Inscrypt 2018

The 14th International Conference on Information Security and Cryptology
Fuzhou, China
14-17 Dec 2018
---In Cooperation with IACR---

About INSCRYPT 2018

The 14th International Conference on Information Security and Cryptology will be held in Fuzhou, Fujian, from December 14 to 17, 2018, organized by the State Key Laboratry of Information Security of the Institute of Information Engineering of Chinese Academy of Science and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. Inscrypt 2018 seeks high-quality research contributions in the form of well-developed papers. The conference proceedings will be published by Springer-Verlag in LNCS series.

Important Dates

Paper Submission Due: August 14, 2018 Extended to August 21, 2018 (GMT-11 23:59)
Authors Notification: October 14, 2018
Camera ready due: November 20, 2018
Conference Dates: December 14-17, 2018

Contact

Contact:Shangpeng Wang
Email: inscrypt2018@qq.com

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Protecting Data Security and Privacy in Untrusted Servers

Robert Deng
Singapore Management University
Singapore

Learn More

Abstract

Outsourcing data to third-party cloud servers brings many benefits to individuals and organizations; however, software and hardware platforms in the cloud are not under direct control of data owners and may subject to various attacks. Storing electronic medical records in a patient’s mobile device allows ubiquitous access of such records, especially in emergency situations; however, mobile devices could be lost or stolen.

In this talk, we present a cryptographic and system integrated approach to protecting data security and privacy in “untrusted servers”. In particular, we introduce a framework for scalable access control of encrypted data and for secure computation over encrypted data. We provide an overview of the underlying techniques, a prototype implementation, and performance evaluation.

Biography: Prof. Robert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Information Systems, Singapore Management University (SMU). His research interests are in the areas of data security and privacy, cloud security and Internet of Things security. He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He has served in many editorial boards and conference committees, including the editorial boards of IEEE Security & Privacy Magazine, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, International Journal of Information Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is an IEEE Fellow.

BBDS: A Privacy-preserving Blockchain-Based Data Sharing System

Jin Li
Guangzhou University
China

Learn More

Abstract

Data sharing has been popular nowadays for data analysis with technologies such as machine learning. An important issue to be concerned is how to aggregate a large amount of data that is highly associated with the specified analysis task. To address this, a traditional method is that data analyst turns to data owner for its permission to leverage its data and then launches analysis tasks over the aggregated data. However, the privacy of data owner is weakly guaranteed since data owner lost the control of its data, whose behaviour is unpredictable. To guarantee the privacy of data owner while enabling the analysis of its dataset, homomorphic encryption (HE) scheme is adopted in this paper. But the straightforward method cannot work in such a setting for the security of fairness and resource constrained setting. To address the challenges, we propose a new solution based on blockchain to control the utilization of data and the privacy can be achieved with such a solution. Furthermore, an outsourcing method is proposed to verify whether the returned result is honestly computed or not.

Biography: Jin Li is currently a professor at Guangzhou University. He received his Ph.D degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in Computing and privacy protection in various new computing environments, including Cloud computing, Internet-of-Things, Blockchain and machine learning. He served as a senior researcher and visiting professor at Korea Advanced Institute of Technology and Illinois Institute of Technology and VirginaTech, respectively. He has published more than 100 papers in international conferences and journals, including IEEE TDSC, IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TC and ESORICS etc. Three papers have been selected as the best paper in the international conferences. He also served as program chairs/publicity chairs for many international conferences such as IEEE Blockchain 2018, ICA3PP2018, IEEE CNS 2015, IEEE CSE 2017, IEEE EUC 2017, ISICA 2015 etc. He is associate editor of Information Sciences and has been guest editors for several journals such as MONET, JNCA and FGCS etc.

Post-Quantum Lattice-Based Public-Key Cryptography Balancing Security and Performance

Ron Steinfeld
Monash University
Australia

Learn More

Abstract

Lattice-based cryptography is currently one of the most promising candidate approaches for public-key cryptography with conjectured security against quantum computing attacks (also known as `post-quantum' cryptography). Until recently, there were essentially two (by now well known) approaches to lattice-based cryptography, at opposite ends of the security-risk versus performance tradeoff scale: a low-risk, low-performance approach based on the Learning with Errors (LWE) problem, and a high-risk, high-performance approach based on the Polynomial-LWE problem (or the related Ring-LWE problem).

In this talk, we discuss a recently developed third approach to lattice-based cryptography based on the Middle-Product LWE (MP-LWE) problem, offering an intermediate balance between security-risk and performance. We discuss the underlying security foundations, design, implementation and state of the art parameters for practical cryptosystems based on this approach.

Biography: Ron Steinfeld received his Ph.D. degree in Computer Science in 2003 from Monash University, Australia. Since 2015, he is a Senior Lecturer at the Faculty of Information Technology, Monash University, Australia. Following his Ph.D. Ron worked as a postdoctoral research fellow in cryptography and information security at Macquarie University, Australia, holding the positions of Macquarie University Research Fellow in cryptography and information security (2007-2009), and ARC Australian Research Fellow in cryptography and information security (2009- 2012). Ron completed his ARC Research Fellowship at Monash University (2012-2014). His main research interests are in the design and analysis of cryptographic algorithms and protocols, in particular in the areas of lattice-based cryptography and secure computation protocols. He has over 18 years of research experience in cryptography and information security. He has published more than 60 research papers in international refereed conferences and journals, more than 10 of which have each been cited over 100 times. He received the ASIACRYPT 2015 best paper award. He has served on the technical Program Committee of numerous international conferences in cryptography, is an editorial board member of the journal `Designs Codes and Cryptography’, and consults in cryptography design for the software industry.

Post-Quantum Cryptography, Blockchains and Cryptocurrencies

Huaxiong Wang
Nanyang Technological University
Singapore

Learn More

Abstract

The security of most public-key cryptographic schemes relies on computational assumptions such as the factorization and discrete logarithm problems. However, Shor showed in 1994 that both these problems are easy to solve with a quantum computer. Almost all current public-key schemes would become completely insecure if quantum computers become a practical reality. Although the realization of such computers is complicated and hard to predict, experts in the field believe that it is merely an engineering challenge. Some even predict sufficiently large quantum computers to break essentially all currently used public key schemes within the next 20 years or so. Post-quantum cryptography is a new research field to design and analyse cryptographic schemes that are secure against quantum attacks. In this talk, we will give a brief overview on post-quantum cryptograph and its connections with blockchain and cryptocurrencies, focusing on a newly proposed quantum-safe cryptocurrency blackchain platform, Abelian (ABE).

Biography: Huaxiong Wang received a PhD in Mathematics from University of Haifa, Israel in 1996 and a PhD in Computer Science from University of Wollongong, Australia in 2001. He has been an associate professor at Nanyang Technological University in Singapore since 2006, where he also served as the Head of Division of Mathematical Sciences from 2013 to 2015. Prior to NTU, he held faculty positions at Macquarie University and University of Wollongong in Australia. He also held visiting positions at ENS de Lyon in France, Fujian Normal University in China, City University of Hong Kong, National University of Singapore and Kobe University in Japan.

He has more than 20 years experience of research in cryptography and information security. He is authorco-author of 1 book, 9 edited books and over 200 papers in international journals and conferences, covering various areas in cryptography and information security. He has supervised over 50 PhD students and postdoctoral fellows, and has served on the editorial board of 9 international journals and as a memberchair of the program committee for more than 100 international conferences.

He received the inaugural Award of Best Research Contribution awarded by the Computer Science Association of Australasia in 2004 - the most prestigious award for mid-career computer scientists in Australia and New Zealand. He was awarded the Minjiang distinguished professor in 2013 by Fujian Province, China and was an invited speaker of ASIACRYPT 2017.

Data-Driven Cyber Security to Counterfeit Malicious Attacks

Yang Xiang
Swinburne University of Technology
Australia

Learn More

Abstract

Cyber security has become one of the top priorities in the research and development agenda globally today. At the same time, data is more prevalent and pertinent than ever before. Cyberspace generates 2.5 quintillion (1018) bytes of data per day. Threat data is no exception: with continuously growing cybercriminal activities contributing to its abundance. New and innovative cyber security technologies that can effectively address this pressing danger are critically needed.

Data-driven approaches to solve security problems have been increasingly adopted by the cybersecurity research community. They have two areas of focus: detection and prediction of security events. Early research focuses primarily on detection of various kinds of security events, such as cyber-attacks, vulnerabilities, and data breaches. More recently, there have been efforts to predict or forecast cyber security events, such as predicting attackers’ next move, estimating attacks’ ultimate goal, intrusion prediction, and security situation forecasting. Data and its analytic methods are the key tools to underpin all of these activities.

New methods and tools, consequently, must follow up in order to adapt to this emerging security paradigm. In this talk, we will discuss the concept of Data-Driven Cyber Security and how the data-driven methodology can be used to address the security and privacy problems in cyberspace. Addressing the challenges will allow us to deliver solutions that can safeguard one of the central and critically important aspects of all of our lives from attacks that are real, ongoing and damaging. A few cases on software vulnerability discovery by machine learning, malicious network traffic detection, and social network data analytics will be presented.

Biography: Prof Yang Xiang received his PhD in Computer Science from Deakin University, Australia. He is currently the Dean of the Digital Research & Innovation Capability Platform, Swinburne University of Technology, Australia. His research interests include cyber security, which covers network and system security, data analytics, distributed systems, and networking. In the past 20 years, he has been leading the team developing active defense systems against large-scale distributed network attacks. His translational research has made significant impact to the real-world applications, such as data-driven cyber security applications, malware applications, cloud and IoT security applications, and blockchain applications. His research was funded by the Australian Research Council (ARC) and industry partners. He has published more than 200 research papers in many international journals and conferences, such as IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Security and Forensics, and IEEE Transactions on Dependable and Secure Computing. He is the foundation Editor-in-Chief of the SpringerBriefs on Cyber Security Systems and Networks. He is the co-founder and the steering committee chair of the NSS, ICA3PP, CSS, SocialSec conference series. He served as the Associate Editor of IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, and the Editor of Journal of Network and Computer Applications. He is a Senior Member of the IEEE.

Detecting Bad Crypto Implementations and Correcting Random Oracles

Moti Yung
Columbia University and Google
USA

Learn More

Abstract

The study of Cryptosystems that are under subversion by the implementers themselves led to attacks (called Kleptographic attacks) on black-box cryptosystems. These type of attacks first introduced theoretically, have been implemented in the real, and are threatening the security of systems. In recent years we have investigated how to build systems, relying on minimal trusted component so as to clip the power of such attacks (we called it Cliptography). I will review methods for correcting implementations against unstructured hash functions (modeled as random oracles) based on some public randomness, and will mention black-box detection strategies against cryptosystems implemented adversarially.

Biography: Moti Yung is a Security and Privacy Scientist with a main interest in Cryptography: its Theory and its Real life Applications. Currently he is with Google. He graduated from Columbia University in 1988 and is an adjunct senior research faculty at Columbia till today. In parallel he has had an industrial research career working at places like IBM, RSA Labs. (EMC), and Snap. Yung is a fellow of ACM, of IEEE, of the International Association for Cryptologic Research (IACR). and of the European Association for Theoretical Computer Science (EATCS). Among his awards are ACM's SIGSAC Outstanding Innovation Award in 2014, and 2018 IEEE Computer Society W. Wallace McDowell Award. His research covers broad areas: from the theory and foundations, to applied systems, and actual engineering industrial efforts of cryptography and secure systems.

Trust, Security and Privacy in Mobile RFID Systems

Wanlei Zhou
University of Technology Sydney
Australia

Learn More

Abstract

Radio Frequency Identification (RFID) enables the automatic identification of objects using radio waves without the need for physical contact with the objects. RFID has been widely used in various fields such as logistics, manufacturing, pharmaceutical, supply chain management, healthcare, defense, aerospace and many other areas, apart from touching our everyday lives through RFID enabled car keys, ePassports, clothing, electronic items and others. However, the wide adoptions of RFID technologies also introduce serious security and privacy risks as the information stored in RFID tags can easily be retrieved by any malicious party with a compatible reader. In this talk we will introduce some trust, security and privicy challenges in Mobile RFID technologies, and based on our research, we will outline a number of schemes for authentication, ownership transfer, secure search and grouping proof in mobile RFID systems.

Biography: Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University, Australia in 2002. He is currently the Head of School of Software in University of Technology Sydney (UTS) in Australia. Before joining UTS, Professor Zhou held the positions of Alfred Deakin Professor, Chair of Information Technology, and Associate Dean of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Professor Zhou also served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include security and privacy, bioinformatics, and e-learning. Professor Zhou has published more than 400 papers in refereed international journals and refereed international conferences proceedings, including many articles in IEEE transactions and journals.

Inscrypt 2018 Schedule
14 Dec
Registration
14:00-22:00
Dinner (18:00-20:00)
15 Dec16 Dec
Opening (Room 1)
08:15-08:45
Keynote 5 (Room 1)
08:30-09:15
Keynote 1 (Room 1)
08:45-09:30
Keynote 6 (Room 1)
09:15-10:00
Keynote 2 (Room 1)
09:30-10:15
Break
10:00-10:20
Invited talk (Room 1)
10:15-10:30
Section 2A (Room 1)
Section 2B (Room 2)
10:20-12:05
Break
10:30-10:50
Section 1A (Room 1)
Section 1B 1C (Room 2)
10:50-12:20
Lunch
12:20-14:00
Lunch
12:10-14:00
Keynote 3 (Room 1)
14:00-14:45
Section 3A (Room 1)
Section 3B (Room 2)
14:00-15:15
Break
15:15-15:35
Keynote 4 (Room 1)
14:45-15:30
Keynote 7 (Room 1)
15:35-16:20
Special event
15:30-18:00
Closing(Room 1)
16:20-16:35
Dinner
18:30-20:00
Dinner
18:00-20:00

Technical Program

Inscrypt 2018 Keynotes
Keynote 1 (15 Dec) 08:45-09:30
Session Chair: Rongmao Chen
Protecting Data Security and Privacy in Untrusted Servers
Robert Deng, Singapore Management University, Singapore
Keynote 2 (15 Dec) 09:30-10:15
Session Chair: Rongmao Chen
BBDS: A Privacy-preserving Blockchain-Based Data Sharing System
Jin Li, Guangzhou University, China
Keynote 3 (15 Dec) 14:00-14:45
Session Chair: Qiong Huang
Post-Quantum Lattice-Based Public-Key Cryptography Balancing Security and Performance
Ron Steinfeld, Monash University, Australia
Keynote 4 (15 Dec) 14:45-15:30
Session Chair: Qiong Huang
Post-Quantum Cryptography, Blockchains and Cryptocurrencies
Huaxiong Wang, Nanyang Technological University, Singapore
Keynote 5 (16 Dec) 08:30-09:15
Session Chair: Jian Shen
Trust, Security and Privacy in Mobile RFID Systems
Wanlei Zhou, University of Technology Sydney, Australia
Keynote 6 (16 Dec) 09:15-10:00
Session Chair: Jian Shen
Data-Driven Cyber Security to Counterfeit Malicious Attacks
Yang Xiang, Swinburne University of Technology, Australia
Keynote 7 (16 Dec) 15:35-16:20
Session Chair: Dongdai Lin
Detecting Bad Crypto Implementations and Correcting Random Oracles
Moti Yung, Columbia University and Google, USA
Invited talk
Invited talk(15 Dec)10:15-10:30
A High-efficiency Trustless Computing Network of The Next Generation Computing Architecture
Lilin Sun, JUZIX
Section 1A (Room 1): Blockchain and Crypto Currency
Session Chair: Jin Li
10:50-12:20 (15 Dec)
10:50-11:05 Evaluating CryptoNote-Style blockchains
Runchao Han, Jiangshan Yu , Joseph Liu and Peng Zhang
11:05-11:20Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan, Shuyang Tang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu and Yu Yu
11:20-11:35AFCoin: A framework for digital fiat currency of central banks based on account model
Haibo Tian, Xiaofeng Chen, Ding Yong, Xiaoyan Zhu and Fangguo Zhang
11:35-11:50Anonymity Reduction Attacks To Monero
Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu and Tsz Hon Yuen
11:50-12:05Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work
Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag and Kouichi Sakurai
12:05-12:20A Light-weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection(information sec.)
Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li and Qingjia Huang
Section 1B (Room 2): Lattice-Based Cryptology
Session Chair: Hung-Min Sun
10:50-11:20 (15 Dec)
10:50-11:05Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li and Jingnan He
11:05-11:20 Two-Round PAKE Protocol over Lattices without NIZK
Zengpeng Li and Ding Wang
Section 1C (Room 2): Symmetric Cryptology
Session Chair: Hung-Min Sun
11:20-12:05 (15 Dec)
11:20-11:35Improved Integral Attacks on PRESENT-80
Shi Wang, Zejun Xiang, Xiangyong Zeng and Shasha Zhang
11:35-11:50 Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128
Ruyan Wang, Xiaohan Meng, Yang Li and Jian Wang
11:50-12:05Improved Indifferentiability Security Bound for the Prefix-free Merkle-Damgard Hash Function
Kamel Ammour and Lei Wang
Section 2A (Room 1): Applied Cryptography
Session Chair: Weizhi Meng
10:20-12:05 (16 Dec)
10:20-10:35Privacy-preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing
Dengzhi Liu, Jian Shen, Chen Wang, Tianqi Zhou and Anxi Wan
10:35-10:50Cloud-based Data-Sharing Scheme using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
Mingwu Zhang, Yan Jiang, Hua Shen and Willy Susilo
10:50-11:05 An Encrypted Database Framework with Enforced Access Control and Blockchain Validation
Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu and Haifeng Qian
11:05-11:20Using Blockchain to Control Access to Cloud Data
Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam and Xun Yi
11:20-11:35A Multi-client DSSE Scheme Supporting Range Queries
Randolph Loh, Cong Zuo, Joseph K. Liu and Shi-Feng Sun
11:35-11:50Privacy-Preserving Remote User Authentication with k-Times Untraceability
Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching and Weiwei Liu
11:50-12:05Efficient Anonymous Authentication Scheme Based on a Signature with Deterable Function for Mobile Healthcare Crowd Sensing
Jinhui Liu, Yong Yu , Yannan Li, Yanqi Zhao and Xiaojiang Du
Section 2B (Room 2): Information Security
Session Chair: Yu Wang
10:20-11:50 (16 Dec)
10:20-10:35Chord: Thwarting Relay Attacks Among Near Field Communications
Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei and Li Song
10:35-10:50Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications
Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo and Yu Wang
10:50-11:05Blockchain-based Privacy Preserving Deep Learning
Xudong Zhu, Hui Li and Yang Yu
11:05-11:20Early Detection of Remote Access Trojan by Software Network Behavior
Masatsugu Oya and Kazumasa Omote
11:20-11:35Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu
11:35-11:50Understanding User Behavior in Online Banking System
Yuan Wang, Liming Wang, Zhen Xu and Wei An
Section 3A (Room 1): Asymmetric Cryptography
Session Chair: Chunhua Su
14:00-15:15 (16 Dec)
14:00-14:15Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model
Chuangui Ma, Aijun Ge and Jie Zhang
14:15-14:30Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test
Yuzhao Cui, Qiong Huang, Jianye Huang , Hongbo Li and Guomin Yang
14:30-14:45Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover using Déjà Q Framework
Mriganka Mandal and Ratna Dutta
14:45-15:00Attribute-Based Encryption with Efficient Keyword Search and User Revocation
Jingwei Wang, Xinchun Yin, Jianting Ning and Geong Sen Poh
15:00-15:15Public-Key Encryption with Selective Opening Security from General Assumptions
Dali Zhu, Renjun Zhang, Shuang Hu and Gongliang Chen
Section 3B (Room 2): Foundations
Session Chair: Yong Yu
14:00-15:15(16 Dec)
14:00-14:15Confused Yet Successful: Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR
Eloide Chérisey, Sylvain Guilley and Olivier Rioul
14:15-14:30 A note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme
Dingyi Pei and Jingang Liu
14:30-14:45Searching BN curves for SM9
Guiwen Luo and Xiao Chen
14:45-15:00Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-Free Odd Integers
QunXiong Zheng, Research Center, Dongdai Lin and WenFeng Qi
15:00-15:15Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness Encryption
Jingyue Yu

Important Dates

Paper Submission Due: August 14, 2018 (GMT)
Authors Notification: October 14, 2018
Camera ready due: November 20, 2018
Conference Dates: December 14-17, 2018

Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Crypto TrackSecurity Track

• Provable Security
• Sequences and Boolean Functions
• Secure Multiparty Computation
• Symmetric Key Cryptosystems
• Public Key Cryptosystems
• Implementation of Cryptosystems
• Hash Functions and MACs
• Block Cipher Modes of Operation
• Key Management and Key Recovery
• Security Protocols and Their Analysis
• Information Hiding and Watermarking
• Secure Computation Outsourcing
• Functional Computation and Verifiable Computation
• Obfuscation
• Leakage Resilient Cryptography

• Authentication and Authorization
• Biometric security
• Distributed System Security
• Electronic Commerce Security
• Intrusion Detection
• Network Security
• Security Modeling and Architectures
• Intellectual Property Protection
• Mobile System Security
• Operating System Security
• Risk Evaluation and Security Certification
• Prevention and Detection of Malicious Codes
• Privacy Enhancing Technologies
• Genomic Privacy and SDN Security
• Big Data and Cloud Security

Instruction for Authors

Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to easychair.

https://easychair.org/conferences/?conf=inscrypt2018

Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format.
PDF version of CFP :click download file

Registration Information

Each full/short paper must have ONE author registration. Each paper must complete the author registration by 15 November 2018

Registration Fee

Registration categoryRegistration amount
Author Registration600 USD(3800 RMB)/person
Full Registration600 USD(3800 RMB)/person
Student Registration300 USD(2000 RMB)/person

How to Register

Please contact us by email:inscrypt2018@qq.com

Honorary Chairs

Dongdai Lin, Institute of Information Engineering, CAS, China
Yi Mu, Fujian Normal University, China 

General Chairs

Xiaofeng Chen, Xidian University, China
Changping Wang, Fujian Normal University, China
Li Xu, Fujian Normal University, China

Technical Program Chairs

Fuchun Guo, University of Wollongong, Australia
Xinyi Huang, Fujian Normal University, China
Moti Yung, Columbia University and Google, USA

Organizing Chairs

Wei Wu, Fujian Normal University, China
Shangpeng Wang, Fujian Normal University, China

Publicity Chairs

Rongmao Chen, National University of Defense Technology, China
Zhe Liu, University of Luxembourg, Luxembourg

Publication Chair

Yuexin Zhang, Swinburne University of Technology, Australia

Steering Committee

Feng Bao, Huawei International, Singapore
Kefei Chen, Hangzhou Normal University, China
Dawu Gu, Shanghai Jiao Tong University, China
Xinyi Huang, Fujian Normal University, China
Hui Li, Xidian University, China
Dongdai Lin, Chinese Academy of Sciences, China
Peng Liu, Pennsylvania State University, USA
Wen-feng Qi, National Digital Switching System Engineering and Technological Research Center, China
Meiqin Wang, Shandong University, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Xiaoyun Wang, Tsinghua University, China
Jian Weng, Jinan University, China
Moti Yung, Snapchat Inc. and Columbia University, USA
Fangguo Zhang, Sun Yat-Sen University, China
Huanguo Zhang, Wuhan University, China

Program Committee

Erman Ayday , Bilkent University, Turkey
Mauro Barni, University of Siena, Italy
Donghoon Chang, NIST, USA
Kai Chen, Chinese Academy of Sciences, China
Yu Chen, Chinese Academy of Sciences, China
Ilyong Chung, Chosun University, Koera
Ashok Kumar Das, International Institute of Information Technology, India
Jintai Ding, University of Cincinnati, USA
Debin Gao, Singapore Management University, Singapore
Dawu Gu, Shanghai Jiao Tong University, China
Jian Guo, Nanyang Technological University, Singapore
Feng Hao, Newcastle University, UK
Debiao He, Wuhan University, China
Vincenzo Iovino, University of Luxembourg, Luxembourg
Peng Jiang, Beijing Institute of Technology, China
Dae-Young Kim, Daegu Catholic University, Korea
Neeraj Kuma, Deemed University, India
Jianchang Lai, Nanjian Normal University, China
Yingjiu Li, Singapore Management University, Singapore
Kaitai Liang University of Surrey UK, UK
Joseph Liu, Monash University, Australia
Yang Liu, Nanyang Technological University, Singapore
Zhe Liu, University of Luxembourg, Luxembourg
Florian Mendel, TU Graz, Austria
Jianting Ning, National University of Singapore, Singapore
Kazumasa Omote, University of Tsukuba, Japan
Giuseppe Persiano, Università di Salerno, Italy
Josef Pieprzyk, Queensland University of Technology, Australia
Bertram Poettering, Ruhr-Universität Bochum, Germany
Kouichi Sakurai, Kyushu University, Japan
Jian Shen, Nanjing University of Information Science and Technology, China
Chunhua Su, The University of Aizu, Japan
Siwei Sun, State key lab of information security
Qiang Tang, Cornell University, USA
Tian Tian, National Digital Switching System Engineering & Technological Research Center, China
Ding Wang, Peking University, China
Hao Wang, Shandong Normal University, China
Jianfeng Wang, Xidian University, China
Meiqin Wang, Shandong University, China
Wenling Wu, Chinese Academy of Science, China
Shouhuai Xu, University of Texas at San Antonio, USA
Xun Yi, RMIT University, Australia
Ting Yu, Qatar Computing Research Institute
Yu Yu, Shanghai Jiao Tong University, China
Fan Zhang, Zhejiang University, China
Fangguo Zhang, Sun Yat-sen University, China
Rui Zhang, Chinese Academy of Sciences, China
Yuexin Zhang, Swinburne University of Technology, Australia
Xianfeng Zhao, Chinese Academy of Sciences, China
Cliff Zou, University of Central Florida, USA

Conference Venue

Inscrypt 2018 will be held at Fuzhou. Fuzhou, located in the lower reaches of the Minjiang river and the coastal area in eastern Fujian province, is the capital, the political and cultural transportation center of Fujian province, one of the central cities of the economic zone on the west coast of the strait.
Conference Hotel: Fuzhou Sandi Ramada Plaza Orlando Hotel (福州三迪华美达广场酒店)
Address: No. 202 Cangshan Jinshan District of Fuzhou City, Fujian Province, Minjiang Avenue(福建省福州市仓山区金山闽江大道202号).

Hotel Information

Fuzhou Sandi Ramada Plaza Orlando Hotel hosts luxury guestrooms of various sizes, all of which are outfitted with free internet access. The hotel's large banquet hall can accommodate 380 people for business and social activities. A number of meeting rooms are also available. Guests can visit the gym to work out, while an indoor swimming pool and outdoor tennis court provide guests with additional fitness options. Guests just looking to unwind can head to the sauna or massage facilities.
Room Rate: Business Twin Room / Business Single Room: 430 RMB/night.
Tel: (0591) 88326888
Fax:(0591) 88325555
Website: http://www.ramadaplazafzs.com

Transportation

Fuzhou has an international airport, Fuzhou Changle International Airport and two railway stations, Fuzhou Railway Station and Fuzhou South Railway Station respectively.
1. Fuzhou Changle International Airport: The airport is about 50 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 52 minutes to get there.(It might take longer during peak hours.) The price of by taxi is about 170 RMB.
2. Fuzhou Railway Station: The railway station is about 12.9 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 22 minutes to get there. (It might take longer during peak hours.) The price of by taxi is about 50 RMB.
3. Fuzhou South Railway Station: The railway station is about 15.9 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 29 minutes to get there. (It might take longer during peak hours.) The price of by taxi is about 70 RMB.

Nearby Hotels

1.Dihao Business Hotel(福州帝豪商务酒店)(约步行8-10分钟至会议酒店)
   Address: Floor 3, Building 10, Jianxin Town, Cangshan district of Fuzhou City (福州市仓山区建新镇金山榕城广场10号楼3层,金山榕城广场公交站台旁)
   Room Rate: Single Room: about 198 RMB/night, Double Room: about 226 RMB/night
   Tel: 0591-88157663
2. Rongsheng Business Hotel (榕盛商务宾馆榕城广场店)(约步行7-8分钟至会议酒店)
   Address: Floor 3, Building 6, No. 65 Cangshan District of Fuzhou City, Jinrong South Road(福州市仓山区金榕南路65号榕城广场6栋楼三层 )
   Room Rate: Single Room: about 180 RMB/night, Double Room: about 200 RMB/night
   Tel: 0591-88190865