Searchable Encryption

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward PrivacyCong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao and Josef Pieprzyk Towards Efficient Verifiable Forward Secure Searchable Symmetric EncryptionZhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su and Xiaofeng Chen Generic Multi-keyword Ranked Search on Encrypted Cloud DataShabnam Kasra Kermanshahi, Joseph Liu, Ron Steinfeld and Surya … Continued

Cryptographic Protocols

Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from LatticesKeita Emura, Shuichi Katsumata and Yohei Watanabe Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud EmailsJianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu and Jianfeng Ma Feistel Structures for MPC, and MoreMartin Albrecht, Loenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos … Continued

Blockchain/Smart Contracts

Incentives for Harvesting Attack in Proof of Work mining poolsYevhen Zolotavkin and Veronika Kuchta A Lattice-Based Linkable Ring Signature Supporting Stealth AddressesZhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang and Duncan, S. Wong Annotary: A Concolic Execution System for Developing Secure Smart ContractsKonrad Weiss and Julian Schuette PDFS: Practical Data Feed Service for Smart ContractsJuan … Continued

Secure Protocols

Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta PrivacySébastien Gondron and Sebastian A. Mödersheim ProCSA: Protecting Privacy in Crowdsourced Spectrum AllocationMax Curran, Xiao Liang, Himanshu Gupta, Omkant Pandey and Samir Das Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using BisimilarityRoss Horne, Sjouke Mauw, Zach Smith and Ihor Filimonov Symmetric-key Corruption Detection: … Continued

Keynote – Electronic Voting: A Journey to Verifiability and Vote Privacy

Session Chair: Peter Ryan Electronic voting aims to achieve the same properties as traditional paper based voting. Even when voters vote from their home, they should be given the same guarantees, without having to trust the election authorities, the voting infrastructure, and/or the Internet network. The two main security goals are vote privacy: no one should know how … Continued

Formal Modelling and Verification

A Formal Model for Checking Cryptographic API Usage in JavaScriptDuncan Mitchell and Johannes Kinder Contingent Payments on a Public Ledger: Models and Reductions for Automated VerificationSergiu Bursuc and Steve Kremer Symbolic Analysis of Terrorist Fraud ResistanceAlexandre Debant, Stephanie Delaune and Cyrille Wiedling Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUICShan Chen, … Continued

Signature and Re-Encryption

Flexible Signatures: Making Authentication Suitable for Real-Time EnvironmentsDuc Le, Mahimna Kelkar and Aniket Kate A Dynamic & Revocable Group Merkle SignatureMaxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad and ShiFeng Sun Puncturable Proxy Re-Encryption supporting to Group Messaging ServiceTran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim and Dongxi Liu Generic Traceable Proxy … Continued

Machine Learning

Privacy-Enhanced Machine Learning with Functional EncryptionMiha Stopar, Tilen Marc, Jan Hartman, Manca Bizjak and Jolanda Modic Towards Secure and Efficient Outsourcing of Machine Learning ClassificationYifeng Zheng, Huayi Duan and Cong Wang Confidential Boosting with Random Linear Classifiers for Outsourced User-generated DataSagar Sharma and Keke Chen BDPL: A Boundary Differentially Private Layer Against Machine Learning Model … Continued

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu