27th Australasian Conference on Information Security and Privacy
28 - 30 November 2022, Wollongong, Australia

Accepted Papers

1: Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES

Lorenzo Grassi, Christian Rechberger

Digital Security Group, Radboud University, Nijmegen, Netherlands & IAIK, Graz University of Technology, Graz, Austria

4: Handle the Traces: Revisiting the Attack on ECDSA with EHNP

Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li

Strategic Support Force Information Engineering University, Zhengzhou 450001, China, Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China, Xidian University, Xi'an 710071, China

5: Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption

Yusaku Maeda, Koji Nuida

The University of Tokyo, Tokyo, Japan, Institute of Mathematics for Industry (IMI), Kyushu University, Fukuoka, Japan, National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan

13: Fiat-Shamir Signatures based on Module-NTRU

Shi Bai, Austin Beard, Floyd Johnson, Sulani Kottal Baddhe Vidhanalage, Tran Ngo

Department of Mathematical Sciences, Florida Atlantic University

20: Speeding-Up Isogeny Computation using Precedence-Constrained Scheduling

Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan

University of Waterloo, Ontario, Canada, The University of Tokyo, Tokyo, Japan

24: PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher

Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji

Osaka University, Suita, Japan, National Institute of Information and Communications Technology, Koganei, Japan, Japan Advanced Institute of Science and Technology, Nomi, Japan

25: Multi-signatures for ECDSA and its Applications in Blockchain

Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen

The University of Hong Kong

26: Hybrid Dual and Meet-LWE Attack

Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang

KLOIS, Institute of Information Engineering, CAS, Beijing 100093, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China, State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China, Nanyang Technological University, Singapore 639798, Singapore

27: Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018

Wenshuo Guo, Fang-Wei Fu

Chern Institute of Mathematics and LPMC, Nankai University, Tianjin, China

28: Verifiable Decryption in the Head

Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde

Norwegian University of Science and Technology, Australian National University, University of Luxembourg, Université de Lorraine, CNRS, LORIA

29: Improved Differential Attack on Round-Reduced LEA

Yuhan Zhang, Wenling Wu, Lei Zhang

Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing 100190, China, University of Chinese Academy of Sciences, Beijing 100049, China

30: Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256

Jian Guo, Ling Song, Haoyang Wang

Nanyang Technological University, Singapore, Jinan University, China, Shanghai Jiao Tong University, China

31: SoK: Decentralized Randomness Beacon Protocols

Mayank Raikwar, Danilo Gligoroski

Norwegian University of Science and Technology (NTNU) Trondheim, Norway

34: Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation

Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri

Security, Paris, France, NEC, Kawasaki, Japan, Yokohama National University, Japan, NEC Solution Innovators, Hokuriku, Japan

37: Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives

Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu

Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China, School of Cyber Science and Technology, Shandong University, Qingdao, China, The University of Hong Kong, Pokfulam, Hong Kong, State Key Laboratory of Information Security, Institute of Information, Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

40: DeChain: A Blockchain Framework Enhancing Decentralization via Sharding

Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu

Shanghai Jiao Tong University

41: Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints

Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya

Indian Institute of Technology Jodhpur, India

44: On Security of Fuzzy Commitment Scheme for Biometric Authentication

Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra

IIIT-Delhi, India, NIST, Gaithersburg, MD, USA, TCS Research, India, Shiv Nadar University, India, Irisys Co. Ltd., Seoul, Korea

47: CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts

Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu

Nanjing University of Aeronautics and Astronautics, Nanjing, China, South China Agricultural University, Guangzhou, China, Shandong University, Jinan, China

49: Improved Division Property for Ciphers with Complex Linear Layers

Yongxia Mao, Wenling WU, Bolin WANG, Li ZHANG

Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China

52: Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace

Yumei Li, Mingwu Zhang, Futai Zhang

Hubei University of Technology, Wuhan, China, Fujian Normal University, Fuzhou, China, Guangxi Key Laboratory of Cryptography and Information Security, Xiangyang Industrilal Institute of Hubei University of Technology

57: Garrison: A Novel Watchtower Scheme for Bitcoin

Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld

Faculty of Information Technology, Monash University, Melbourne, Australia

58: TIDE: A novel approach to constructing timed-release encryption

Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia

Royal Holloway, University of London, United Kingdom

59: An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security

Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld

Faculty of Information Technology, Monash University, Australia, CSIRO's Data61, Australia

63: Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics

Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong, Gaopeng Gou

Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China