TUESDAY / OCTOBER 21 |
19:00 |
Welcome cocktail |
WEDNESDAY / OCTOBER 22 |
08:20 - 08:50 |
Registration |
08:50 - 09:00 |
Opening remarks |
09:00 - 10:30 |
Session I: ENCRYPTION (Chair: Dimitris Gritzalis)
- "Bootstrappable Identity-Based Fully Homomorphic Encryption"
Michael Clear and Ciaran McGoldrick
- "Proxy Re-Encryption with Unforgeable Re-Encryption Keys"
Hui Guo, Zhenfeng Zhang and Jiang Zhang.
- "On the Lossiness of $2^k$-th Power and the Instantiability of Rabin-OAEP"
Xue Haiyang, Li Bao, Lu Xianhui, Wang Kunpeng and Liu Yamin
|
10:30 - 11:00 |
Coffee break |
11:00 - 11:30 |
Session II: HASH FUNCTIONS (Chair: Dimitris Gritzalis)
- "Breaking and Fixing Cryptophia's Short Combiner"
Bart Mennink and Bart Preneel
|
11:30 - 12:30 |
INVITED TALK I (Chair: Aggelos Kiayias)
|
12:30 - 14:00 |
Lunch |
14:00 - 15:30 |
Session III: CRYPTANALYSIS (Chair: Daniel Augot)
- "FFT Key Recovery for Integral Attack"
Yosuke Todo and Kazumaro Aoki
- "Message Extension Attack for Breaking Integrity of Authenticated Encryption"
Yu Sasaki and Lei Wang
- "New Second Preimage Attack Variants Against the MD-Structure"
Tuomas Kortelainen and Juha Kortelainen
|
15:30 - 16:00 |
Coffee break |
16:00 - 17:00 |
Session IV: NAME SERVICE PROTOCOLS (Chair: Moni Naor)
- "Negotiating DNSSEC Algorithms Over Legacy Proxies
Amir Herzberg and Haya Shulman
- "Matthias Wachs, Christian Grothoff and Martin Schanzenbach
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
|
20:00 |
Gala dinner |
THURSDAY / OCTOBER 23 |
08:40 - 9:00 |
Registration |
09:00 - 10:30 |
Session V: PROTOCOLS 1 (Chair: Jun Furukawa)
- "Universally Composable Oblivious Transfer based on a variant of LPN"
Bernardo David, Rafael Dowsley and Anderson Nascimento
- "Converting PKI-based Authenticated Key Exchange to Identity-based"
Kazuki Yoneyama and Koutarou Suzuki
- "Proving Correctness and Security of Two-Party Computation Implemented in Java"
Florian Böhl, Simon Greiner and Patrik Scheidecker
|
10:30 - 11:00 |
Coffee break |
11:00 - 11:30 |
Session VI: MALWARE (Chair: Aggelos Kiayias)
- "Mining API calls and Permissions for Android Malware Detection using Machine Learning Classifiers"
Akanksha Sharma and Subrat Dash
|
11:30 - 12:30 |
INVITED TALK II (Chair: Dimitris Gritzalis)
|
12:30 - 14:00 |
Lunch |
14:00 - 15:30 |
Session VII: PROTOCOLS 2 (Chair: Yvo Desmedt)
- "Direct Anonymous Attestations with Dependent Basename Opening"
Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders and Jacques Traoré
- "A Storage-efficient and Robust Private Information Retrieval Scheme allowing few servers"
Daniel Augot, Françoise Levy-Dit-Vehel and Abdullatif Shikfa
- "Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-Silent Players"
Sourya Joyee De, Sushmita Ruj and Asim K. Pal
|
15:30 - 16:00 |
Coffee break |
16:00 - 17:30 |
Session VIII: PRIVACY AND IDENTIFICATION (Chair: Bart Mennik)
- "Attribute Based Signatures with User-Controlled Linkability
Ali El Kaafarani, Liqun Chen and Essam Ghadafi.
- "Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Antonio de La Piedra, Jaap-Henk Hoepman and Pim Vullers.
- "Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
Aysajan Abidin, Aikaterini Mitrokotsa and Kanta Matsuura.
|
FRIDAY / OCTOBER 24 |
08:40 - 09:00 |
Registration |
09:00 - 10:30 |
Session IX: PRIVACY PROTOCOLS AND PRIMITIVES (Chair: Amir Herzberg)
- "Private and Dynamic Time-Series Data Aggregation with Trust Relaxation"
Iraklis Leontiadis, Kaoutar Elkhiyaoui and Refik Molva
- "Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation"
Felix Günther, Mark Manulis and Andreas Peter
- "Short Comparable Encryption"
Jun Furukawa
|
10:30 - 11:00 |
Coffee break |
11:00 - 11:30 |
Session X: ACCESS CONTROL (Chair: Haya Shulman)
- "Decentralized Distributed Data Usage Control"
Florian Kelbert and Alexander Pretschner
|
11:30 - 12:30 |
INVITED TALK III (Chair: Ioannis Askoxylakis)
|
12:30 - 14:00 |
Lunch |
14:00 - 15:00 |
Session XI: SIGNATURES AND CURVES (Chair: Christian Grothoff)
- "Efficient Signatures with Tight Real World Security in the Random-Oracle Model"
Christoph Bader
- "More Sparse Families of Pairing-Friendly Elliptic Curves"
Georgios Fotiadis and Elisavet Konstantinou
|
15:00 |
Conference adjourns |
15:30 - 19:00 |
Visit to the archaelogical museum of Heraklion |