Inscrypt 2018

The 14th International Conference on Information Security and Cryptology
Fuzhou, China
14-17 Dec 2018
---In Cooperation with IACR---

About INSCRYPT 2018

The 14th International Conference on Information Security and Cryptology will be held in Fuzhou, Fujian, from December 14 to 17, 2018, organized by the State Key Laboratry of Information Security of the Institute of Information Engineering of Chinese Academy of Science and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. Inscrypt 2018 seeks high-quality research contributions in the form of well-developed papers. The conference proceedings will be published by Springer-Verlag in LNCS series.

Important Dates

Paper Submission Due: August 14, 2018 Extended to August 21, 2018 (GMT-11 23:59)
Authors Notification: October 14, 2018
Camera ready due: November 20, 2018
Conference Dates: December 14-17, 2018

Contact

Contact:Shangpeng Wang
Email: inscrypt2018@qq.com

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Protecting Data Security and Privacy in Untrusted Servers

Robert Deng
Singapore Management University
Singapore

Learn More

Abstract

Outsourcing data to third-party cloud servers brings many benefits to individuals and organizations; however, software and hardware platforms in the cloud are not under direct control of data owners and may subject to various attacks. Storing electronic medical records in a patient’s mobile device allows ubiquitous access of such records, especially in emergency situations; however, mobile devices could be lost or stolen.

In this talk, we present a cryptographic and system integrated approach to protecting data security and privacy in “untrusted servers”. In particular, we introduce a framework for scalable access control of encrypted data and for secure computation over encrypted data. We provide an overview of the underlying techniques, a prototype implementation, and performance evaluation.

Biography: Prof. Robert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Information Systems, Singapore Management University (SMU). His research interests are in the areas of data security and privacy, cloud security and Internet of Things security. He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He has served in many editorial boards and conference committees, including the editorial boards of IEEE Security & Privacy Magazine, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, International Journal of Information Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is an IEEE Fellow.

BBDS: A Privacy-preserving Blockchain-Based Data Sharing System

Jin Li
Guangzhou University
China

Learn More

Abstract

Data sharing has been popular nowadays for data analysis with technologies such as machine learning. An important issue to be concerned is how to aggregate a large amount of data that is highly associated with the specified analysis task. To address this, a traditional method is that data analyst turns to data owner for its permission to leverage its data and then launches analysis tasks over the aggregated data. However, the privacy of data owner is weakly guaranteed since data owner lost the control of its data, whose behaviour is unpredictable. To guarantee the privacy of data owner while enabling the analysis of its dataset, homomorphic encryption (HE) scheme is adopted in this paper. But the straightforward method cannot work in such a setting for the security of fairness and resource constrained setting. To address the challenges, we propose a new solution based on blockchain to control the utilization of data and the privacy can be achieved with such a solution. Furthermore, an outsourcing method is proposed to verify whether the returned result is honestly computed or not.

Biography: Jin Li is currently a professor at Guangzhou University. He received his Ph.D degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in Computing and privacy protection in various new computing environments, including Cloud computing, Internet-of-Things, Blockchain and machine learning. He served as a senior researcher and visiting professor at Korea Advanced Institute of Technology and Illinois Institute of Technology and VirginaTech, respectively. He has published more than 100 papers in international conferences and journals, including IEEE TDSC, IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TC and ESORICS etc. Three papers have been selected as the best paper in the international conferences. He also served as program chairs/publicity chairs for many international conferences such as IEEE Blockchain 2018, ICA3PP2018, IEEE CNS 2015, IEEE CSE 2017, IEEE EUC 2017, ISICA 2015 etc. He is associate editor of Information Sciences and has been guest editors for several journals such as MONET, JNCA and FGCS etc.

Post-Quantum Cryptography, Blockchains and Cryptocurrencies

Huaxiong Wang
Nanyang Technological University
Singapore

Learn More

Abstract

The security of most public-key cryptographic schemes relies on computational assumptions such as the factorization and discrete logarithm problems. However, Shor showed in 1994 that both these problems are easy to solve with a quantum computer. Almost all current public-key schemes would become completely insecure if quantum computers become a practical reality. Although the realization of such computers is complicated and hard to predict, experts in the field believe that it is merely an engineering challenge. Some even predict sufficiently large quantum computers to break essentially all currently used public key schemes within the next 20 years or so. Post-quantum cryptography is a new research field to design and analyse cryptographic schemes that are secure against quantum attacks. In this talk, we will give a brief overview on post-quantum cryptograph and its connections with blockchain and cryptocurrencies, focusing on a newly proposed quantum-safe cryptocurrency blackchain platform, Abelian (ABE).

Biography: Huaxiong Wang received a PhD in Mathematics from University of Haifa, Israel in 1996 and a PhD in Computer Science from University of Wollongong, Australia in 2001. He has been an associate professor at Nanyang Technological University in Singapore since 2006, where he also served as the Head of Division of Mathematical Sciences from 2013 to 2015. Prior to NTU, he held faculty positions at Macquarie University and University of Wollongong in Australia. He also held visiting positions at ENS de Lyon in France, Fujian Normal University in China, City University of Hong Kong, National University of Singapore and Kobe University in Japan.

He has more than 20 years experience of research in cryptography and information security. He is authorco-author of 1 book, 9 edited books and over 200 papers in international journals and conferences, covering various areas in cryptography and information security. He has supervised over 50 PhD students and postdoctoral fellows, and has served on the editorial board of 9 international journals and as a memberchair of the program committee for more than 100 international conferences.

He received the inaugural Award of Best Research Contribution awarded by the Computer Science Association of Australasia in 2004 - the most prestigious award for mid-career computer scientists in Australia and New Zealand. He was awarded the Minjiang distinguished professor in 2013 by Fujian Province, China and was an invited speaker of ASIACRYPT 2017.

Data-Driven Cyber Security to Counterfeit Malicious Attacks

Yang Xiang
Swinburne University of Technology
Australia

Learn More

Abstract

Cyber security has become one of the top priorities in the research and development agenda globally today. At the same time, data is more prevalent and pertinent than ever before. Cyberspace generates 2.5 quintillion (1018) bytes of data per day. Threat data is no exception: with continuously growing cybercriminal activities contributing to its abundance. New and innovative cyber security technologies that can effectively address this pressing danger are critically needed.

Data-driven approaches to solve security problems have been increasingly adopted by the cybersecurity research community. They have two areas of focus: detection and prediction of security events. Early research focuses primarily on detection of various kinds of security events, such as cyber-attacks, vulnerabilities, and data breaches. More recently, there have been efforts to predict or forecast cyber security events, such as predicting attackers’ next move, estimating attacks’ ultimate goal, intrusion prediction, and security situation forecasting. Data and its analytic methods are the key tools to underpin all of these activities.

New methods and tools, consequently, must follow up in order to adapt to this emerging security paradigm. In this talk, we will discuss the concept of Data-Driven Cyber Security and how the data-driven methodology can be used to address the security and privacy problems in cyberspace. Addressing the challenges will allow us to deliver solutions that can safeguard one of the central and critically important aspects of all of our lives from attacks that are real, ongoing and damaging. A few cases on software vulnerability discovery by machine learning, malicious network traffic detection, and social network data analytics will be presented.

Biography: Prof Yang Xiang received his PhD in Computer Science from Deakin University, Australia. He is currently the Dean of the Digital Research & Innovation Capability Platform, Swinburne University of Technology, Australia. His research interests include cyber security, which covers network and system security, data analytics, distributed systems, and networking. In the past 20 years, he has been leading the team developing active defense systems against large-scale distributed network attacks. His translational research has made significant impact to the real-world applications, such as data-driven cyber security applications, malware applications, cloud and IoT security applications, and blockchain applications. His research was funded by the Australian Research Council (ARC) and industry partners. He has published more than 200 research papers in many international journals and conferences, such as IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Security and Forensics, and IEEE Transactions on Dependable and Secure Computing. He is the foundation Editor-in-Chief of the SpringerBriefs on Cyber Security Systems and Networks. He is the co-founder and the steering committee chair of the NSS, ICA3PP, CSS, SocialSec conference series. He served as the Associate Editor of IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, and the Editor of Journal of Network and Computer Applications. He is a Senior Member of the IEEE.

Trust, Security and Privacy in Mobile RFID Systems

Wanlei Zhou
University of Technology Sydney
Australia

Learn More

Abstract

Radio Frequency Identification (RFID) enables the automatic identification of objects using radio waves without the need for physical contact with the objects. RFID has been widely used in various fields such as logistics, manufacturing, pharmaceutical, supply chain management, healthcare, defense, aerospace and many other areas, apart from touching our everyday lives through RFID enabled car keys, ePassports, clothing, electronic items and others. However, the wide adoptions of RFID technologies also introduce serious security and privacy risks as the information stored in RFID tags can easily be retrieved by any malicious party with a compatible reader. In this talk we will introduce some trust, security and privicy challenges in Mobile RFID technologies, and based on our research, we will outline a number of schemes for authentication, ownership transfer, secure search and grouping proof in mobile RFID systems.

Biography: Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University, Australia in 2002. He is currently the Head of School of Software in University of Technology Sydney (UTS) in Australia. Before joining UTS, Professor Zhou held the positions of Alfred Deakin Professor, Chair of Information Technology, and Associate Dean of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Professor Zhou also served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include security and privacy, bioinformatics, and e-learning. Professor Zhou has published more than 400 papers in refereed international journals and refereed international conferences proceedings, including many articles in IEEE transactions and journals.

Inscrypt 2018 Schedule
14-16 Dec
Registration
08:00-18:00
15 Dec16 Dec
Opening
08:30-09:00
Keynote 5
08:30-09:15
Keynote 1
09:00-09:45
Keynote 6
09:15-10:00
Keynote 2
09:45-10:30
Break
10:00-10:20
Break
10:30-10:50
Section 2A (Room 1)
Section 2B (Room 2)
10:20-12:20
Section 1A (Room 1)
Section 1B 1C (Room 2)
10:50-12:20
Lunch
12:20-14:00
Keynote 3
14:00-14:45
Section 3A (Room 1)
Section 3B (Room 2)
14:00-15:15
Keynote 4
14:45-15:30
Special event
15:30-18:00
Closing
15:15-15:25
Dinner
18:00-21:00
Dinner
18:00-21:00

Technical Program

Inscrypt 2018 Keynotes
Keynote 1 (15 Dec) 9:00-9:45
Protecting Data Security and Privacy in Untrusted Servers
Robert Deng, Singapore Management University, Singapore
Keynote 2 (15 Dec) 9:45-10:30

Keynote 3 (15 Dec) 14:00-14:45

Keynote 4 (15 Dec) 14:45-15:30

Keynote 5 (16 Dec) 8:30-9:15

Keynote 6 (16 Dec) 9:15-10:00

Section 1A (Room 1): Blockchain and Crypto Currency
10:50-12:20 (15 Dec)
10:50-11:05 Evaluating CryptoNote-Style blockchains
Runchao Han, Jiangshan Yu , Joseph Liu and Peng Zhang
11:05-11:20A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan, Shuyang Tang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu and Yu Yu
11:20-11:35AFCoin: A framework for digital fiat currency of central banks based on account model
Haibo Tian, Xiaofeng Chen, Ding Yong, Xiaoyan Zhu and Fangguo Zhang
11:35-11:50Anonymity Reduction Attacks To Monero
Dimaz Ankaa WijayaP, Joseph Liu, Ron Steinfeld, Dongxi Liu and Tsz Hon Yuen
11:50-12:05Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work
Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag and Kouichi Sakurai
Section 1B (Room 2): Lattice-Based Cryptology
10:50-12:20 (15 Dec)
10:50-11:05 Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHE
Shuai Liu and Bin Hu
11:05-11:20Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li and Jingnan He
11:20-11:35Two-Round PAKE Protocol over Lattices without NIZK
Zengpeng Li and Ding Wang
Section 1C (Room 2): Symmetric Cryptology
10:50-12:20 (15 Dec)
11:35-11:50Improved Integral Attacks on PRESENT-80
Shi Wang, Zejun Xiang, Xiangyong Zeng and Shasha Zhang
11:50-12:05 Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128
Yang Li, Ruyan Wang, Xiaohan Meng, and Nandita Bhattacharjee
12:05-12:20Improved Indifferentiability Security Bound for the Prefix-free Merkle-Damgard Hash Function
Kamel AmmourPradeep and Lei Wang
Section 2A (Room 1): Applied Cryptography
10:20-12:20 (16 Dec)
10:20-10:35Privacy-preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing
Dengzhi Liu, Jian Shen, Chen Wang, Tianqi Zhou and Anxi Wan
10:35-10:50Cloud-based Data-Sharing Scheme using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
Mingwu Zhang, Yan Jiang, Hua Shen and Willy Susilo
10:50-11:05 An Encrypted Database Framework with Enforced Access Control and Blockchain Validation
Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu and Haifeng Qian
11:05-11:20Using Blockchain to Control Access to Cloud Data
Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam and Xun Yi
11:20-11:35A Multi-client DSSE Scheme Supporting Range Queries
Randolph Loh, Cong Zuo, Joseph K. Liu and Shi-Feng Sun
11:35-11:50Image Authentication for Permissible Cropping
Haixia Chen, Shangpeng Wang, Hongyan Zhang and Wei Wu
11:50-12:05Privacy-Preserving Remote User Authentication with k-Times Untraceability
Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching and Weiwei Liu
12:05-12:20Efficient Anonymous Authentication Scheme Based on a Signature with Deterable Function for Mobile Healthcare Crowd Sensing
Jinhui Liu, Yong Yu , Yannan Li, Yanqi Zhao and Xiaojiang Du
Section 2B (Room 2): Information Security
10:20-12:20 (16 Dec)
10:20-10:35Thwarting Relay Attacks Among Near Field Communications
Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei and Li Song
10:35-10:50A Light-weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection
Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li and Qingjia Huang
10:50-11:05Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications
Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo and Yu Wang
11:05-11:20Blockchain-based Privacy Preserving Deep Learning
Xudong Zhu and Hui Li
11:20-11:35Early Detection of Remote Access Trojan by Software Network Behavior
Masatsugu Oya and Kazumasa Omote
11:35-11:50Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia and Chunhua Su
11:50-12:05Understanding User Behavior in Online Banking System
Yuan Wang, Liming Wang, Zhen Xu and Wei An
Section 3A (Room 1): Asymmetric Cryptography
14:00-15:15 (16 Dec)
14:00-14:15 Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model
Chuangui Ma, Aijun Ge and Jie Zhang
14:15-14:30Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test
Yuzhao Cui, Qiong Huang, Jianye Huang , Hongbo Li and Guomin Yang
14:30-14:45 Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover using Déjà Q Framework
Mriganka Mandal and Ratna Dutta
14:45-15:00Attribute-Based Encryption with Efficient Keyword Search and User Revocation
Jingwei Wang, Xinchun Yin, Jianting Ning and Geong Sen Poh
15:00-15:15Public-Key Encryption with Selective Opening Security from General Assumptions
Dali Zhu, Renjun Zhang, Shuang Hu and Gongliang Chen
Section 3B (Room 2): Foundations
14:00-15:15(16 Dec)
14:00-14:15Confused Yet Successful: Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR
Eloide Chérisey, Sylvain Guilley and Olivier Rioul
14:15-14:30 A note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme
Dingyi Pei and Jingang Liu
14:30-14:45Searching BN curves for SM9
Guiwen Luo and Xiao Chen
14:45-15:00Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-Free Odd Integers
QunXiong Zheng, Research Center, Dongdai Lin and WenFeng Qi
15:00-15:15Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness Encryption
Jingyue Yu and Sciences

Important Dates

Paper Submission Due: August 14, 2018 (GMT)
Authors Notification: October 14, 2018
Camera ready due: November 20, 2018
Conference Dates: December 14-17, 2018

Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Crypto TrackSecurity Track

• Provable Security
• Sequences and Boolean Functions
• Secure Multiparty Computation
• Symmetric Key Cryptosystems
• Public Key Cryptosystems
• Implementation of Cryptosystems
• Hash Functions and MACs
• Block Cipher Modes of Operation
• Key Management and Key Recovery
• Security Protocols and Their Analysis
• Information Hiding and Watermarking
• Secure Computation Outsourcing
• Functional Computation and Verifiable Computation
• Obfuscation
• Leakage Resilient Cryptography

• Authentication and Authorization
• Biometric security
• Distributed System Security
• Electronic Commerce Security
• Intrusion Detection
• Network Security
• Security Modeling and Architectures
• Intellectual Property Protection
• Mobile System Security
• Operating System Security
• Risk Evaluation and Security Certification
• Prevention and Detection of Malicious Codes
• Privacy Enhancing Technologies
• Genomic Privacy and SDN Security
• Big Data and Cloud Security

Instruction for Authors

Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to easychair.

https://easychair.org/conferences/?conf=inscrypt2018

Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format.
PDF version of CFP :click download file

Accepted Papers

Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model
Chuangui Ma (Army Aviation Institute, Beijing, China)
Aijun Ge (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China)
Jie Zhang (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China)
A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme
Dingyi Pei (Guangzhou University, Guangzhou, China)
Jingang Liu (Guangzhou University, Guangzhou, China)
Evaluating CryptoNote-style Blockchains
Runchao Han (The University of Manchester, United Kingdom)
Jiangshan Yu (Monash University, Australia)
Joseph Liu (Monash University, Australia)
Peng Zhang (Shenzhen University, China)
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan (Shanghai Jiao Tong University, China)
Shuyang Tang (Shanghai Jiao Tong University, China)
Yuncong Zhang (Shanghai Jiao Tong University, China)
Chen Pan (Shanghai Jiao Tong University, China)
Zhiqiang Liu (Shanghai Jiao Tong University, China)
Yu Long (Shanghai Jiao Tong University, China)
Zhen Liu (Shanghai Jiao Tong University, China)
Yu Yu (Shanghai Jiao Tong University, China)
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test
Yuzhao Cui (South China Agricultural University, China)
Qiong Huang (South China Agricultural University, China)
Jianye Huang (South China Agricultural University, China)
Hongbo Li (South China Agricultural University, China)
Guomin Yang (South China Agricultural University, China; University of Wollongong, Australia)
Privacy-preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing
Dengzhi Liu (Nanjing University of Information Science & Technology, China)
Jian Shen (Nanjing University of Information Science & Technology, China)
Chen Wang (Nanjing University of Information Science & Technology, China)
Tianqi Zhou (Nanjing University of Information Science & Technology, China)
Anxi Wan (Nanjing University of Information Science & Technology, China)
Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover using Déjà Q Framework
Mriganka Mandal (Indian Institute of Technology Kharagpur, India)
Ratna Dutta (Indian Institute of Technology Kharagpur, India)
Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHE
Shuai Liu (Information Science and Technology Institute, Zhengzhou, China)
Bin Hu (Information Science and Technology Institute, Zhengzhou, China)
Cloud-based Data-Sharing Scheme using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
Mingwu Zhang (Hubei University of Technology, China)
Yan Jiang (Nanjing University of Aeronautics and Astronautics, China)
Hua Shen (Hubei University of Technology, China)
Willy Susilo (University of Wollongong, Australia)
Image Authentication for Permissible Cropping
Haixia Chen (Concord University College Fujian Normal University, China)
Shangpeng Wang (Fujian Normal University, China)
Hongyan Zhang (Concord University College Fujian Normal University, China)
Wei Wu (Fujian Normal University, China)
Privacy-Preserving Remote User Authentication with k-Times Untraceability
Yangguang Tian (Singapore Management University, Singapore)
Yingjiu Li (Singapore Management University, Singapore)
Binanda Sengupta (Singapore Management University, Singapore)
Robert Huijie Deng (Singapore Management University, Singapore)
Albert Ching (i-Spring Innovations)
Weiwei Liu (North China University of Water Resources and Electric Power, China)
Efficient Anonymous Authentication Scheme Based on a Signature with Deterable Function for Mobile Healthcare Crowd Sensing
Jinhui Liu (Shaanxi Normal University, China)
Yong Yu (Shaanxi Normal University, China)
Yannan Li (University of Wollongong, Australia)
Yanqi Zhao (Shaanxi Normal University, China)
Xiaojiang Du (Temple University, USA)
Improved Integral Attacks on PRESENT-80
Shi Wang (Hubei University, China)
Zejun Xiang (Hubei University, China)
Xiangyong Zeng (Hubei University, China)
Shasha Zhang (Hubei University, China)
Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness  Encryption
Jingyue Yu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; State Key Laboratory of Cryptology, Beijing, China)
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou (University of Chinese Academy of Sciences, China)
Haiyang Xue (University of Chinese Academy of Sciences, China)
Daode Zhang (University of Chinese Academy of Sciences, China)
Kunpeng Wang (University of Chinese Academy of Sciences, China)
Xianhui Lu (University of Chinese Academy of Sciences, China)
Bao Li (University of Chinese Academy of Sciences, China)
Jingnan He (University of Chinese Academy of Sciences, China)
Anonymity Reduction Attacks To Monero
Dimaz Ankaa Wijaya (Monash University, Australia)
Joseph Liu (Monash University, Australia)
Ron Steinfeld (Monash University, Australia)
Dongxi Liu (Monash University, Australia)
Tsz Hon Yuen (University of Hong Kong, Hong Kong)
A Light-weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection
Mingjie Xu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Shengnan Li (National Computer Network Emergency Response Technical Team / Coordination Center of China, China)
Lili Xu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Feng Li (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wei Huo (Institute of Information Engineering, Chinese Academy of Sciences, China)
Jing Ma (Science and Technology on Information Assurance Laboratory, China)
Xinhua Li (Institute of Information Engineering, Chinese Academy of Sciences, China)
Qingjia Huang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Two-Round PAKE Protocol over Lattices without NIZK
Zengpeng Li (Qingdao University, China)
Ding Wang (Peking University, China)
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications
Mark H. Meng (Institute for Infocomm Research, Agency for Science, Technology and Research (A*STAR), Singapore)
Guangdong Bai (Singapore Institute of Technology, Singaproe)
Joseph K. Liu (Monash University, Australia)
Xiapu Luo (Hong Kong Polytechnic University, Hong Kong)
Yu Wang (Guangzhou University, China)
Confused Yet Successful: Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR
Eloide Chérisey (Télécom ParisTech, France)
Sylvain Guilley (Télécom ParisTech, France)
Olivier Rioul (Télécom ParisTech, France)
Blockchain-based Privacy Preserving Deep Learning
Xudong Zhu ( Xi'an University of Architecture and Technology, China)
Hui Li (Xidian University, China)
Improved Indifferentiability Security Bound for the Prefix-free Merkle-Damgard Hash Function
Kamel Ammour (Shanghai Jiao Tong University, Shanghai, China)
Lei Wang (Shanghai Jiao Tong University, Shanghai, China; Westone Cryptologic Research Center, Beijing, China)
Early Detection of Remote Access Trojan by Software Network Behavior
Masatsugu Oya (Univesity of Tsukuba, Japan)
Kazumasa Omote (Univesity of Tsukuba, Japan)
Searching BN curves for SM9
Guiwen Luo (University of Chinese Academy of Sciences, Beijing, China)
Xiao Chen (University of Chinese Academy of Sciences, Beijing, China)
Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
Ruoyu Deng (Shanghai Jiaotong University, China)
Na Ruan (Shanghai Jiaotong University, China)
Ruidong Jin (Shanghai Jiaotong University, China)
Yu Lu (Shanghai Jiaotong University, China)
Weijia Jia (Shanghai Jiaotong University, China)
Chunhua Su (University of Aizu, Japan)
Understanding User Behavior in Online Banking System
Yuan Wang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Liming Wang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wei An (Institute of Information Engineering, Chinese Academy of Sciences, China)
A Multi-client DSSE Scheme Supporting Range Queries
Randolph Loh (Monash University, Australia)
Cong Zuo (Monash University, Australia)
Joseph K. Liu (Monash University, Australia)
Shi-Feng Sun (Monash University, Australia)
An Encrypted Database Framework with Enforced Access Control and Blockchain Validation
Zhimei Sui (East China Normal University, China; Monash University, Australia)
Shangqi Lai (Monash University, Australia)
Cong Zuo (Monash University, Australia)
Xingliang Yuan (Monash University, Australia)
Joseph K. Liu (Monash University, Australia)
Haifeng Qian (East China Normal University, China)
Using Blockchain to Control Access to Cloud Data
Jiale Guo (School of Computer Science and Engineering Nanyang Technological University, Singapore)
Wenzhuo Yang (School of Computer Science and Engineering Nanyang Technological University, Singapore)
Kwok-Yan Lam (School of Computer Science and Engineering Nanyang Technological University, Singapore)
Xun Yi (Computer Science and Software Engineering School of Science, RMIT University, Australia)
Attribute-Based Encryption with Efficient Keyword Search and User Revocation
Jingwei Wang (Yangzhou University, China)
Xinchun Yin (Yangzhou University, China; Yangzhou University Guangling College, China)
Jianting Ning (National University of Singapore, Singapore)
Geong Sen Poh (National University of Singapore, Singapore)
A framework for digital fiat currency of central banks based on account model
Haibo Tian (Sun Yat-Sen Univeristy, China)
Xiaofeng Chen (Xidian University, China)
Ding Yong (Guilin University of Electronic Technology, China)
Xiaoyan Zhu (Xidian University, China)
Fangguo Zhang (Sun Yat-Sen Univeristy, China)
Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128
Yang Li (The University of Electro-Communications, Japan)
Ruyan Wang (Nanjing University of Aeronautics and Astronautics, China )
Xiaohan Meng (Nanjing University of Aeronautics and Astronautics, China )
Jian Wang (Nanjing University of Aeronautics and Astronautics, China)
Chord: Thwarting Relay Attacks Among Near Field Communications
Yafei Ji (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China)
Luning Xia (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China )
Jingqiang Lin (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China )
Qiongxiao Wang (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China)
Lingguang Lei (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China)
Li Song (Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China)
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work
Hiroaki Anada (University of Nagasaki, Japan)
Tomohiro Matsushima (Kyushu University, Japan)
Chunhua Su (University of Aizu, Japan)
Weizhi Meng (Denmark Technological University, Denmark)
Junpei Kawamoto (Kyushu University, Japan)
Samiran Bag (Kyushu University, Japan)
Kouichi Sakurai (Kyushu University, Japan)
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers
QunXiong Zheng (Chinese Academy of Sciences, China; National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China)
Dongdai Lin (Chinese Academy of Sciences, China)
WenFeng Qi (National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China)
Public-Key Encryption with Selective Opening Security from General Assumptions
Dali Zhu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Renjun Zhang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Shuang Hu (Shanghai Jiao Tong University & SKLIATIS, China; Virginia Commonwealth University, Richmond, VA)
Gongliang Chen (Shanghai Jiao Tong University & SKLIATIS, China)

Registration Information

Each full/short paper must have ONE author registration. Each paper must complete the author registration by 15 November 2018

Registration Fee

Registration categoryRegistration amount
Author Registration600 USD(3800 RMB)/person
Full Registration600 USD(3800 RMB)/person
Student Registration300 USD(2000 RMB)/person

How to Register

1. The details of registration are given in the registration form.
2. We only accept payment by bank transfer (not credit card).
3. Please send the transfer receipt and registration form to  inscrypt2018@qq.com.
4. If you have any question about the registration, please contact:
    Name: Shangpeng Wang        Tel: +86 13959181861     Email: inscrypt2018@qq.com
5. Please send the transfer receipt and registration form to : inscrypt2018@qq.com
Registration Form Download: 中文     International

Honorary Chairs

Dongdai Lin, Institute of Information Engineering, CAS, China
Yi Mu, Fujian Normal University, China 

General Chairs

Xiaofeng Chen, Xidian University, China
Changping Wang, Fujian Normal University, China
Li Xu, Fujian Normal University, China

Technical Program Chairs

Fuchun Guo, University of Wollongong, Australia
Xinyi Huang, Fujian Normal University, China
Moti Yung, Columbia University and Google, USA

Organizing Chairs

Wei Wu, Fujian Normal University, China
Shangpeng Wang, Fujian Normal University, China

Publicity Chairs

Rongmao Chen, National University of Defense Technology, China
Zhe Liu, University of Luxembourg, Luxembourg

Publication Chair

Yuexin Zhang, Swinburne University of Technology, Australia

Steering Committee

Feng Bao, Huawei International, Singapore
Kefei Chen, Hangzhou Normal University, China
Dawu Gu, Shanghai Jiao Tong University, China
Xinyi Huang, Fujian Normal University, China
Hui Li, Xidian University, China
Dongdai Lin, Chinese Academy of Sciences, China
Peng Liu, Pennsylvania State University, USA
Wen-feng Qi, National Digital Switching System Engineering and Technological Research Center, China
Meiqin Wang, Shandong University, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Xiaoyun Wang, Tsinghua University, China
Jian Weng, Jinan University, China
Moti Yung, Snapchat Inc. and Columbia University, USA
Fangguo Zhang, Sun Yat-Sen University, China
Huanguo Zhang, Wuhan University, China

Program Committee

Erman Ayday , Bilkent University, Turkey
Mauro Barni, University of Siena, Italy
Donghoon Chang, NIST, USA
Kai Chen, Chinese Academy of Sciences, China
Yu Chen, Chinese Academy of Sciences, China
Ilyong Chung, Chosun University, Koera
Ashok Kumar Das, International Institute of Information Technology, India
Jintai Ding, University of Cincinnati, USA
Debin Gao, Singapore Management University, Singapore
Dawu Gu, Shanghai Jiao Tong University, China
Jian Guo, Nanyang Technological University, Singapore
Feng Hao, Newcastle University, UK
Debiao He, Wuhan University, China
Vincenzo Iovino, University of Luxembourg, Luxembourg
Peng Jiang, Beijing Institute of Technology, China
Dae-Young Kim, Daegu Catholic University, Korea
Neeraj Kuma, Deemed University, India
Jianchang Lai, Nanjian Normal University, China
Yingjiu Li, Singapore Management University, Singapore
Kaitai Liang University of Surrey UK, UK
Joseph Liu, Monash University, Australia
Yang Liu, Nanyang Technological University, Singapore
Zhe Liu, University of Luxembourg, Luxembourg
Florian Mendel, TU Graz, Austria
Jianting Ning, National University of Singapore, Singapore
Kazumasa Omote, University of Tsukuba, Japan
Giuseppe Persiano, Università di Salerno, Italy
Josef Pieprzyk, Queensland University of Technology, Australia
Bertram Poettering, Ruhr-Universität Bochum, Germany
Kouichi Sakurai, Kyushu University, Japan
Jian Shen, Nanjing University of Information Science and Technology, China
Chunhua Su, The University of Aizu, Japan
Siwei Sun, State key lab of information security
Qiang Tang, Cornell University, USA
Tian Tian, National Digital Switching System Engineering & Technological Research Center, China
Ding Wang, Peking University, China
Hao Wang Shandong Normal University, China
Jianfeng Wang, Xidian University, China
Meiqin Wang, Shandong University, China
Wenling Wu, Chinese Academy of Science, China
Shouhuai Xu, University of Texas at San Antonio, USA
Xun Yi, RMIT University, Australia
Ting Yu, Qatar Computing Research Institute
Yu Yu, Shanghai Jiao Tong University, China
Fan Zhang, Zhejiang University, China
Fangguo Zhang, Sun Yat-sen University, China
Rui Zhang, Chinese Academy of Sciences, China
Yuexin Zhang Swinburne University of Technology, Australia
Xianfeng Zhao, Chinese Academy of Sciences, China
Cliff Zou, University of Central Florida, USA

Conference Venue

Inscrypt 2018 will be held at Fuzhou. Fuzhou, located in the lower reaches of the Minjiang river and the coastal area in eastern Fujian province, is the capital, the political and cultural transportation center of Fujian province, one of the central cities of the economic zone on the west coast of the strait.
Conference Hotel: Fuzhou Sandi Ramada Plaza Orlando Hotel (福州三迪华美达广场酒店)
Address: No. 202 Cangshan Jinshan District of Fuzhou City, Fujian Province, Minjiang Avenue(福建省福州市仓山区金山闽江大道202号).

Hotel Information

Fuzhou Sandi Ramada Plaza Orlando Hotel hosts luxury guestrooms of various sizes, all of which are outfitted with free internet access. The hotel's large banquet hall can accommodate 380 people for business and social activities. A number of meeting rooms are also available. Guests can visit the gym to work out, while an indoor swimming pool and outdoor tennis court provide guests with additional fitness options. Guests just looking to unwind can head to the sauna or massage facilities.
Room Rate: Business Twin Room / Business Single Room: 430 RMB/night.
Tel: (0591) 88326888
Fax:(0591) 88325555
Website: http://www.ramadaplazafzs.com

Transportation

Fuzhou has an international airport, Fuzhou Changle International Airport and two railway stations, Fuzhou Railway Station and Fuzhou South Railway Station respectively.
1. Fuzhou Changle International Airport: The airport is about 50 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 52 minutes to get there.(It might take longer during peak hours.) The price of by taxi is about 170 RMB.
2. Fuzhou Railway Station: The railway station is about 12.9 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 22 minutes to get there. (It might take longer during peak hours.) The price of by taxi is about 50 RMB.
3. Fuzhou South Railway Station: The railway station is about 15.9 kilometers away from the Fuzhou Sandi Ramada Plaza Orlando Hotel. It takes 29 minutes to get there. (It might take longer during peak hours.) The price of by taxi is about 70 RMB.

Nearby Hotels

1.Dihao Business Hotel(福州帝豪商务酒店)(约步行8分钟至会议酒店)
   Address: Floor 3, Building 10, Jianxin Town, Cangshan district of Fuzhou City (福州市仓山区建新镇金山榕城广场10号楼3层,金山榕城广场公交站台旁)
   Room Rate: Single Room: about 158 RMB/night, Double Room: about 180 RMB/night
   Tel: 0591-88157663
2. Rongsheng Business Hotel (榕盛商务宾馆榕城广场店)(约步行10分钟至会议酒店)
   Address: Floor 3, Building 6, No. 65 Cangshan District of Fuzhou City, Jinrong South Road(福州市仓山区金榕南路65号榕城广场6栋楼三层 )
   Room Rate: Single Room: about 204 RMB/night, Double Room: about 255 RMB/night
   Tel: 0591-88190865