ebook img

Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers PDF

549 Pages·2018·21.116 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers

Srdjan Capkun Sherman S. M. Chow (Eds.) 1 6 Cryptology and 2 1 1 S Network Security C N L 16th International Conference, CANS 2017 Hong Kong, China, November 30 – December 2, 2017 Revised Selected Papers 123 Lecture Notes in Computer Science 11261 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology Madras, Chennai, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Srdjan Capkun Sherman S. M. Chow (Eds.) (cid:129) Cryptology and Network Security 16th International Conference, CANS 2017 – Hong Kong, China, November 30 December 2, 2017 Revised Selected Papers 123 Editors SrdjanCapkun ShermanS. M.Chow ETHZürich ChineseUniversity ofHong Kong Zürich,Switzerland Shatin, HongKong ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-030-02640-0 ISBN978-3-030-02641-7 (eBook) https://doi.org/10.1007/978-3-030-02641-7 LibraryofCongressControlNumber:2018953695 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerNatureSwitzerlandAG2018 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The 16th International Conference on Cryptology and Network Security (CANS) was heldinShatin,HongKong,fromNovember29toDecember2,2017,organizedbythe Department of Information Engineering (IE), The Chinese University of Hong Kong (CUHK), in cooperation with the International Association for Cryptologic Research (IACR). CANS is an established annual conference, focusing on all aspects of cryptology, and of data, network, and system security, attracting cutting-edge results from world-renowned scientists in the area. Earlier editions were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), Crete (2014), Marrakesh (2015), and Milan (2016). We received 88 submissions from 28 different countries/regions (one submission waslaterwithdrawn).Thereviewwasdoneviaarigorousdouble-blindpeerreviewby a Program Committee (PC) consisting of 58 experts from the fields of cryptology and network security. The PC was assisted by 86 external reviewers. Each regular sub- mission was assigned to four reviewers while a short-paper/poster submission was assignedtothreereviewers.ForanyPCco-authoredsubmission,anadditionalreviewer was assigned. In total, 351 reviews were submitted, around four on average per sub- mission,witharound70%ofthereviewspreparedbythePCandtheremainderbythe external reviewers. The PC decided to accept 20 regular papers (an acceptance rate of 22.72%) and eight short papers. The present proceedings volume contains revised versions of all the papers presented at the conference. The program featured two invited keynotes given by Ahmad-Reza Sadeghi (TU Darmstadt, Germany) on “Hardware-Assisted Security: From PUF to SGX” and Nico Döttling (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany) on “Identity-Based Encryption from Standard Assumptions (or the Unexpected Virtue of Garbled Circuits).” We also shared two joint invited talks with the co-located Inter- nationalConferenceonInformationTheoreticSecurity(ICITS),whichwere“Physical Assumptions for Long-Term Secure Communication” by Reihaneh Safavi-Naini (UniversityofCalgary,Canada)and“SecretSharingSchemes:SomeNewApproaches and Problems” by Huaxiong Wang (Nanyang Technological University, Singapore). Special thanks go to Stanislaw Jarecki (University of California, Irvine, USA). WewouldliketothanktheauthorsforsubmittingtheirpaperstoCANS,aswellas thehardworkofthePCandexternalreviewersfordecidingtheprogram.Inparticular, we would like to thank Amir, Aurélien, Bogdan, David, Dominique, Hong-Sheng, Jiang,Patrick,Stjepan,Tarik,andVincenzoforvolunteeringtohelptheauthorsshape the revised versions of the papers. We thank EasyChair for its excellent review plat- form and Springer for its continuous support of CANS. Organizing a conference is not an easy task. We would like to thank the general chair,KehuanZhang,publicationco-chairs,publicityco-chairs,sessionchairs,andthe VI Preface supporting staff of the hosting department (IE at CUHK). This year, CANS was co-located with ICITS. We would also like to thank the ICITS 2017 PC chair, Junji Shikata,thegeneralchair,KennethW.Shum,andthejointlocalorganizingcommittee ofCANS2017andICITS2017.Finally,wewouldliketothanktheorganizingteamof CANS 2016 and the Steering Committee for helpful advice. December 2017 Srdjan Capkun Sherman S. M. Chow Organization CANS2017isorganizedbytheDepartmentofInformationEngineering,TheChinese University of Hong Kong, in cooperation with the International Association for Cryptologic Research (IACR). Program Co-chairs Srdjan Capkun ETH Zürich, Switzerland Sherman S. M. Chow Chinese University of Hong Kong, SAR China General Chair Kehuan Zhang Chinese University of Hong Kong, SAR China Publication Co-chairs Russell W. F. Lai Friedrich Alexander University, Erlangen Nürnberg, Germany Yongjun Zhao Chinese University of Hong Kong, SAR China Publicity Co-chairs Reza Azarderakhsh Florida Atlantic University, USA Aniello Castiglione University of Salerno, Italy Aanjhan Ranganathan ETH Zürich, Switzerland Qian Wang Wuhan University, China Steering Committee Yvo Desmedt University of College London, UK and University of Texas at Dallas, USA Juan A. Garay Yahoo! Labs, USA Amir Herzberg Bar-Ilan University, Israel Yi Mu University of Wollongong, Australia David Pointcheval CNRS and ENS Paris, France Huaxiong Wang Nanyang Technical University, Singapore Program Committee Elli Androulaki IBM Research Zürich, Switzerland Frederik Armknecht University of Mannheim, Germany VIII Organization Man Ho Au Hong Kong Polytechnic University, SAR China Lejla Batina Radboud University Nijmegen, The Netherlands Iddo Bentov Cornell University, USA Igor Bilogrevic Google, Switzerland Kevin Butler University of Florida, USA Bogdan Carbunar Florida International University, USA Aniello Castiglione University of Salerno, Italy Yingying Chen Rutgers University, USA Yu Chen Chinese Academy of Sciences, China Pietro Colombo University of Insubria, Italy Bernardo David Tokyo Institute of Technology, Japan Adam Doupe Arizona State University, USA Aurélien Francillon EURECOM, France Arthur Gervais ETH Zürich, Switzerland Jinguang Han University of Surrey, UK Gerhard Hancke City University of Hong Kong, SAR China Amir Herzberg Bar-Ilan University, Israel Vincenzo Iovino University of Luxembourg, Luxembourg Ramya Jayaram Masti Intel, USA Florian Kerschbaum University of Waterloo, Canada Aggelos Kiayias University of Edinburgh, UK Kwangjo Kim Korea Advanced Institute of Science and Technology, South Korea Tancrède Lepoint SRI International, USA Ming Li University of Arizona, USA Yao Liu University of South Florida, USA Zhe Liu University of Luxembourg, Luxembourg Matteo Maffei TU Vienna, Austria Ivan Martinovic University of Oxford, UK Daniel Masny University of California, Berkeley, USA Rene Mayrhofer Johannes Kepler University Linz, Austria Tarik Moataz Brown University, USA Refik Molva EURECOM, France Antonio Nicolosi Stevens Institute of Technology, USA C. Pandu-Rangan Indian Institute of Technology Madras, India Panos Papadimitratos KTH Royal Institute of Technology, Sweden Stjepan Picek Katholieke Universiteit Leuven, Belgium Michalis Polychronakis Stony Brook University, USA William Robertson Northeastern University, USA Pierangela Samarati Università degli Studi di Milano, Italy Thomas Schneider TU Darmstadt, Germany Dominique Schroeder Friedrich-Alexander-Universiät Erlangen-Nürnberg, Germany Stelios Sidiroglou Massachusetts Institute of Technology, USA Elizabeth Stobert ETH Zürich, Switzerland Willy Susilo University of Wollongong, Australia Organization IX Patrick Tague Carnegie Mellon University, USA Nils Ole Tippenhauer Singapore University of Technology and Design Patrick Traynor University of Florida, USA Mayank Varia Boston University, USA Ding Wang Peking University, China Qian Wang Wuhan University, China David J. Wu Stanford University, USA Jiang Zhang State Key Laboratory of Cryptology, China Yinqian Zhang The Ohio State University, USA Yongjun Zhao Chinese University of Hong Kong, SAR China Yunlei Zhao Fudan University, China Hong-Sheng Zhou Virginia Commonwealth University, USA Additional Reviewers Muhamad Erza Aminanto Kexin Hu Matthew Smith Hyeongcheol An Michael Hölzl Najmeh Soroush Monir Azraoui Peng Jiang Martin Strohmeier David Barrera Jongkil Kim Fei Tang Carsten Baum Panagiotis Kintis Vincent Taylor Mai Ben Adar - Bessos Agnes Kiss Sri Aravinda Thyagarajan Alastair Beresford Russell W. F. Lai Orfeas Stefanos Simon Birnbach Iraklis Leontiadis Thyfronitis Litos Cecilia Boschini Minghui Li Alberto Trombetta Jonas Böhler Wenting Li Yiannis Tselekounis Guoxing Chen Zengpeng Li Binbin Tu Haibo Cheng Hui Ma Cédric Van Rompay Joseph Choi Xinshu Ma Dimitrios Vasilopoulos Rakyong Choi Giulio Malavolta Damian Vizár Hui Cui Vasily Mikhalev Boyang Wang Joan Daemen Martín Ochoa Chengyu Wang Daniel Demmler Giorgos Panagiotakos Jun Wang Christoph Egger Sikhar Patranabis Christian Weinert Kaoutar Elkhiyaoui Tran Viet Xuan Phuong Harry W. H. Wong Katharina Fech Ania Piotrowska Lei Wu Nils Fleischhacker Sebastian Poeplau Kang Yang Benny Fuhry Rakyong Rakyong Rupeng Yang Michael Goberman Ruben Recabarren Jingyue Yu Clémentine Gritti Manuel Reinert Fan Zhang Vincent Grosso Joost Renes Xiaokuan Zhang Hui Guo Katerina Samari Lingchen Zhao Yiming Guo Sarah Scheffler Minghao Zhao Florian Hahn Clara Schneidewind Xinjie Zhao Thomas Hayes Emily Shen Dionysis Zindros

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.