ACNS 2023

21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
19-22 June, 2023

Conference Program

You can click on the name of the workshop to view the details of the corresponding program.
The PDF version of the ACNS 2023 main conference program can be found at the following link: Main Conference Program Detail.

ACNS 2023 Schedule
Day 1 (19 June) Day 2 (20 June) Day 3 (21 June) Day 4 (22 June)
Registration
09:00-9:30
Machine learning
09:00-10:30
CIMSS
09:45-17:00
Privacy-preserving protocols
09:00-10:30
ADSC
09:00-12:00
Encryption
09:00-10:30
SCI
09:00-16:00
Opening remarks
09:30-09:40
Coffee break
10:30-10:50
Coffee break
10:30-10:50
Coffee break
10:30-10:50
Web security
09:40-11:10
AIHWS
09:40-17:00
Side-channel and fault attacks
10:50-12:20
Homomorphic cryptography
10:50-12:00
AIoTS
09:00-12:30
Advanced primitives
10:50-12:20
Coffee break
11:10-11:30
Keynote I
11:30-12:30
Lunch
12:30-14:00
Lunch
12:20-13:50
Cloud S&P
15:00-18:30
Lunch
12:00-13:30
Lunch
12:20-13:50
AIBlock
13:50-16:10
Lattices and codes
14:00-15:55
Embedded security
13:50-15:20
Keynote II
13:30-14:30
Multiparty computation
13:50-15:20
Coffee break
15:55-16:15
SiMLA(virtual)
15:30-18:30
Coffee break
15:20-15:40
Tour
(Kiyomizu-dera Temple)
14:30-18:00
Coffee break
15:20-15:40
Symmetric cryptanalysis
16:15-17:45
Elliptic curves and pairings
15:40-16:50
SecMT(virtual)
16:00-18:20
Conference dinner
(Heian Jingu Shrine Hall)
18:00-21:00
Blockchain
15:40-16:50
Poster session
18:00-19:30
Isogeny-based cryptography
16:50-18:00
Closing remarks
16:50-17:00
Welcome reception
19:00-21:00

Technical Program

Day 1 (19 Jun 2023)
09:00-09:30 Registration
09:30-09:40 Opening remarks
Kazumasa Omote & Chunhua Su
09:40-11:10 Web security Session Chair: Jianying Zhou
Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis
Cong Tian, Dengpan Ye, Chuanxi Chen
Those Aren't Your Memories and They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar
Social Honeypot for Humans: Luring Peoplethrough Self-managed Instagram Pages
Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers
Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao
11:10-11:30 Coffee break
11:30-12:30 Keynote I Session Chair: Mehdi Tibouchi
Challenges and Solutions to Post-Quantum Secure Messaging
Shuichi Katsumata
12:30-14:00 Lunch
14:00-15:55 Lattices and codes Session Chair: Mehdi Tibouchi
Forward Security of Fiat-Shamir LatticeSignatures
Yang Tao, Rui Zhang, Yunfeng Ji
Shorter and Faster Identity-Based Signatures with TightSecurity in the (Q)ROM from Lattices
Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
A Gapless Post-Quantum Hash Proof System in the Hamming Metric
Bénédikt Tran, Serge Vaudenay
Spherical Gaussian Leftover Hash Lemmaviathe Rényi Divergence
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
BIKE Key-Recovery: Combining Power Consumption Analysisand Information-Set Decoding
Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoît Gérard
15:55-16:15 Coffee break
16:15-17:45 Symmetric cryptanalysis Session Chair: Serge Vaudenay
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
Meet-in-the-Filterand Dynamic Counting with Applications to Speck
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
Near Collision Attackagainst Grain v1
Subhadeep Banik, Daniel Collins, Willi Meier
TIDAL: Practical Collisions on State-Reduced KeccakVariants
Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal
18:00-21:00 Poster session & Welcome reception
18:00-19:30 Poster session Session Chair: Masaki Shimaoka
Ransomware detection mechanism – project status at the beginning of 2023
Michał Glet, Kamil Kaczyński
AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets
Joon Kuy Han, Dennis Wong, Byungkon Kang
Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT
Hung-Yu Chien
Stopping Run-time Countermeasures in Cryptographic Primitives
Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee
Swarm-based IoT Network Penetration Testing by IoT Devices
Thomas Schiller, Sean Mondesire
Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance
Chunlu CHEN, Kevin I-Kai WANG, Peng LI, Kouichi SAKURAI
A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses
Haibo Zhang, Zhihua Yao, Kouichi Sakurai
Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks
Juris Viksna, Sergejs Kozlovics, Edgars Rencis
Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap
PriAuct: Privacy Preserving Auction Mechanism
Neha Joshi, Abhishek Thakur, A Antony Franklin
Using Verifiable Credentials for authentication of UAVs in logistics
Ken Watanabe, Kazue Sako
A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale
Yuji Suga
Collaborative Authority-Based Searchable Encryption Using Access Control Encryption
Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang
Day 2 (20 Jun 2023)
09:00-10:30 Machine learning Session Chair: Kouichi Sakurai
Fast and Efficient Malware Detection with Joint Staticand Dynamic Features Through Transfer Learning
Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo
Efficient Network Representation for GNN-based Intrusion Detection
Hamdi Friji, Alexis Olivereau, Mireille Sarkiss
EVADE:Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning
Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson
Steal from Collaboration:Spy Attack bya Dishonest Party in Vertical Federated Learning
Hongbin Chen, Chaohao Fu, Na Ruan
10:30-10:50 Coffee break
10:50-12:20 Side-channel and fault attacks Session Chair: Thomas Ricosset
Formal Verification of Arithmetic Masking in Hardwareand Software
Barbara Gigerl, Robert Primas, Stefan Mangard
Layered Binary Templating
Martin Schwarzl, Erik Kraft, Daniel Gruss
HS-based error correction algorithm for noisy binary GCD side-channel sequences
Kenta Tani, Noboru Kunihiro
Divide and Rule: DiFA- Division Property Based Fault Attacks on PRESENT and GIFT
Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
12:20-13:50 Lunch
13:50-15:20 Embedded security Session Chair: Hsu-Chun Hsiao
A Forkcipher-based Pseudo-Random Number Generator
Elena Andreeva, Andreas Weninger
DMA'n'Play: Practical Remote Attestation Based on Direct MemoryAccess
Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi
Recommendation for a holistic secure embedded ISA extension
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
15:20-15:40 Coffee break
15:40-16:50 Elliptic curves and pairings Session Chair: Jesus-Javier Chi Dominguez
Pairings in Rank-1 Constraint System
Youssef El Housni
Binary Kummer Line
Sabyasachi Karati
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems
Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
16:50-18:00 Isogeny-based cryptography Session Chair: Noboru Kunihiro
Low Memory Attacks on Small Key CSIDH
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Practical Robust DKG Protocols for CSIDH
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Efficient Isogeny Proofs Using Generic Techniques
Kelong Cong, Yi-Fu Lai, Shai Levin
Day 3 (21 Jun 2023)
09:00-10:30 Privacy-preserving protocols Session Chair: Sherman S.M. Chow
Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities
Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou
Predicate Private Set Intersection With Linear Complexity
Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption
Johannes Ernst, Katerina Mitrokotsa
Private Information Retrieval with Result Verification for MoreServers
Pengzhen Ke, Liang Feng Zhang
10:30-10:50 Coffee break
10:50-12:00 Homomorphic cryptography Session Chair: Changmin Lee
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption
Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
Analysis and Prevention of Averaging Attacks against Obfuscation Protocols
Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra Arnau, Thorsten Strufe
FLSwitch: Towards Secureand Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch
Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong
12:00-13:30 Lunch
13:30-14:30 Keynote II Session Chair: XiaoFeng Wang
Language-enforced Data Confidentiality against Memory Disclosureand Transient Execution Attacks
Michalis Polychronakis
14:30-18:00 Tour
Kiyomizu-dera Temple
18:00-21:00 Conference dinner
Heian Jingu Shrine Hall
Day 4 (22 Jun 2023)
9:00-10:30 Encryption Session Chair: Ivan Visconti
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform
Daniele Friolo, Matteo Salvino, Daniele Ventur
Optimal Security Notion for Decentralized Multi-Client Functional Encryption
Ky Nguyen, Duong Hieu Phan, David Pointcheval
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
Huangting Wu, Sherman S. M. Chow
Publicly Auditable Functional Encryption
Vlasis Koutsos, Dimitrios Papadopoulos
10:30-10:50 Coffee break
10:50-12:20 Advanced primitives Session Chair: Yuji Suga
Robustly ReusableFuzzyExtractors in a Post-Quantum World
Amit Deo, Charles Grover
Subversion-Resilient Authenticated Encryption without Random Oracles
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager, Thomas Eisenbarth
Scored Anonymous Credentials
Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges
Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi
12:20-13:50 Lunch
13:50-15:20 Multiparty computation Session Chair: Bernardo David
Explicitand Nearly Tight Lower Bound for2-party PerfectlySecureFSS
Keitaro Hiwatashi, Koji Nuida
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi, Yu Xia
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem
T-H. Hubert Chan, Ting Wen, Hao Xie, Quan Xue
A New Approach to Garbled Circuits
Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
15:20-15:40 Coffee break
15:40-16:50 Blockchain Session Chair: Mario Larangeira
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
Revisiting Transaction Ledger Robustness in the Miner ExtractableValueEra
Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency WalletApps
I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar
16:50-17:00 Closing remarks Mehdi Tibouchi & XiaoFeng Wang
Springer
ACNS
ACNS