarashi, Ryo Kikuchi, Koji Chida and Katsumi Takahashi
  • On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
    Tadanori Teruya, Koji Nuida, Kana Shimizu and Goichiro Hanaoka
  • Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes
    Shahidatul Sadiah, Toru Nakanishi and Nobuo Funabiki

Secure Protocol

11:10-11:35 August 28, 2015

Session Chair: Kazuo Sakiyama

  • Secure Multi-Party Computation Using Polarizing Cards
    Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto

Systems Security

13:00-14:10 August 28, 2015

Session Chair: Akira Kanaoka

  • An Analysis Platform for the Information Security of In-vehicle Networks Connected with External Networks
    Takaya Ezaki, Tomohiro Date and Hiroyuki Inoue
  • <CANCELED> Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data
    Tong Liu and Yazhe Wang
  • (short paper) Artifact-Metric-Based Authentication for Bottles of Wine
    Reina Yagasaki and Kazuo Sakiyama

Security in Hardware

14:10-14:30 August 28, 2015

Session Chair: Akira Kanaoka

  • (short paper) Bit Error Probability Evaluation of Ring Oscillator PUF
    Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing

CSS/SCIS Invited Session

14:30-17:00 August 28, 2015

Session Chair: Kazuto Ogawa

Asymmetric-key Cryptosystem
  • Deniable Group Signature
    Ai Ishida
  • Unconditionally Secure Revocable Storage
    Yohei Watanabe
  • Multi-Party Computation Using Regular Polygon Cards
    Kazumasa Shinagawa
  • Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
    Fuyuki Kitagawa
  • A Verification of 3-dimensional Lattice Sieve
    Kenichiro Hayasaka
Symmetric-key Cryptosystems and Power Analysis
  • Design for Involutive Symmetric-Key Primitive
    Yosuke Todo
  • Power Analysis Attacks on AES with RSM Countermeasure
    Mitsuru Shiozaki (main contributor: Daiki Tsutsumi)
Network and System Security
  • ACODE: Analyzing the Inconsistencies between User Expectations and the Developer Intentions of Mobile Apps
    Takuya Watanabe
  • Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
    Fei Feng
  • Use-After-Free Prevention Method Using Memory Reuse Prohibited Library
    Toshihiro Yamauchi (main contributor: Yuta Ikegami)
Acknowledgement
IWSEC 2015 (CSS/SCIS Invited Session) receives its funding partially through Information Environment (IE) Domain Project on IPSJ.

Accepted Papers

Secure Multi-Party Computation Using Polarizing Cards

Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto

Invalid Curve Attacks in a GLS Setting

Taechan Kim and Mehdi Tibouchi

An Analysis Platform for the Information Security of In-vehicle Networks Connected with External Networks

Takaya Ezaki, Tomohiro Date and Hiroyuki Inoue

Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes

Shahidatul Sadiah, Toru Nakanishi and Nobuo Funabiki

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Groestl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions

Bingke Ma, Bao Li, Ronglin Hao and Xiaoqian Li

Bit Error Probability Evaluation of Ring Oscillator PUF

(short paper) Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing

NM-CPA secure encryption with proofs of plaintext knowledge

Ben Smyth, Yoshikazu Hanatani and Hirofumi Muratani

Implicit Factorization of RSA Moduli Revisited

(short paper) Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang and Jun Xu

k-anonymous Microdata Release via Post Randomisation Method

Dai Ikarashi, Ryo Kikuchi, Koji Chida and Katsumi Takahashi

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s

Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan and Ling Song

Improvement of UC Secure Searchable Symmetric Encryption Scheme

Shunsuke Taketani and Wakaha Ogata

Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data

Tong Liu and Yazhe Wang

Fully Leakage-Resilient Non-Malleable Identification Schemes in the Bounded-Retrieval Model

Tingting Zhang and Hongda Li

Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings

Hidetaka Hoshino and Satoshi Obana

LWE-Based FHE with Better Parameters

Fuqun Wang, Kunpeng Wang and Bao Li

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

Jae Hong Seo and Keita Emura

New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates

Wei Yu, Kwang Ho Kim and Myong Song Jo

Improved Efficiency of MP12

Fuyang Fang, Bao Li, Xianhui Lu and Xiaochao Sun

Artifact-Metric-Based Authentication for Bottles of Wine

(short paper) Reina Yagasaki and Kazuo Sakiyama

On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data

Tadanori Teruya, Koji Nuida, Kana Shimizu and Goichiro Hanaoka

Identity-based Lossy Encryption from Learning with Errors

Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue and Xiaochao Sun