FORTH - Institute of Computer ScienceInternational Association for Cryptologic Research

  Co-operated by:

Program

TUESDAY / OCTOBER 21
19:00 Welcome cocktail

WEDNESDAY / OCTOBER 22
08:20 - 08:50 Registration
08:50 - 09:00 Opening remarks
09:00 - 10:30

Session I: ENCRYPTION (Chair: Dimitris Gritzalis)

  • "Bootstrappable Identity-Based Fully Homomorphic Encryption"
    Michael Clear and Ciaran McGoldrick
  • "Proxy Re-Encryption with Unforgeable Re-Encryption Keys"
    Hui Guo, Zhenfeng Zhang and Jiang Zhang.
  • "On the Lossiness of $2^k$-th Power and the Instantiability of Rabin-OAEP"
    Xue Haiyang, Li Bao, Lu Xianhui, Wang Kunpeng and Liu Yamin
10:30 - 11:00 Coffee break
11:00 - 11:30

Session II: HASH FUNCTIONS (Chair: Dimitris Gritzalis)

  • "Breaking and Fixing Cryptophia's Short Combiner"
    Bart Mennink and Bart Preneel
11:30 - 12:30

INVITED TALK I (Chair: Aggelos Kiayias)

12:30 - 14:00 Lunch
14:00 - 15:30

Session III: CRYPTANALYSIS (Chair: Daniel Augot)

  • "FFT Key Recovery for Integral Attack"
    Yosuke Todo and Kazumaro Aoki
  • "Message Extension Attack for Breaking Integrity of Authenticated Encryption"
    Yu Sasaki and Lei Wang
  • "New Second Preimage Attack Variants Against the MD-Structure"
    Tuomas Kortelainen and Juha Kortelainen
15:30 - 16:00 Coffee break
16:00 - 17:00

Session IV: NAME SERVICE PROTOCOLS (Chair: Moni Naor)

  • "Negotiating DNSSEC Algorithms Over Legacy Proxies
    Amir Herzberg and Haya Shulman
  • "Matthias Wachs, Christian Grothoff and Martin Schanzenbach
    A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
20:00 Gala dinner

THURSDAY / OCTOBER 23
08:40 - 9:00 Registration
09:00 - 10:30

Session V: PROTOCOLS 1 (Chair: Jun Furukawa)

  • "Universally Composable Oblivious Transfer based on a variant of LPN"
    Bernardo David, Rafael Dowsley and Anderson Nascimento
  • "Converting PKI-based Authenticated Key Exchange to Identity-based"
    Kazuki Yoneyama and Koutarou Suzuki
  • "Proving Correctness and Security of Two-Party Computation Implemented in Java"
    Florian Böhl, Simon Greiner and Patrik Scheidecker
10:30 - 11:00 Coffee break
11:00 - 11:30

Session VI: MALWARE (Chair: Aggelos Kiayias)

  • "Mining API calls and Permissions for Android Malware Detection using Machine Learning Classifiers"
    Akanksha Sharma and Subrat Dash
11:30 - 12:30

INVITED TALK II (Chair: Dimitris Gritzalis)

12:30 - 14:00 Lunch
14:00 - 15:30

Session VII: PROTOCOLS 2 (Chair: Yvo Desmedt)

  • "Direct Anonymous Attestations with Dependent Basename Opening"
    Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders and Jacques Traoré
  • "A Storage-efficient and Robust Private Information Retrieval Scheme allowing few servers"
    Daniel Augot, Françoise Levy-Dit-Vehel and Abdullatif Shikfa
  • "Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-Silent Players"
    Sourya Joyee De, Sushmita Ruj and Asim K. Pal
15:30 - 16:00 Coffee break
16:00 - 17:30

Session VIII: PRIVACY AND IDENTIFICATION (Chair: Bart Mennik)

  • "Attribute Based Signatures with User-Controlled Linkability
    Ali El Kaafarani, Liqun Chen and Essam Ghadafi.
  • "Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
    Antonio de La Piedra, Jaap-Henk Hoepman and Pim Vullers.
  • "Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    Aysajan Abidin, Aikaterini Mitrokotsa and Kanta Matsuura.


FRIDAY / OCTOBER 24
08:40 - 09:00 Registration
09:00 - 10:30

Session IX: PRIVACY PROTOCOLS AND PRIMITIVES (Chair: Amir Herzberg)

  • "Private and Dynamic Time-Series Data Aggregation with Trust Relaxation"
    Iraklis Leontiadis, Kaoutar Elkhiyaoui and Refik Molva
  • "Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation"
    Felix Günther, Mark Manulis and Andreas Peter
  • "Short Comparable Encryption"
    Jun Furukawa
10:30 - 11:00 Coffee break
11:00 - 11:30

Session X: ACCESS CONTROL (Chair: Haya Shulman)

  • "Decentralized Distributed Data Usage Control"
    Florian Kelbert and Alexander Pretschner
11:30 - 12:30

INVITED TALK III (Chair: Ioannis Askoxylakis)

12:30 - 14:00 Lunch
14:00 - 15:00

Session XI: SIGNATURES AND CURVES (Chair: Christian Grothoff)

  • "Efficient Signatures with Tight Real World Security in the Random-Oracle Model"
    Christoph Bader
  • "More Sparse Families of Pairing-Friendly Elliptic Curves"
    Georgios Fotiadis and Elisavet Konstantinou
15:00 Conference adjourns
15:30 - 19:00 Visit to the archaelogical museum of Heraklion