ProvSec

 

ProvSec 2016 Conference Schedule

November 9

November 10

November 11

 

 

 

 

 

 

 

 

 

 

 

Registration    8:30-22:00

Lobby of Main   Building, Nanjing Shuangmenlou Hotel

(南京双门楼宾馆主楼大厅)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Registration    8:30-22:00 Lobby of Main   Building, Nanjing Shuangmenlou Hotel

(南京双门楼宾馆主楼大厅)

Opening   Session

8:30-9:00

Yijiangnan   Hall,Yuejing Building

(悦景楼忆江南厅)

Keynote   2

9:00-10:00

Yijiangnan   Hall,Yuejing Building

(悦景楼忆江南厅)

Keynote   1

9:30-10:30

(Yijiangnan   Hall,Yuejing Building)

(悦景楼忆江南厅)

Coffee Break

10:00-10:20

Coffee Break

10:30-10:50

Session   4: Data in the Cloud (5 papers)

10:20-12:25

Yijiangnan   Hall,Yuejing Building

(悦景楼忆江南厅)

Session   1: Attribute/role-based Cryptography

(4   papers)

10:50-12:30

Yijiangnan   Hall,Yuejing   Building

(悦景楼忆江南厅)

Lunch Buffet

12:25-14:00

Lunch Buffet

12:30-14:00

Session 5: Key Management (3 papers)

14:00-15:15

Mantingfang   Hall, Yuejing   Building

(悦景楼满庭芳厅)

Session 2: Homomorphic Encryption  (3 papers)

14:00-15:15

Mantingfang   Hall, Yuejing   Building

(悦景楼满庭芳厅)

Coffee Break

15:15-15:35

 

Coffee Break

15:15-15:35

Session 6: Leakage Analysis (3 papers)

15:35-16:50

Mantingfang   Hall, Yuejing   Building

(悦景楼满庭芳厅)

Session   3: Encryption (5 papers)

15:35-17:40

Mantingfang   Hall, Yuejing   Building

(悦景楼满庭芳厅)

Closing Remarks

16:50-17:00

Mantingfang   Hall, Yuejing   Building

(悦景楼满庭芳厅)


Conference Banquet

18:00

Haitang   Hall, Main Building

(主楼海棠厅)

Dinner Buffet

18:00


ProvSec 2016 Technical Program

Keynote Speaker I

November 10 (day 1): 9:30 - 10:30

Session Chair: Liqun Chen

Yijiangnan Hall,Yuejing Building

(悦景楼忆江南厅)

A Classification of   Non-interactive Assumptions in Cyclic Groups

Prof. Jens Groth University College London UK

Session 1: Attribute/role-based Cryptography

November 10 (day 1): 10:50 - 12:30

Session Chair: Joseph Liu

Yijiangnan Hall,Yuejing Building

(悦景楼忆江南厅)

Accountable   Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public   Verifiability and Nonrepudiation

Gang Yu, Zhenfu Cao, Guang Zeng and Wenbao Han

An   Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme   with Partially Hidden Access Structures

Hui Cui, Robert H. Deng, Guowei   Wu and Junzuo Lai

Ciphertext-Policy Attribute Based Encryption   Supporting Access Policy Update

Yinhao Jiang, Willy Susilo, Yi   Mu and Fuchun Guo

Universally Composable Cryptographic   Role-Based Access Control

Bin Liu and Bogdan Warinschi

                                                                                        Session 2: Homomorphic   Encryption

                                                                                    November 10 (day 1): 14:00 - 15:15

                                                                                        Session Chair: Willy Susilo

                                                                                        Mantingfang Hall, Yuejing   Building

                                                                                       (悦景楼满庭芳厅)

A Homomorphic Proxy Re-encryption From   Lattices

Chunguang Ma, Juyan Li and Weiping Ouyang

Preventing   Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption   Scheme (Short paper)

Zengpeng Li, Steven D. Galbraith and   Chunguang Ma

A   Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple   Auctioneer Servers (Work in Progress)

 Jun   Gao, Jiaqi Wang, Ning Lu, Fang Zhu and Wenbo Shi

                                                                                        Session 3: Encryption

                                                                                    November 10 (day 1): 15:35 - 17:40

                                                                                    Session Chair: Xiaofeng Chen

                                                                                        Mantingfang Hall, Yuejing Building

                                                                                  (悦景楼满庭芳厅)

Oblivious Keyword Search with Authorization

Peng Jiang, Xiaofen Wang, Jianchang Lai,   Fuchun Guo and Rongmao Chen

Efficient Asymmetric Index Encapsulation   Scheme for Named Data

Rong Ma and Zhenfu Cao

Integrity Analysis of Authenticated   Encryption Based on Stream Ciphers

Kazuya Imamura, Kazuhiko Minematsu and   Tetsu Iwata

Secure and Efficient Construction of   Broadcast Encryption with Dealership

Kamalesh Acharya and Ratna Dutta

Towards Certificate-Based Group Encryption (Short  paper)

Yili Ren, Xiling Luo, Qianhong Wu, Joseph   Liu and Zhang Peng

                                                                                        Keynote Speaker II

                                                                                        November 11 (day 2): 9:00 -   10:00

                                                                                        Session Chair: Jinguang Han

                                                                                        Yijiangnan Hall,Yuejing Building

                                                                                       (悦景楼忆江南厅)

Modelling the Security of   Key Exchange

Prof. Colin Boyd Norwegian University of Science and TechnologyNorway

                                                                                        Session 4: Data in the Cloud

                                                                                        November 11 (day 2): 10:20 -   12:25

                                                                                        Session Chair: Xinyi Huang

                                                                                        Yijiangnan Hall,Yuejing Building

                                                                                       (悦景楼忆江南厅)

ID-based Data Integrity Auditing Scheme from   RSA with Resisting Key Exposure

Jianhong Zhang, Pengyan Li,   Zhibin Sun and Jian Mao

Efficient Dynamic Provable Data Possession   from Dynamic Binary Tree (Short Paper)

Changfeng Li and Huaqun Wang

Identity-Based Batch Provable Data Possession

Fucai Zhou, Su Peng, Jian Xu and Zifeng Xu

Secure Naїve Bayesian Classification over   Encrypted Data in Cloud

Xingxin Li, Youwen Zhu and Jian Wang

Integrity Preserving Multi-keyword Searchable   Encryption for Cloud Computing

 Fucai Zhou, Yuxi Li, Alex X Liu, Muqing Lin  and Zifeng Xu

                                                                                        Session 5: Key Management

                                                                                        November 11 (day 2): 14:00 - 15:15

                                                                                        Session Chair: Sherman Chow

                                                                                        Mantingfang Hall, Yuejing   Building

                                                                                       (悦景楼满庭芳厅)

Multi-Cast Key Distribution: Scalable,   Dynamic and Provably Secure Construction

Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji and Tomohide Yamamoto

One-round Attribute-based Key Exchange in the   Multi-Party Setting

Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang and Yong Yu

Strongly   Secure Two-Party Certificateless Key Agreement Protocol with Short Message (Short Paper)

Yong Xie, Libing Wu, Yubo Zhang and Zhiyan Xu

                                                                                        Session 6: Leakage Analysis

                                                                                    November 11 (day 2): 15:35 - 16:50

                                                                                        Session Chair: Qianhong Wu

                                                                                        Mantingfang Hall, Yuejing   Building

                                                                                      (悦景楼满庭芳厅)

A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model  

Jianye Huang, Qiong Huang and Chunhua Pan

Towards Proofs of Ownership Beyond Bounded  Leakage

Yongjun Zhao and Sherman S. M. Chow

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage (Short paper)

Sujuan Li, Yi Mu, Mingwu Zhang  and Futai Zhang

 



2015-2016 All Rights Rreserved.