ACNS 2023

21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
19-22 June, 2023

Conference Program

You can click on the name of the workshop to view the details of the corresponding program.
The PDF version of the ACNS 2023 main conference program can be found at the following link: Main Conference Program Detail.

ACNS 2023 Schedule
Day 1 (19 June)Day 2 (20 June)Day 3 (21 June)Day 4 (22 June)
Registration
09:00-9:30
Machine learning
09:00-10:30
CIMSS
09:45-17:00
Privacy-preserving protocols
09:00-10:30
ADSC
09:00-12:00
Encryption
09:00-10:30
SCI
09:00-16:00
Opening remarks
09:30-09:40
Coffee break
10:30-10:50
Coffee break
10:30-10:50
Coffee break
10:30-10:50
Web security
09:40-11:10
AIHWS
09:40-17:00
Side-channel and fault attacks
10:50-12:20
Homomorphic cryptography
10:50-12:00
AIoTS
09:00-12:30
Advanced primitives
10:50-12:20
Coffee break
11:10-11:30
Keynote I
11:30-12:30
Lunch
12:30-14:00
Lunch
12:20-13:50
Cloud S&P
15:00-18:30
Lunch
12:00-13:30
Lunch
12:20-13:50
AIBlock
13:50-16:10
Lattices and codes
14:00-15:55
Embedded security
13:50-15:20
Keynote II
13:30-14:30
Multiparty computation
13:50-15:20
Coffee break
15:55-16:15
SiMLA(virtual)
15:30-18:30
Coffee break
15:20-15:40
Tour
(Kiyomizu-dera Temple)
14:30-18:00
Coffee break
15:20-15:40
Symmetric cryptanalysis
16:15-17:45
Elliptic curves and pairings
15:40-16:50
SecMT(virtual)
Conference dinner
(Heian Jingu Shrine Hall)
18:00-20:00
Blockchain
15:40-16:50
Poster session
18:00-19:30
Isogeny-based cryptography
16:50-18:00
Closing remarks
16:50-17:00
Welcome reception
19:00-21:00

Technical Program

Day 1 (19 Jun 2023)
09:00-09:30Registration
09:30-09:40Opening remarks
Kazumasa Omote & Chunhua Su
09:40-11:10Web security Session Chair: TBD
Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis
Cong Tian, Dengpan Ye, Chuanxi Chen
Those Aren't Your Memories and They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar
Social Honeypot for Humans: Luring Peoplethrough Self-managed Instagram Pages
Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers
Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao
11:10-11:30Coffee break
11:30-12:30Keynote I Session Chair: Mehdi Tibouchi
Challenges and Solutions to Post-Quantum Secure Messaging
Shuichi Katsumata
12:30-14:00Lunch
14:00-15:55Lattices and codes Session Chair: TBD
Forward Security of Fiat-Shamir LatticeSignatures
Yang Tao, Rui Zhang, Yunfeng Ji
Shorter and Faster Identity-Based Signatures with TightSecurity in the (Q)ROM from Lattices
Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
A Gapless Post-Quantum Hash Proof System in the Hamming Metric
Bénédikt Tran, Serge Vaudenay
Spherical Gaussian Leftover Hash Lemmaviathe Rényi Divergence
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
BIKE Key-Recovery: Combining Power Consumption Analysisand Information-Set Decoding
Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoît Gérard
15:55-16:15Coffee break
16:15-17:45Symmetric cryptanalysis Session Chair: TBD
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
Meet-in-the-Filterand Dynamic Counting with Applications to Speck
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
Near Collision Attackagainst Grain v1
Subhadeep Banik, Daniel Collins, Willi Meier
TIDAL: Practical Collisions on State-Reduced KeccakVariants
Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal
18:00-21:00Poster session & Welcome reception
18:00-19:30Poster session Session Chair: TBD
Ransomware detection mechanism – project status at the beginning of 2023
Michał Glet, Kamil Kaczyński
AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets
Joon Kuy Han, Dennis Wong, Byungkon Kang
Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT
Hung-Yu Chien
Stopping Run-time Countermeasures in Cryptographic Primitives
Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee Swarm-based IoT Network Penetration Testing by IoT Devices
Thomas Schiller, Sean Mondesire Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance
Chunlu CHEN, Kevin I-Kai WANG, Peng LI, Kouichi SAKURAI A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses
Haibo Zhang, Zhihua Yao, Kouichi Sakurai Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks
Juris Viksna, Sergejs Kozlovics, Edgars Rencis Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap PriAuct: Privacy Preserving Auction Mechanism
Neha Joshi, Abhishek Thakur, A Antony Franklin Using Verifiable Credentials for authentication of UAVs in logistics
Ken Watanabe, Kazue Sako A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale
Yuji Suga Collaborative Authority-Based Searchable Encryption Using Access Control Encryption
Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang
Day 2 (20 Jun 2023)
09:00-10:30Machine learning Session Chair: TBD
Fast and Efficient Malware Detection with Joint Staticand Dynamic Features Through Transfer Learning
Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo
Efficient Network Representation for GNN-based Intrusion Detection
Hamdi Friji, Alexis Olivereau, Mireille Sarkiss
EVADE:Efficient Moving Target Defensefor Autonomous Network Topology Shuffling Using Deep Reinforcement Learning
Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson
Steal from Collaboration:Spy Attack bya Dishonest Party in Vertical Federated Learning
Hongbin Chen, Chaohao Fu, Na Ruan
10:30-10:50Coffee break
10:50-12:20Side-channel and fault attacks Session Chair: TBD
Formal Verification of Arithmetic Masking in Hardwareand Software
Barbara Gigerl, Robert Primas, Stefan Mangard
Layered Binary Templating
Martin Schwarzl, Erik Kraft, Daniel Gruss
HS-based error correction algorithm for noisy binary GCD side-channel sequences
Kenta Tani, Noboru Kunihiro
Divide and Rule: DiFA- Division Property Based Fault Attacks on PRESENT and GIFT
Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
12:20-13:50Lunch
13:50-15:20Embedded security Session Chair: TBD
A Forkcipher-based Pseudo-Random Number Generator
Elena Andreeva, Andreas Weninger
DMA'n'Play: Practical Remote Attestation Based on Direct MemoryAccess
Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi
Recommendation for a holistic secure embedded ISA extension
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
15:20-15:40Coffee break
15:40-16:50Elliptic curves and pairings Session Chair: TBD
Pairings in Rank-1 Constraint System
Youssef El Housni
Binary Kummer Line
Sabyasachi Karati
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems
Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
16:50-18:00Isogeny-based cryptography Session Chair: TBD
Low Memory Attacks on Small Key CSIDH
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Practical Robust DKG Protocols for CSIDH
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Efficient Isogeny Proofs Using Generic Techniques
Kelong Cong, Yi-Fu Lai, Shai Levin
Day 3 (21 Jun 2023)
09:00-10:30Privacy-preserving protocols Session Chair: TBD
Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities
Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou
Predicate Private Set Intersection With Linear Complexity
Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption
Johannes Ernst, Katerina Mitrokotsa
Private Information Retrieval with Result Verification for MoreServers
Pengzhen Ke, Liang Feng Zhang
10:30-10:50Coffee break
10:50-12:00Homomorphic cryptography Session Chair: TBD
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption
Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
Analysis and Prevention of Averaging Attacks against Obfuscation Protocols
Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra Arnau, Thorsten Strufe
FLSwitch: Towards Secureand Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch
Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong
12:00-13:30Lunch
13:30-14:30Keynote II Session Chair: XiaoFeng Wang
Language-enforced Data Confidentiality against Memory Disclosureand Transient Execution Attacks
Michalis Polychronakis
14:30-18:00Tour
Kiyomizu-dera Temple
18:00-20:00Conference dinner
Heian Jingu Shrine Hall
Day 4 (22 Jun 2023)
9:00-10:30Encryption Session Chair: TBD
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform
Daniele Friolo, Matteo Salvino, Daniele Ventur
Optimal Security Notion for Decentralized Multi-Client Functional Encryption
Ky Nguyen, Duong Hieu Phan, David Pointcheval
Anonymous (Hierarchical) Identity-Based Encryption from BroaderAssumptions
Huangting Wu, Sherman S. M. Chow
Publicly Auditable Functional Encryption
Vlasis Koutsos, Dimitrios Papadopoulos
10:30-10:50Coffee break
10:50-12:20Advanced primitives Session Chair: TBD
Robustly ReusableFuzzyExtractors in a Post-Quantum World
Amit Deo, Charles Grover
Subversion-Resilient Authenticated Encryption without Random Oracles
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager, Thomas Eisenbarth
Scored Anonymous Credentials
Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges
Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi
12:20-13:50Lunch
13:50-15:20Multiparty computation Session Chair: TBD
Explicitand Nearly Tight Lower Bound for2-party PerfectlySecureFSS
Keitaro Hiwatashi, Koji Nuida
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi, Yu Xia
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem
T-H. Hubert Chan, Ting Wen, Hao Xie, Quan Xue
A New Approach to Garbled Circuits
Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
15:20-15:40Coffee break
15:40-16:50Blockchain Session Chair: TBD
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
Revisiting Transaction Ledger Robustness in the Miner ExtractableValueEra
Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency WalletApps
I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar
16:50-17:00Closing remarks Mehdi Tibouchi & XiaoFeng Wang
Springer
ACNS
ACNS