ebook img

Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings PDF

618 Pages·2018·26.054 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings

Chunhua Su Hiroaki Kikuchi (Eds.) 5 2 1 Information Security 1 1 S C Practice and Experience N L 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings 123 Lecture Notes in Computer Science 11125 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology Madras, Chennai, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Chunhua Su Hiroaki Kikuchi (Eds.) (cid:129) Information Security Practice and Experience 14th International Conference, ISPEC 2018 – Tokyo, Japan, September 25 27, 2018 Proceedings 123 Editors Chunhua Su HiroakiKikuchi University of Aizu MeijiUniversity Aizuwakamatsu Tokyo Japan Japan ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-99806-0 ISBN978-3-319-99807-7 (eBook) https://doi.org/10.1007/978-3-319-99807-7 LibraryofCongressControlNumber:2018952672 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerNatureSwitzerlandAG2018 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface This volume contains the papers presented at ISPEC 2018: the 14th International Conference on Information Security Practice and Experience held during September 25–27, 2018, in Tokyo. TheISPECconferenceseriesisanestablishedforumthatbringstogetherresearchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. Previously, ISPEC took place in Singapore (2005), Hangzhou, China (2006), HongKong,SARChina(2007),Sydney,Australia(2008),Xi’an,China(2009),Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), Lanzhou, China (2013), Fuzhou, China (2014), Beijing, China (2015), Zhangjiajie, China (2016) and Melbourne, Australia (2017). In this year, there were 73 submissions in total. Each submission was reviewed by anaverageof2.8ProgramCommittee(PC)members.Thecommitteedecidedtoaccept two invited papers, 25 full papers, and 12 short papers, with an acceptance ratio of 34.2%. ISPEC 2018 was made possible by the joint effort of numerous people and organizationsworldwide.Thereisalonglistofpeoplewhovolunteeredtheirtimeand energy to put together the conference and who deserve special thanks. First and foremost,wearedeeplygratefultoallthePCmembersfortheirgreateffortinreading, commenting on, debating, and finally selecting the papers. We also thank all the external reviewers for assisting the PC in their particular areas of expertise. We would like to emphasize our gratitude to the general chairs, Prof. Kazuamsa Omote and Prof. Jiageng Chen, for theirgenerous support and leadership that ensured thesuccessoftheconference.Thanksalsogototheliaisonchair,Dr.NaotoYanai,the local organizing chair, Dr. Keita Emura, the publication chairs, Dr. Weizhi Meng and Prof. Takeshi Okamoto, the publicity chair, Prof. Atsuo Inomata, and the registration chair, Prof. Masaki Fujikawa. We sincerely thank the authors of all submitted papers and all the conference attendees. Thanks are also due to the staff at Springer for their help in producing the proceedings and to the developers and maintainers of the EasyChair software, which greatlyhelpedsimplifythesubmissionandreviewprocess.Lastbutcertainlynotleast, ourthanks gototheJapanese Research SocietyISEC ofIEICEandCSECofIPSJfor supporting the conference, as well as Hitachi, Ltd., Mitsubishi Electric Corporation, TOSHIBA Corporation, Huawei Technologies Co., Ltd., and ANDISEC, Ltd. for sponsoring the conference. July 2018 Chunhua Su Hiroaki Kikuchi Organization Honorary Chair Eiji Okamoto University of Tsukuba, Japan General Co-chairs Kazumasa Omote University of Tsukuba, Japan Jiageng Chen Central China Normal University, China Program Co-chairs Chunhua Su University of Aizu, Japan Hiroaki Kikuchi Meiji University, Japan Liaison Chair Naoto Yanai Osaka University, Japan Local Organizing Chair Keita Emura NICT, Japan Publication Co-chairs Weizhi Meng Technical University of Denmark, Denmark Takeshi Okamoto Tsukuba University of Technology, Japan Publicity Co-chairs Debiao He Wuhan University, China Atsuo Inomata Tokyo Denki University/NAIST, Japan Registration Chair Masaki Fujikawa Kogakuin University, Japan Web Chair Kaitai Liang University of Surrey, UK VIII Organization Program Committee Man Ho Au The Hong Kong Polytechnic University, SAR China Joonsang Baek University of Wollongong, Australia Aniello Castiglione University of Salerno, Italy David Chadwick University of Kent, UK Xiaofeng Chen Xidian University, China Chen-Mou Cheng Osaka University, Japan K. Raymond Choo The University of Texas at San Antonio, USA Mauro Conti University of Padua, Italy Robert Deng Singapore Management University, Singapore Dieter Gollmann Hamburg University of Technology, Germany Stefanos Gritzalis University of the Aegean, Greece Jinguang Han University of Surrey, UK Gerhard Hancke ISG Smart Card Centre, Royal Holloway, University of London, UK Shoichi Hirose University of Fukui, Japan Xinyi Huang Fujian Normal University, China Julian Jang-Jaccard Massey University, New Zealand Hiroaki Kikuchi Meiji University, Japan Kwangjo Kim Korea Advanced Institute of Science and Technology, South Korea Noboru Kunihiro The University of Tokyo, Japan Miroslaw Kutylowski Wroclaw University of Technology, Poland Costas Lambrinoudakis University of Piraeus, Greece Albert Levi Sabanci University, Turkey Shujun Li University of Kent, UK Yingjiu Li Singapore Management University, Singapore Joseph Liu Monash University, Australia Zhe Liu Nanjing University of Aeronautics and Astronautics, Singapore Giovanni Livraga University of Milan, Italy Javier Lopez NICS Lab Rongxing Lu University of New Brunswick, Canada Di Ma University of Michigan, USA Weizhi Meng Technical University of Denmark Chris Mitchell Royal Holloway, University of London, UK David Naccache École normale supérieure, France Günther Pernul Universität Regensburg, Germany Josef Pieprzyk CSIRO/Data61, Australia C. Pandu Rangan Indian Institute of Technology Madras, India Indrajit Ray Colorado State University, USA Na Ruan Shanghai Jiao Tong University, China Sushmita Ruj Indian Statistical Institute, India Pierangela Samarati University of Milan, Italy Jun Shao Zhejiang Gongshang University, China Organization IX Willy Susilo University of Wollongong, Australia Qiang Tang Cornell University, USA Cong Wang City University of Hong Kong, SAR China Ding Wang Peking University, China Yu Wang Guangzhou University, China Qianhong Wu Beihang University, China Shouhuai Xu University of Texas at San Antonio, USA Toshihiro Yamauchi Okayama University, Japan Wun-She Yap Universiti Tunku Abdul Rahman, Malaysia Kuo-Hui Yeh National Dong Hwa University, Taiwan Xun Yi RMIT University, Australia Siu Ming Yiu The University of Hong Kong, SAR China Yong Yu Shaanxi Normal University, China Tsz Hon Yuen Huawei, Singapore Additional Reviewers Ah, Hyunhcheol Nieto, Ana Ahn, Hyunhcheol Pan, Jing Chakraborthy, Suvradip Paul, Arinjita Dietz, Marietheres Poh, Geong Sen Gochhayat, Sarada Prasad Shen, Limin Guo, Jiale Song, Yongcheng Han, Shangbin Tang, Wenyi Huang, Hui Tian, Yangguang Jiang, Tao Vielberth, Manfred Li, Yalan Wang, Chenyu Li, Zengpeng Wang, Jian Lin, Cheng-Han Yang, Xu Lin, Chengjun Zhang, Yuexin Menges, Florian Contents System Security Macros Finder: Do You Remember LOVELETTER?. . . . . . . . . . . . . . . . . . 3 Hiroya Miura, Mamoru Mimura, and Hidema Tanaka Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, and Peter Filzmoser Universal Wavelet Relative Distortion: A New Counter–Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. . . . 37 Venkata Udaya Sameer and Ruchira Naskar Compact Ring Signature in the Standard Model for Blockchain . . . . . . . . . . 50 Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, and Tsz Hon Yuen Public Key Cryptography A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Tatsuya Suzuki, Keita Emura, and Toshihiro Ohigashi An Almost Non-interactive Order Preserving Encryption Scheme . . . . . . . . . 87 Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, and Xiaofeng Chen Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Fucai Luo, Kunpeng Wang, and Changlu Lin Searchable and Functional Encryption Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Huige Wang, Kefei Chen, Joseph K. Liu, and Ziyuan Hu Constrained (Verifiable) Pseudorandom Function from Functional Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Pratish Datta

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.