Accepted Papers

FULL PAPER

Paper ID Paper Title Authors Affiliation
2 Further Cryptanalysis of a Type of RSA Variants Gongyu Shi, Geng Wang and Dawu Gu Shanghai Jiao Tong University
3 Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs Yongge Wang and Qutaibah Malluhi UNC Charlotte, Qatar University
11 Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps Binbin Tu, Min Zhang and Chen Yu School of Cyber Science and Technology, Shandong University
13 Efficient Private Set Interaction Cardinality Protocol in the Reverse Unbalanced Setting Hanyu Li and Ying Gao School of Cyber Science and Technology, Beihang University
26 Batched Fully Homomorphic Encryption from TFHE Yuting Jiang and Jianghong Wei State Key Laboratory of Integrated Service Networks (ISN), Xidian University, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
27 A Blockchain-based Mutual Authentication Protocol for Smart Home Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang and Tao Xiang Chongqing University
29 Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization Jianzhang Chen, Haibo Tian and Fangguo Zhang Sun Yat-sen University
37 Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-System Replay Runhao Liu, Bo Yu, Baosheng Wang and Jianbin Ye National University of Defense Technology
38 ATLAS: A Pratical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence Yan Lin Aung, Martín Ochoa and Jianying Zhou Singapore University of Technology and Design, ETH Zürich
40 OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph Liu and Surya Nepal Monash University, Shanghai Jiao Tong University, China, CSIRO Data61
46 HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng and Jiangtao Cui Xidian University
49 GRUZ: Practical Resources Fair Exchange without Blockchain Yongqing Xu, Kaiyi Zhang and Yu Yu Department of Computer Science, Shanghai Jiao Tong University
50 Bilateral Privacy-Preserving Task Assignment with Personalised Participant Selection for Mobile Crowdsensing Shijin Chen and Mingwu Zhang Hubei University of Technology
52 Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck 32/64 Lijun Lyu, Yi Tu and Yingjie Zhang SKLOIS, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences
School of Physical and Mathematical Sciences, Nanyang Technological University
Beijing Institute of Mathematical Sciences and Applications;Yau Mathematical Sciences Center, Tsinghua University
57 Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization Zhao Chen, Xianhui Lu, Dingding Jia and Bao Li State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Institute of Information Engineering,CAS
59 Representing LLVM-IR in a Code Property Graph Alexander Küchler and Christian Banse Fraunhofer AISEC
60 Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing Xue Tan, Di Xiao, Min Li and Hui Huang Chongqing University
63 Witness Encryption from Smooth Projective Hashing Yuzhu Wang and Mingwu Zhang Guilin University of Electronic Technology, Hubei University of Technology
65 EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries Almuthanna Alageel and Sergio Maffeis Imperial College London
66 Dissecting Applications Uninstallers \& Removers: Are they effective? Marcus Botacin and Andre Gregio Federal University of Paraná, UFPR
67 Daric: A Storage Efficient Payment Channel with Punishment Mechanism Arash Mirzaei, Amin Sakzad, Jiangshan Yu and Ron Steinfeld Monash University

SHORT PAPER

Paper ID Paper Title Authors Affiliation
14 More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model Kyoichi Asano, Keita Emura and Atsushi Takayasu The University of Electro-Communications, National Institute of Information and Communications Technology, The University of Tokyo
17 AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition Shaofeng Wang, Bo Lang, Nan Xiao and Yikai Chen Beihang University
21 QUIC Protocol with Post-Quantum Authentication Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou and Sang-Yoon Chang University of Colorado, Colorado Springs
24 CFL: Cluster Federated Learning in Large Scale Peer-to-Peer Networks Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao and Xiaodong Lin Xidian University, University of Guelph
35 The SAT-based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 Yingying Li and Qichun Wang Nanjing Normal University
42 Efficient scalar multiplication on koblitz curves with Pre-computation Xiuxiu Li, Wei Yu and Kunpeng Wang State Key Laboratory of Information Security, Institute of Information Engineering, CAS
43 Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey McDonald and Moti Yung University of South Alabama, Auburn University, Columbia University
53 Why we need a theory of maliciousness: Towards clarifying the discussion on the feasibility of using hardware performance counters for malware detection Marcus Botacin and Andre Gregio Federal University of Paraná, UFPR