ACNS 2021

19th International Conference on Applied Cryptography and Network Security
Kamakura, Japan
21-24 June 2021

Accepted Papers

Regular Papers

Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
SnakeGX: a sneaky attack against SGX Enclaves
Flavio Toffalini, Mariano Graziano, Mauro Conti and Jianying Zhou
Towards Efficient LPN-Based Symmetric Encryption
Thomas Locher, Sonia Bogos, Dario Korolija and Serge Vaudenay
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel, Anders Dalskov, Daniel Escudero and Ariel Nof
Proactive Detection of Phishing Kit Traffic
Qian Cui, Guy-Vincent Jourdan and Iosif Viorel Onut
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
Coin-Based Multi-Party Fair Exchange
Handan Kilinc Alper and Alptekin Kupcu
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Paiva and Routo Terada
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen, Wei Dai, Miran Kim and Yongsoo Song
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph Liu and Surya Nepal
Unlinkable and Invisible γ-Sanitizable Signatures
Angèle Bossuat and Xavier Bultel
Access Control Encryption from Group Encryption
Xiuhua Wang, Harry W.H. Wong and Sherman S. M. Chow
Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms
Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou and Sang-Yoon Chang
Threat for the Secure Remote Password Protocol and a leak in Apple’s Cryptographic Library
Andy Russon
Breaking and Fixing Third-Party Payment Service for Mobile Apps
Shangcheng Shi, Xianbo Wang and Wing Cheong Lau
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
F.W. Dekker and Zekeriya Erkin
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert and Hossein Yalame
Password Protected Secret Sharing from Lattices
Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo and Reihaneh Safavi-Naini
An Efficient Certificate-Based Signature Scheme in the Standard Model
Guoqiang Wang and Yanmei Cao
CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning
Yuqi Chen, Xiaoyu Zhang, Yi Xie, Meixia Miao and Xu Ma
Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang and Siu Ming Yiu
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum, Bernardo David and Tore Frederiksen
WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum, Mario Larangeira, Mario Yaksetig and William Carter
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile, Daniele Friolo and Ivan Visconti
Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
Ren Ishibashi and Kazuki Yoneyama
Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng and Liqun Chen
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
Hervé Chabanne, Jean-Luc Danger, Linda Guiga and Ulrich Kühne
Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems
Kiyofumi Tanaka, Atsuko Miyaji and Yaoan Jin
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
Ruben Groot Roessink, Andreas Peter and Florian Hahn
Efficient Methods to Search for Best Differential Characteristics on SKINNY
Stephanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard and Charles Prud'Homme
A Differentially Private Hybrid Approach to Traffic Monitoring
Rogério Rocha, Pedro Libório, Harsh Kupwade Patil and Diego Aranha
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Yuede Ji, Lei Cui and H. Howie Huang
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis, Foteini Baldimtsi and Konstantinos Chalkias
Defending Web Servers Against Flash Crowd Attacks
Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic
TurboIKOS: Improved Non-interactive Zero Knowledge with Sublinear Memory
Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan ZhangYaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang and Xinyuan Zhang
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash, Ruth Ng and Adam Rivkin
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
Shuangpeng Bai, Dongliang Fang, Yue Sun, Puzhuo Liu, Hui Wen and Limin Sun