第19届国际信息与通信安全会议

ICICS 2017

中国 北京    2017.12.6-2017.12.8

Language: English| 简体中文

会议日程

 

*PDF版本下载 --> 点此

Wednesday, December 6, 2017

Conference Room No.1, Friendship Palace, Beijing Friendship Hotel

2017126日,星期三

北京友谊宾馆友谊宫1号会议室

08:45-09:00

Opening Ceremony

09:00-09:40

Session 1: Invited Talk I

 

Industrial Control System (ICS): Security attacks and forensics challenges

Dr. K.P. Chow

University of Hong Kong

09:40-10:20

Session 2: Formal Analysis and Randomness Test

 

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System

Weijin Wang, Jingbin Liu, Yu Qin and Dengguo Feng

TCA, Institute of Software, Chinese Academy of Sciences, Beijing, China

University of Chinese Academy of Sciences, Beijing, China

SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China

 

An Efficiency Optimization Scheme for the On-the-fly Statistical Randomness Test

Jiahui Shen, Tianyu Chen, Lei Wang and Yuan Ma

Institute of Information Engineering, Chinese Academy of Sciences, China

Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China

School of Cyber Security, University of Chinese Academy of Sciences, China

10:20-11:00

Session 3: Signature Scheme and Key Management

 

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure

Ruo Mo, Jianfeng Ma, Ximeng Liu and Qi Li

Xidian University, Xi’an, China

Singapore Management University, Singapore, Singapore

Nanjing University of Posts and Telecommunications, Nanjing, China

 

SSUKey: A CPU-based Solution Protecting Private Keys on Untrusted OS

Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng and Bingyu Li

Data Assurance and Communication Security Research Center, Beijing, China

State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

11:00-11:10

Coffee Break

11:10-12:20

Session 4: Algorithms

 

The Reductions for the Approximating Covering Radius Problem

Wenwen Wang and Kewei Lv

Business School, University of Jinan, Jinan 250002, China

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing 100093, China

 

Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates Short Paper

Jianing Liu and Kewei Lv

State Key Laboratory of Information Security, Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China

Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China

University of Chinese Academy of Sciences, Beijing, China

 

Distributed Pseudorandom Functions for General Access Structures in NPShort Paper

Bei Liang and Aikaterini Mitrokotsa

Chalmers University of Technology, Gothenburg, Sweden

 

Reducing Randomness Complexity of Mask Refreshing Algorithm

Shuang Qiu, Rui Zhang, Yongbin Zhou and Hailong Zhang

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China

12:20-13:30

Lunch

13:30-15:15

Session 5: Applied Cryptography (I)

 

A Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-sensitivity

Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma and Liang Zheng

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Data Assurance and Communication Security Research Center, Beijing, China

State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China

 

Two Efficient Tag-based Encryption Schemes on Lattices

Xueqing Wang, Biao Wang and Rui Xue

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China

 

Compact (Targeted Homomorphic) Inner Product Encryption from LWEShort Paper

Jie Li, Daode Zhang, Xianhui Lu and Kunpeng Wang

School of Cyber Security, University of Chinese Academy of Sciences

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Science and Technology on Communication Security Laboratory

 

Compact Inner Product Encryption from LWE

Zhedong Wang, Xiong Fan and Mingsheng Wang

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Cornell University, Ithaca, NY, USA

 

Towards Tightly Secure Deterministic Public Key EncryptionShort Paper

Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu and Dingding Jia

School of Cyber Security, University of Chinese Academy of Sciences

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Science and Technology on Communication Security Laboratory

 

Efficient Inner Product Encryption with Simulation-Based SecurityShort Paper

Qingsong Zhao, Qingkai Zeng and Ximeng Liu

State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China

College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China

School of Information Systems, Singapore Management University, Singapore

College of Information Science and Technology, Nanjing Agricultural University, Nanjing, China

15:15-15:30

Coffee Break

15:30-16:40

Session 6: Attacks and Attacks Defense

 

Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks

Ievgen Kabin, Zoya Dyka, Dan Kreiser and Peter Langendoerfer

IHP, Im Technologiepark 25, 15236, Frankfurt (Oder), Germany

 

New Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model

Wenjie Yang, Jian Weng and Futai Zhang

College of Cyber Security/College of Information Science and Technology, Jinan University, Guangzhou 510632, China

School of Computer Science and Technology, Nanjing Normal University, Nanjing 210046, China

 

A Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysShort Paper

Soyoung Ahn, Hyang-Sook Lee, Seongan Lim and Ikkwon Yie

Department of Mathematics, Ewha Womans University, Seoul, Korea

Institute of Mathematical Sciences, Ewha Womans University, Seoul, Korea

Department of Mathematics, Inha University, Incheon, Korea

 

Practical Range Proof for Cryptocurrency Monero with Provable SecurityShort Paper

Kang Li, Rupeng Yang, Man Ho Au and Qiuliang Xu

Research Institute for Sustainable Urban Development, The Hong Kong Polytechnic University, Hong Kong

Department of Computing, The Hong Kong Polytechnic University, Hong Kong

School of Computer Science and Technology, Shandong University, Jinan, 250101, China

16:40-17:20

Session 7: Wireless Sensor Network Security

 

Modeling Key Infection in Large-scale Sensor Networks

Feiyang Peng, Zhihong Liu, Yong Zeng and Jialei Wang

School of Cyber Engineering, Xidian University, Xi’an, China

 

SDN-based Secure Localization in Heterogeneous WSN

Meigen Huang and Bin Yu

Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China

18:00-20:00

Welcome Reception

Thursday, December 7, 2017

Conference Room No.1, Building No.7, Beijing Friendship Hotel

2017127日,星期四

北京友谊宾馆瑞宾楼二层1号会议室

08:50-09:30

Session 8: Invited Talk II

 

Elliptic Curve Cryptosystems for IoT devices

Prof. Atsuko Miyaji

Osaka University/JAIST/CREST, Japan

09:30-10:05

Session 9: Security Applications

 

A PUF and Software Collaborative Key Protection Scheme

Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma and Liang Zheng

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Data Assurance and Communication Security Research Center, Beijing, China

State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China

 

Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger using Intel Software Guard ExtensionsShort Paper

Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik and Lingchen Zhang

Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100190, China

College of Engineering, Tennessee State University, Nashville, TN 37209

Virginia Modeling Analysis and Simulation Center, Old Dominion University, Norfolk, VA 23529

Department of Computer Science, Norfolk State University, Norfolk, VA 23504

10:05-10:45

Session 10: Malicious code defense and Mobile Security

 

Deobfuscation of Virtualization-obfuscated Code through Symbolic Execution and Compilation Optimization

Mingyue Liang, Zhoujun Li, Qiang Zeng and Zhejun Fang

Beihang University, Beijing, China

Temple University, Philadelphia PA, USA

CNCERT/CC, Beijing, China

 

A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks

Guangli Xiang, Lu Yu, Beilei Li and Mengsen Xia

College of Computer Science and Technology, Wuhan University of Technology, Wuhan, China

10:45-10:55

Coffee Break

10:55-12:25

Session 11: Applied Cryptography (II)

 

Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable DelegationShort Paper

Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu and Guang Zeng

State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Science and Technology Institute, Zhengzhou, 450001, China

Shanghai Key Lab for Trustworthy Computing, East China Normal University, Shanghai, 200062, China

Zheng Zhou Vocational University of Information and Technology, Zhengzhou, 450046, China

 

Practical Large Universe Attribute-Set Based Encryption in the Standard Model

Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen and Zhonghai Wu

School of Software and Microelectronics, Peking University, Beijing, China

National Engineering Research Center for Software Engineering, Peking University, Beijing, China

 

Fully Secure Hidden Ciphertext-Policy Attribute-based Proxy Re-encryption

Xinyu Feng, Cong Li, Dan Li, Yuejian Fang and Qingni Shen

School of Software and Microelectronics, Peking University, Beijing, China

National Engineering Research Center for Software Engineering, Peking University, Beijing, China

 

Identity-Based Group Encryption revisitedShort Paper

Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan and Shubham Sopan Dighe

Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India

National Institute of Technology, Trichy, India

 

Compact Hierarchical IBE from Lattices in the Standard Model

Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue and Bei Liang

School of Cyber Security, University of Chinese Academy of Sciences

State Key Laboratory of Information Security, Institute of Information Engineering

Science and Technology on Communication Security Laboratory

Information Science Academy, China Electronics Technology Group Corporation

Chalmers University of Technology, Gothenburg, Sweden

12:25-13:30

Lunch

13:30-14:45

Session 12: IoT Security

 

SecHome: A Secure Large-scale Smart Home System Using Hierarchical Identity based EncryptionShort Paper

Yu Li, Yazhe Wang and Yuan Zhang

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

State Key Laboratory for Novel Software Technology, Computer Science and Technology Department, Nanjing University, Nanjing 210023, China

 

Multi-attribute counterfeiting tag identification protocol in large-scale RFID system

Dali Zhu, Wenjing Rong, Di Wu and Na Pang

Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

 

Hijacking Your Routers via Control-hijacking URLs in Embedded Devices with Web Interfaces

Ming Yuan, Ye Li and Zhoujun Li

Beihang University, Beijing, China

 

A Method to Effectively Detect Vulnerabilities on Path Planning of VIN

Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang and Lei Han

Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China

Science and Technology on Information Assurance Laboratory, Beijing 100072, China

14:45-15:45

Session 13: Healthcare and Industrial Control System Security

 

Towards Decentralized Accountability and Self-Sovereignty in Healthcare Systems

Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li and Jihong Liu

Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100190, China

College of Engineering, Tennessee State University, Nashville, TN 37209

Virginia Modeling Analysis and Simulation Center, Old Dominion University, Norfolk, VA 23529

Sentara Healthcare, Norfolk, VA 23455

 

P3ASC: privacy-preserving pseudonym and attribute-based signcryption scheme for cloud-based mobile healthcare system

Changji Wang, Yuan Yuan and Shengyi Jiang

School of Information Science and Technology

Collaborative Innovation Center for 21st-Century Maritime Silk Road Studies, Guangdong University of Foreign Studies, Guangzhou 510006, China

School of Finance, Guangdong University of Foreign Studies, Guangzhou 510006, China

 

S7commTrace: A High Interactive Honeypot for Industrial Control System based on S7 Protocol

Feng Xiao, Enhong Chen and Qiang Xu

Anhui Province Key Laboratory of Big Data Analysis and Application, School of Computer Science and Technology, University of Science and Technology of China

Electronic Engineering Institute of Hefei, China

15:45-16:00

Coffee Break

16:00-17:35

Session 14: Privacy Protection

 

Research on Clustering-differential Privacy for Express Data Release

Tianying Chen and Haiyan Kang

Department of Information Security, Beijing Information Science and Technology University

 

Frequent Itemset Mining with Differential Privacy Based on Transaction TruncationShort Paper

Ying Xia, Yu Huang, Xu Zhang and HaeYoung Bae

Research Center of Spatial Information System, Chongqing University of Posts and Telecommunications, Chongqing, China

 

Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy

Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian and Laifeng Lu

School of Computer Science, Shaanxi Normal University, Xi’an 710119, China

Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China

School of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710119, China

 

The De-anonymization Method based on User Spatio-temporal Mobility Trace

Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang and Hao Li

Institute of Software Chinese academy of Science, Beijing, China

University of Chinese Academy of Sciences, Beijing, China

 

Privacy-Preserving Disease Risk Test Based on Bloom Filters

Jun Zhang, Linru Zhang, Meiqi He and Siu-Ming Yiu

Department of Computer Science, The University of Hong Kong Pokfulam Road, Hong Kong

18:00-20:00

Conference Banquet

Friday, December 8, 2017

Conference Room No.1, Friendship Palace, Beijing Friendship Hotel

2017128日,星期五

北京友谊宾馆友谊宫1号会议室

08:50-10:40

Session 15: Engineering Issues of Crypto

 

Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency

Kazuki Yoneyama and Shogo Kimura

Ibaraki University, Hitachi-shi, Ibaraki, Japan

 

Improved Automatic Search Tool for Bit-oriented Block Ciphers and Its ApplicationsShort Paper

Lingchen Li, Wenling Wu and Lei Zhang

Institute of Software, Chinese Academy of Sciences, Beijing 100190, China

University of Chinese Academy of Sciences, Beijing 100049, China

 

Hypercubes and private information retrievalShort Paper

Anirban Basu, Rui Xu, Juan Camilo Corena and Shinsaku Kiyomoto

KDDI Research, Japan

 

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion

Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo and Peng Zhang

School of Science, Nanjing University of Science and Technology, Nanjing, China

Faculty of Information Technology, Monash University, Melbourne, VIC, Australia

ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China

 

High-Performance Symmetric Cryptography Server with GPU Acceleration

Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li and Bingyu Li

Data Assurance and Communication Security Research Center, Beijing, China

State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

 

An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem

Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi

Graduate School of Mathematics, Kyushu University, Fukuoka, Japan

National Institute of Communication and Technology, Tokyo, Japan

Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan

Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan

10:40-10:50

Coffee Break

10:50-11:50

Session 16: Cloud and E-commerce Security

 

A Security-enhanced vTPM 2.0 for Cloud Computing

Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu and Huanguo Zhang

School of Computer, Wuhan University, Wuhan 430072, China

Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan 430072, China

 

SDAC: A New Software-Defined Access Control Paradigm for Cloud-based Systems

Ruan He, Montida Pattaranantakul, Zonghua Zhang and Thomas Duval

Orange labs, Châtillon, France

IMT Lille Douai, Institut Mines-Télécom

CNRS UMR 5157 SAMOVAR, France

 

A Cross-modal CCA-based Astroturfing Detection Approach

Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu and Tong Wu

Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University 100044, China

Tsinghua University, Beijing 100084, China

11:50-12:30

Session 17: Security Protocols

 

Secure and Efficient Two-factor Authentication Protocol Using RSA Signature for Multi-server Environments

Zhiqiang Xu, Debiao He, Xinyi Huang and Chao Lin

State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China

Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China

 

Authenticated Group Key Agreement Protocol without Pairing

Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch and Suman Bala

Université Libre de Bruxelles, Belgium Amity University, India

12:30-13:30

Lunch

13:30-15:10

Session 18: Network Security

 

Machine Learning for Black-Box Fuzzing of Network Protocols

Rong Fan and Yaoyao Chang

Beijing Institute of Technology, Beijing, China

 

A Novel Semantic-aware Approach for Detecting Malicious Web Traffic

Jing Yang, Liming Wang and Zhen Xu

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

 

An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift

Zhi Wang, Meiqi Tian and Chunfu Jia

College of Computer and Control Engineering, Nankai University, Tianjin 300350, China

 

Statically Defend Network Consumption against Acker Failure Vulnerability in Storm

Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang and Zhonghai Wu

School of Software and Microelectronics, Peking University, Beijing, China

National Engineering Research Center for Software Engineering, Peking University, Beijing, China

School of Electronics and Computer Engineering, Peking University, Shenzhen, China

 

Pollution Attacks Identification in Structured P2P Overlay Networks

Zied Trifa, Jalel Eddine Hajlaoui and Maher Khemakhem

MIRACL Laboratory, University of Sfax, Tunisia

MARS Research Laboratory, University of Sousse, Tunisia

College of Computing and Information Technology, University of King Abdulaziz, Saudi, Arabia

15:10-15:30

Farewell