27th Australasian Conference on Information Security and Privacy
28 - 30 November 2022, Wollongong, Australia


Temporary free access to the conference proceedings will be available on
SpringerLink
between 30 Nov and 30 Dec 2022.



Conference Program

Local Time AEDT(UTC+11) Day 1 (28/11/22)
09:00-09:30 Registration
09:30-09:45 Inauguration
09:45-10:45 Jennifer Seberry Lecture
Speaker: Huaxiong Wang
Session Chair: Willy Susilo
10:45-11:15 Coffee Break
11:15-12:30 Session 1: Symmetric-Key Cryptology I (3 talks)
Session Chair: Amin Sakzad
12:30-13:40 Lunch Break
13:40-15:20 Session 2: Cryptographic Protocols (4 talks)
Session Chair: Ron Steinfeld
15:20-15:45 Coffee Break
15:45-17:00 Session 3: Post-Quantum Cryptography (3 talks)
Session Chair: Tjerand Silde
17:10-18:00 Australasian Researchers’ Meeting
Steering Committee Meeting
Local Time AEDT(UTC+11) Day 2 (29/11/2022)
09:15-09:30 Registration
09:30-10:30 Keynote Talk
Speaker: Jing Chen
Session Chair: Guomin Yang
10:30-10:50 Coffee Break
10:50-12:30 Session 4: Blockchain (4 talks)
Session Chair: Yannan Li
12:30-13:40 Lunch Break
13:40-15:20 Session 5: Public-Key Cryptography (4 talks)
Session Chair: Sushmita Ruj
15:20-15:45 Coffee Break
15:45-17:00 Session 6: Public-Key Cryptanalysis (3 talks)
Session Chair: Dung Duong
18:00-21:00 Conference Banquet
Local Time AEDT(UTC+11) Day 3 (30/11/2022)
09:15-09:30 Registration
09:30-10:30 Keynote Talk
Speaker: Yuval Yarom
Session Chair: Khoa Nguyen
10:30-10:50 Coffee Break
10:50-12:30 Session 7: Symmetric-Key Cryptology II (4 talks)
Session Chair: Josef Pieprzyk
12:30-12:40 Closing Remark
12:40-14:00 Lunch Break



Session 1: Symmetric-Key Cryptology I
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256

Jian Guo, Ling Song, Haoyang Wang

Speaker: Jian Guo (in person)

(Best Paper Award)

Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES

Lorenzo Grassi, Christian Rechberger

Speaker: Lorenzo Grassi (online)

PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher

Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji

Speaker: Shotaro Miyashita (online)

Session 2: Cryptographic Protocols
Verifiable Decryption in the Head

Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde

Speaker: Tjerand Silde (in person)

Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives

Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu

Speaker: Puwen Wei (online)

On Security of Fuzzy Commitment Scheme for Biometric Authentication

Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra

Speaker: Sweta Mishra (in person)

SoK: Decentralized Randomness Beacon Protocols

Mayank Raikwar, Danilo Gligoroski

Speaker: Mayank Raikwar (in person)

Session 3: Post-Quantum Cryptography
Fiat-Shamir Signatures based on Module-NTRU

Shi Bai, Austin Beard, Floyd Johnson, Sulani K.B.Vidhanalage, Tran Ngo

Speaker: Floyd Johnson (online)

Speeding-Up Isogeny Computation using Precedence-Constrained Scheduling

Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan

Speaker: Kittiphon Phalakarn (in person)

An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security

Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld

Speaker: Xiaohui Ding (online)

Session 4: Blockchain
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts

Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu

Speaker: Xiaofei Wu (online)

(Best Paper Award)

DeChain: A Blockchain Framework Enhancing Decentralization via Sharding

Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu

Speaker: Shenwei Chen (online)

Garrison: A Novel Watchtower Scheme for Bitcoin

Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld

Speaker: Arash Mirzaei (in person)

Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics

Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong, Gaopeng Gou

Speaker: Chen Zhao (online)

Session 5: Public-Key Cryptography
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption

Yusaku Maeda, Koji Nuida

Speaker: Yusaku Maeda (online)

Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace

Yumei Li, Mingwu Zhang, Futai Zhang

Speaker: Yumei Li (online)

TIDE: A novel approach to constructing timed-release encryption

Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia

Speaker: Liam Medley (in person)

Multi-signatures for ECDSA and its Applications in Blockchain

Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen

Speaker: Shimin Pan (in person)

Session 6: Public-Key Cryptanalysis
Handle the Traces: Revisiting the Attack on ECDSA with EHNP

Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li

Speaker: Jinzheng Cao (online)

Hybrid Dual and Meet-LWE Attack

Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang

Speaker: Lei Bi (online)

Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018

Wenshuo Guo, Fang-Wei Fu

Speaker: Wenshuo Guo (online)

Session 7: Symmetric-Key Cryptology II
Improved Differential Attack on Round-Reduced LEA

Yuhan Zhang, Wenling Wu, Lei Zhang

Speaker: Yuhan Zhang (online)

Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints

Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya

Speaker: Amit Kumar Chauhan (online)

Improved Division Property for Ciphers with Complex Linear Layers

Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang

Speaker: Yongxia Mao (online)

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation

Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri

Speaker: Alexandre Adomnicai (online)