Jingqiang Lin Qiang Tang (Eds.) 448 Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022 Virtual Event, May 14–15, 2022 Proceedings 123 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 448 EditorialBoardMembers OzgurAkan MiddleEastTechnicalUniversity,Ankara,Turkey PaoloBellavista UniversityofBologna,Bologna,Italy JiannongCao HongKongPolytechnicUniversity,HongKong,China GeoffreyCoulson LancasterUniversity,Lancaster,UK FalkoDressler UniversityofErlangen,Erlangen,Germany DomenicoFerrari UniversitàCattolicaPiacenza,Piacenza,Italy MarioGerla UCLA,LosAngeles,USA HisashiKobayashi PrincetonUniversity,Princeton,USA SergioPalazzo UniversityofCatania,Catania,Italy SartajSahni UniversityofFlorida,Gainesville,USA XueminShen UniversityofWaterloo,Waterloo,Canada MirceaStan UniversityofVirginia,Charlottesville,USA XiaohuaJia CityUniversityofHongKong,Kowloon,HongKong AlbertY.Zomaya UniversityofSydney,Sydney,Australia Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/8197 · Jingqiang Lin Qiang Tang (Eds.) Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022 Virtual Event, May 14–15, 2022 Proceedings Editors JingqiangLin QiangTang UniversityofScienceandTechnology TheUniversityofSydney ofChina Sydney,NSW,Australia Hefei,Anhui,China ISSN 1867-8211 ISSN 1867-822X (electronic) LectureNotesoftheInstituteforComputerSciences,SocialInformatics andTelecommunicationsEngineering ISBN 978-3-031-17080-5 ISBN 978-3-031-17081-2 (eBook) https://doi.org/10.1007/978-3-031-17081-2 ©ICSTInstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface We are delighted to introduce the proceedings of the 2022 European Alliance for Innovation (EAI) International Conference on Applied Cryptography in Computer and Communications (AC3 2022). This conference brought together researchers, developers, and practitioners around the world who focus on all technical aspects of appliedcryptographyincluding,butnotlimitedto,cryptographicalgorithms,protocols, implementations,standardsandpractices,andapplicationsofcryptographyincomputer, information,andsystemsecurity.SomeoftheworkspresentedatAC32022alsoapplied cryptographictechnologiestosolvesecurityproblemsinreal-worldsystems,including cloudservices,theInternetofThings,cyber-physicalsystems,distributedsystems,edge computing,information-centricnetworks,databases,datacenters,etc. The technical program of AC3 2022 consisted of 14 papers in oral presentation sessionsatsixmainconferencetracks:Track1–Quantum-SafeCryptographicSolution; Track2–AppliedCryptographyforIoT;Track3–AuthenticationProtocol;Track4– Real-WorldAppliedCryptography;Track5–NetworkAttackandDefense;andTrack 6–SecurityApplication.Asidefromthehigh-qualitytechnicalpaperpresentations,the technicalprogramalsofeaturedtwokeynotespeechesdeliveredbyJuanA.Garayfrom TexasA&MUniversity,USA,andMeiqinWangfromShandongUniversity,China. Coordination with the steering committee, including Imrich Chlamtac (chair), Bo Chen, and Bo Luo, was essential for the success of the conference. We sincerely appreciate their constant support and guidance. It was also a great pleasure to work with such an excellent organizing committee team for their hard work in organizing andsupportingtheconference.Inparticular,wearegratefultotheTechnicalProgram Committee,whocompletedthepeer-reviewprocessforthetechnicalpapersandhelped to put together a high-quality technical program. We are also grateful to Conference ManagersMartinVojtekandLuciaSedlarovafortheirsupportandalltheauthorswho submittedtheirpaperstotheAC32022conference. We strongly believe that the AC3 conference provides a good forum for all researchers,developers,andpractitionerstodiscussallscienceandtechnologyaspects thatarerelevanttoappliedcryptography.WealsoexpectthatthefutureAC3conferences will be as successful and stimulating as this year’s, as indicated by the contributions presentedinthisvolume. May2021 JingqiangLin QiangTang Organization SteeringCommittee ImrichChlamtac UniversityofTrento,Italy BoChen MichiganTechnologicalUniversity,USA JingqiangLin UniversityofScienceandTechnologyofChina, China BoLuo UniversityofKansas,USA OrganizingCommittee HonoraryChair YongbiaoLiu JinlingInstituteofTechnology,China GeneralChairs BoLuo UniversityofKansas,USA ZhengZhang JinlingInstituteofTechnology,China TechnicalProgramCommitteeChairs JingqiangLin UniversityofScienceandTechnologyofChina, China QiangTang UniversityofSydney,Australia SponsorshipandExhibitChair HuiminYou JiangsuComputerSociety,China LocalChair AiyanQu JinlingInstituteofTechnology,China WorkshopsChair LeGuan UniversityofGeorgia,USA viii Organization PublicityandSocialMediaChairs JunDai CaliforniaStateUniversity,USA JunShao ZhejiangGongshangUniversity,China ChengluJin CWIAmsterdam,TheNetherlands PublicationsChairs YuanHong IllinoisInstituteofTechnology,USA ShuchengYu StevensInstituteofTechnology,USA WebChair ZeyanLiu UniversityofKansas,USA PostersandPhDTrackChairs AlexBardas UniversityofKansas,USA DrewDavidson UniversityofKansas,USA DemosChair ShuhuiYang PurdueUniversityNorthwest,USA TechnicalProgramCommittee AnjiaYang JinanUniversity,China BernardoDavid ITUniversityofCopenhagen,Denmark BingyuLi BeihangUniversity,China DebiaoHe WuhanUniversity,China DingWang NankaiUniversity,China FeiGao BeijingUniversityofPostsandCommunications, China GuangquanXu TianjinUniversity,China HaixinDuan TsinghuaUniversity,China JiagengChen CentralChinaNormalUniversity,China JianShen NanjingUniversityofInformationScienceand Technology,China JingChen WuhanUniversity,China JosefPieprzyk CSIROData61,Australia JunShao ZhejiangGongshangUniversity,China KhoaNguyen UniversityofWollongong,Australia LeGuan UniversityofGeorgia,USA Organization ix LiYang XidianUniversity,China LongChen InstituteofSoftware,ChineseAcademyof Sciences,China PingChen FudanUniversity,China QiongxiaoWang InstituteofInformationEngineering,Chinese AcademyofSciences,China ShermanS.M.Chow TheChineseUniversityofHongKong, HongKong ShijieJia InstituteofInformationEngineering,Chinese AcademyofSciences,China TianqiZhou NanjingUniversityofInformationScienceand Technology,China XimengLiu FuzhouUniversity,China XiuhuaWang HuazhongUniversityofScienceandTechnology, China XuyunNie UniversityofElectronicScienceandTechnology ofChina,China YongjunZhao NanyangTechnologicalUniversity,Singapore YueqiangCheng NIOSecurityResearch,USA Contents Quantum-SafeCryptographicSolution DU-QS22:ADatasetforAnalyzingQC-MDPC-BasedQuantum-Safe Cryptosystems ........................................................ 3 MohammadRezaNosouhi,SyedW.Shah,LeiPan,andRobinDoss Quantum-SafeSigningofNotificationMessagesinIntelligentTransport Systems .............................................................. 11 SaraNikula,KimmoHalunen,andVisaVallivaara AppliedCryptographyforIoT WB-GWS: An IoT-Oriented Lightweight Gateway System Based onWhite-BoxCryptography ............................................ 29 JinfuHao,YongbaoWang,WeijieDeng,NanjiangXie,andZhengGong Symmetric Key Based Scheme for Verification Token Generation inInternetofThingsCommunicationEnvironment ......................... 46 KeyanAbdul-AzizMutlaq, VincentOmolloNyangaresi, MohdAdibOmar,andZaidAmeenAbduljabbar Resource Consumption Evaluation of C++ Cryptographic Libraries onResource-ConstrainedDevices ........................................ 65 RazvanRaducu,RicardoJ.Rodríguez,andPedroÁlvarez AuthenticationProtocol ASecureLightweightRFIDMutualAuthenticationProtocolWithout ExplicitChallenge-ResponsePairs ....................................... 79 KekeHuang,ChangluLin,andYaliLiu bisAUTH:ABlockchain-InspiredSecureAuthenticationProtocolforIoT Nodes ............................................................... 108 CherifDiallo Real-WorldAppliedCryptography X-FTPC: A Fine-Grained Trust Propagation Control Scheme forCross-CertificationUtilizingCertificateTransparency ................... 123 ShushangWen,BingyuLi,ZiqiangMa,QianhongWu,andNenghaiYu