IWSEC 2017

August 30 (Web)- September 1 (Fri), 2017
Hiroshima, Japan

Time Table (Last Update: August 29th, 2017)

August 30, 2017

Time Session
13:00-13:10 Opening
13:10-14:10 Keynote 1
14:10-14:30 Break
14:30-15:20 Post-Quantum Cryptography
15:20-15:40 Break
15:40-16:25 System Security (1)
16:25-16:45 Break
16:45-17:35 Public Key Cryptosystems (1)
18:00-20:30 Poster Session / Welcome Party

August 31, 2017

Time Session
09:00-10:00 Keynote 2
10:00-10:20 Break
10:20-11:10 System Security (2)
11:10-11:30 Break
11:30-12:20 Cryptanalysis
12:20- Excursion & Conference Dinner

September 1, 2017

Time Session
9:00-10:30 Special Session
10:30-10:45 Break
10:45-11:30 Cryptographic Protocols
11:30-12:45 Lunch
12:45-13:30 Public Key Cryptosystems (2)
13:30-13:45 Break
13:45-15:00 SCIS & CSS Award Session (1)
15:00-15:15 Break
15:15-16:15 SCIS & CSS Award Session (2)
16:15-16:30 Break
16:30-17:45 SCIS & CSS Award Session (3)
17:45-17:50 Closing

Program of IWSEC2017

Keynote 1

13:10-14:10 August 30, 2017
Session Chair: Satoshi Obana

  • Where did Alice and Bob go, and can blockchain help to bring them back?
    Dr. Kazue Sako

Post-Quantum Cryptography

14:30-15:20 August 30, 2017
Session Chair: Takato Hirano

  • On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers (Regular)
    Akinori Hosoyamada and Kazumaro Aoki
  • The Beauty and the Beasts --The Hard Cases in LLL Reduction (Regular)
    Yuntao Wang, Saed Alsayigh, Tsuyoshi Takagi and Jintai Ding

System Security (1)

15:40-16:25 August 30, 2017
Session Chair: Sven Wohlgemuth

  • Simple Infeasibility Certificates for Attack Trees (Regular)
    Ahto Buldas, Aleksandr Lenin, Jan Willemson and Anton Charnamord
  • Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short)
    Bingqing Xia, Dongyao Ji and Gang Yao

Public Key Cryptosystems (1)

16:45-17:35 August 30, 2017
Session Chair: Keita Emura

  • Multipurpose Public-Key Encryption (Regular)
    Rui Zhang and Kai He
  • Secure Certificateless Proxy Re-encryption without Pairing (Regular)
    Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia and Olivier Markowitch

Keynote 2

9:00-10:00 August 31, 2017
Session Chair: Koji Chida

  • Practical Risk-based Approaches for Anonymizing Health Data: A Perspective from the Trenches
    Dr. Khaled El Emam

System Security (2)

10:20-11:10 August 31, 2017
Session Chair: Tetsushi Ohki

  • Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability (Regular)
    Nasser Mohammed Al-Fannah and Wanpeng Li
  • Evasion attacks against statistical code obfuscation detectors (Regular)
    Jiawei Su, Danilo Vasconcellos Vargas and Kouichi Sakurai

Cryptanalysis

11:30-12:20 August 31, 2017
Session Chair: Atsushi Fujioka

  • Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials (Regular)
    Kota Kondo, Yu Sasaki, Yosuke Todo and Tetsu Iwata
  • Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation (Regular)
    Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman and Shinsaku Kiyomoto

Special Session: Introduction to Privacy Enhancing Technology Competitions

9:00-10:30 September 1, 2017
Session Chair: Koji Nuida

  • Genomic Data Privacy and Security Protection Competition
    Dr. Shuang Wang, Dr. Xiaoqian Jiang (UCSD)
  • Data Anonymization Competition to Study the Security and Utility of Personal Data
    Dr. Hiroaki Kikuchi (Meiji Univ.)

Cryptographic Protocols

10:45-11:30 September 1, 2017
Session Chair: Hiroaki Anada

  • Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short)
    Baptiste Vinh Mau and Koji Nuida
  • Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators (Regular)
    Atsushi Fujioka

Public Key Cryptosystems (2)

12:45-13:30 September 1, 2017
Session Chair: Mehdi Tibouchi

  • Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters (Regular)
    Daode Zhang, Fuyang Fang, Bao Li and Xin Wang
  • IND-PCA Secure KEM is Enough for Password-Based Authenticated Key Exchange (Short)
    Xue Haiyang, Bao Li and Xianhui Lu

SCIS & CSS Award Session (1)

13:45-15:00 September 1, 2017
Session Chair: Yuji Suga

  • Mis-operation Resistant Homomorphic Encryption (from AsiaCCS 2017)
    Keita Emura
  • A Constant-Size Signature Scheme
    Kaisei Kajita
  • An Efficient Equi-join Algorithm for Secure Computation and Its Implementation toward Secure Comprehensive Analyses of Users' Attribute and History Information
    Naoto Kiribuchi
  • Generic Constructions of Attribute-Based Encryption with Revocation (from ESORICS2017)
    Kotoko Yamada
  • MEVAL2 vs. CCS Best Paper on MPC-AES
    Ryo Kikuchi

SCIS & CSS Award Session (2)

15:15-16:15 September 1, 2017
Session Chair: Shiho Moriai

  • Differentially Private Chi-squared Test by Unit Circle Mechanism (from ICML2017)
    Kazuya Kakizaki
  • Experiment on Removal and Prevention of IoT Malware Using Real Devices
    Tie Ying
  • Trojan of Things: Embedding Malicious NFC Tags into Common Objects
    Seita Maruyama
  • Privilege Escalation Attack Prevention Method Based on System Call Processing
    Toshihiro Yamauchi

SCIS & CSS Award Session (3)

16:30-17:45 September 1, 2017
Session Chair: Kan Yasuda

  • Design of Highly Efficient Tamper-Resistant AES Processor Based on 1st Order TI
    Rei Ueno
  • Side-Channel Authentication Using XOR Model
    Momoka Kasuya
  • A Proposal of PUF utilizing Pixel Variations in the CMOS Image Sensor(2)
    Yuki Nakura
  • On the Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption
    Masayuki Fukumitsu
  • Speeding Up of Updates of Gram-Schmidt Vectors in DeepLLL
    Junpei Yamaguchi

Accepted Papers

Regular Papers

  • Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials
    Kota Kondo, Yu Sasaki, Yosuke Todo and Tetsu Iwata
  • Simple Infeasibility Certificates for Attack Trees
    Ahto Buldas, Aleksandr Lenin, Jan Willemson and Anton Charnamord
  • Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
    Daode Zhang, Fuyang Fang, Bao Li and Xin Wang
  • Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation
    Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman and Shinsaku Kiyomoto
  • Evasion attacks against statistical code obfuscation detectors
    Jiawei Su, Danilo Vasconcellos Vargas and Kouichi Sakurai
  • The Beauty and the Beasts --The Hard Cases in LLL Reduction
    Yuntao Wang, Saed Alsayigh, Tsuyoshi Takagi and Jintai Ding
  • Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators
    Atsushi Fujioka
  • On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Akinori Hosoyamada and Kazumaro Aoki
  • Multipurpose Public-Key Encryption
    Rui Zhang and Kai He
  • Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability
    Nasser Mohammed Al-Fannah and Wanpeng Li
  • Secure Certificateless Proxy Re-encryption without Pairing
    Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia and Olivier Markowitch

Short Papers

  • Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012
    Baptiste Vinh Mau and Koji Nuida
  • IND-PCA Secure KEM is Enough for Password-Based Authenticated Key Exchange
    Xue Haiyang, Bao Li and Xianhui Lu
  • Enhanced TLS Handshake Authentication with Blockchain and Smart Contract
    Bingqing Xia, Dongyao Ji and Gang Yao