Preliminary Program of ACNS 2025

Day 1 (23 June)

08:50-
09:00
 Opening remarks
09:00-’09:30
 Session: Encryption & Secret Sharing
 1. Registered Matchmaking Encryption, D. Francati, V. Huang, D. Venturi
 2. Sum-Preserving Encryption: Improved Bounds and Constructions for  Long Vectors, S. Miracle, S. Yilek
 3. Fully Secure Searchable Encryption from PRFs, H. Shinoki, H. Sato, M. Yoshino
 4. Pre-Constructed Publicly Verifiable Secret Sharing and Applications, K. Baghery, N. Knapen, G. Nicolas
09:30-
10:00
10:00-
10:20
10:20-
11:00
 Coffee break
11:00-
11:30
 Session: Blockchains & Decentralized Systems
 1. HCC: A Language-Independent Hardening Contract Compiler for Smart  Contracts, J. Giesen, S. Andreina, M. Rodler,                   G. Karame, L. Davi
 2. Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment, X. Su, X. Defago, M. Larangeira, K. Mori, T. Oda,       Y. Tamura, K. Tanaka
 3. SoK: Measuring Blockchain Decentralization, C. Ovezik, D. Karakostas, M. Milad, D. Woods, A. Kiayias
 4. Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols, P. Keller
 5. Sassafras: Efficient Batch Single Leader Election, J. Burdges, E. Crites, H. Alper, A. Stewart, S. Vasilyev
11:30-
12:00
12:00-
12:40
12:40-
13:00
 Lunch
13:00-
13:30
13:30-
14:00
14:00-
14:30
 Session: MPC
 1. Oblivious suffix sorting: A multi-party computation scheme for secure and efficient suffix sorting, K. Isayama, K. Jimbo,             N. Okamoto, K. Sadakane, K. Tozawa
 2. Share&Shrink: Efficient and Delegatable MPC in one Broadcast then Asynchrony, A. Urban, M. Rambaud
 3. Delayed-Input Multi-Party Computation, M. Ciampi, J. Sternad, Y. Xia
 4. Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes, S. Balumuri, E. Eaton, P. Lamontagne
14:30-
15:00
15:00-
15:20
15:20-
16:00
 Coffee break
16:00-
16:30
 Keynote: Bart Preneel
16:30-
17:00
17:00-end   Poster & Networking Session

 

Day 2 (24 June) 

09:00-09:30
 Keynote: Shweta Shinde, incl. 5min room switching
09:30-10:00
10:00-10:40

 Session: Network Security
 1. Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing, E. Bassetti, E. Di Paolo,         F. Drago, M. Conti, A. Spognardi
 2. TAU: Trust via Asynchronous Updates for Satellite Network Resiliency, Q. Bayer, R. Esswein, S. Mergendahl, J. Ruffley,               M. Abdelhakim, R. Cunningham

10:40-11:00  Coffee break
11:00-11:30
 Session: Cryptographic primitives and protocols
 1. Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization, G. Lebrun, C. Chevalier, A. Martinelli
 2. Distributed Asynchronous Remote Key Generation, H. Nartz, M. Manulis
 3. Anonymous Authenticated Key Exchange, J. Pablos, M. Vasco, Á. Pozo, C. Soriente
 4. Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of   Approximation of Squared Divisor, N. Shimoe, N. Kunihiro
 5. Tighter provable security for TreeKEM, K. Azari, A. Ellison
11:30-12:00
12:00-12:40
12:40-13:00 
 Lunch
13:00-13:30
13:30-14:00
14:00-14:30
 Session: Side Channels
 1. Not So Secure TSC, J. Juffinger, S. Neela, D. Gruss
 2. G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels, B. Bourassa,                           Y. Michalevsky, S. Eskandarian
 3. Decompose and conquer: ZVP attacks on GLV curves, V. Suchanek, V. Sedlacek, M. Sys
 4. Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO, Y. Li, Z. Zhang, Z. Lang, X. Li, J. Zhang,   D. Sun
14:30-15:00
15:00-15:20
15:20-16:00  Coffee break
16:00-16:30
 Session: Information Security
 1. Optimal Communication Unbalanced Private Set Union, A. Galan, J. Dumas, A. Maignan, B. Grenet, D. Roche
 2. Negative Results on Information-theoretic Additive Randomized Encodings, K. Hiwatashi
 3. Two-party ECDSA with JavaCard-based smartcards, A. Dufka, P. Laud, P. Svenda
 4. MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion, H. Li, Q. Li,   Y. Chen, Q. Chang, X. Wu
16:30-17:00
17:00-17:20

 

Day 3 (25 June)

09:00-09:30

 Session: Privacy & Anonymity
 1. Privately Compute the Item with Maximal Weight Sum in Set Intersection, H. Cai, X. Wang, Z. Lu, B. Liang
 2. Algebraic Zero Knowledge Contingent Payment, J. Gomez-Martinez, D. Vasilopoulos, P. Moreno-Sanchez, D. Fiore
 3. On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme, B. Libert, T. Peters
 4. AQQUA: Augmenting Quisquis with Auditability, G. Papadoulis, D. Balla, P. Grontas, A. Pagourtzis

09:30-10:00
10:00-10:20
10:20-11:10  Coffee break
11:10-11:30

 Session: Cryptanalysis
 1. Security Analysis of Forward Secure Log Sealing in Journald, A. Ottenhues, F. Dörre
 2. Generic Security of GCM-SST, A. Inoue, A. Jha, B. Mennink, K. Minematsu
 3. Revisiting the attacker’s knowledge in inference attacks against Searchable Symmetric Encryption, M. Damie, J. Leger, F. Hahn,   A. Peter
 4. On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers, E. Bellini,               M. Rachidi, R. Rohit, S. Tiwari

11:30-12:00
12:00-12:30
12:30-13:00
 Lunch
13:00-13:30
13:30-14:00
14:00-14:30

 Session: Attacks & Vulnerabilities
 1. CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations, D. Donadel,     K. Balasubramanian, A. Brighente, B. Ramasubramanian, M. Conti, R. Poovendran
 2. OCEAN: Open-World Contrastive Authorship Identification, F. Mächtle, J. Serr, N. Loose, J. Sander, T. Eisenbarth
 3. The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach, G. Benedetti,     S. Cofano, A. Brighente, M. Conti
 4. Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework, P. Arnold,       S. Berndt, J. Müller-Quade, A. Ottenhues

14:30-15:00
15:00-15:20
15:20-16:00  Coffee break
16:00-16:30

 Session: Quantum & Post-Quantum
 1. Everlasting Fully Dynamic Group Signatures, Y. He, S. Ling, K. Tang, H. Wang
 2. From ElGamal to Lattice-Based: Enhancing the Helios Voting System with Quantum-Safe Cryptography, J. Cardoso Barbosa,     G. Zambonin, T. Bardini Idalino, R. Custódio
 3. Post-Quantum Cryptography for Linux File System Integrity, J. Wiesböck, M. Münch, M. Weiß

16:30-17:00
17:00-17:30  Awards

Day 4 (26 June)

09:30-10:00
 Session: Biometrics & Authentication
 1. SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation, F. Wang, J. Ouyang, L. Zhang, L. Pan, S. Hu,   R. Doss, J. Zhou
 2. SoK: Continuous User Authentication Beyond Error Rates: Reviewing General System Properties, F. Dehling, S. Kawelke,               L. Iacono
 3. Cancelable Biometrics based on Cosine Locality Sensitive Hashing and Grouped Inner Product Transformation for Real-valued     Features, R. Zhang, Y. Ni, P. Shen, X. Tian, Y. E
10:00-10:30
10:30-11:00  Coffee break
11:00-11:30
 Session: Privacy
 1. PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks, M. Rahimi
 2. ProvDP: Differential Privacy for System Provenance Dataset, K. Mukherjee, J. Yu, P. De, D. Divakaran
 3. A New Quadratic Noisy Functional Encryption Scheme and Its Application for Privacy Preserving Machine Learning, J. Zalonis,   L. Scheu-Hachtel, F. Armknecht
 4. FNSA: An Adaptive Privacy Protection Model for Trajectory Data, J. Shang, Z. Xia
 5. SPPM: A Stackelberg Game-based Personalized Privacy-Preserving Model in Mobile Crowdsensing Systems, J. Jiao, Z. Xia
11:30-12:00
12:00-12:40
12:40-13:00
 Lunch
13:00-13:30
13:30-14:00
14:00-14:30
 Session: Machine Learning
 1. Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data, L. Neumann, A. Guimarães,                 D. Aranha, E. Borin
 2. LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks, Y. Xu, G. Chen, F. Song, Y. Chen
 3. Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning, D. Kwon, D. Hong,           J. Sung, S. Hong
 4. Obfuscation for Deep Neural Networks against Model-based Extraction Attacks: Taxonomy and Optimization, Y. Sun, V. Bonde,   L. Duan, Y. Li
14:30-15:00
15:00-15:20
15:20-15:30  Closing remarks