Preliminary Program of ACNS 2025
Day 1 (23 June)
08:50- 09:00 |
Opening remarks |
09:00-’09:30 |
Session: Encryption & Secret Sharing
1. Registered Matchmaking Encryption, D. Francati, V. Huang, D. Venturi 2. Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors, S. Miracle, S. Yilek 3. Fully Secure Searchable Encryption from PRFs, H. Shinoki, H. Sato, M. Yoshino 4. Pre-Constructed Publicly Verifiable Secret Sharing and Applications, K. Baghery, N. Knapen, G. Nicolas |
09:30- 10:00 |
|
10:00- 10:20 |
|
10:20- 11:00 |
Coffee break |
11:00- 11:30 |
Session: Blockchains & Decentralized Systems
1. HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts, J. Giesen, S. Andreina, M. Rodler, G. Karame, L. Davi 2. Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment, X. Su, X. Defago, M. Larangeira, K. Mori, T. Oda, Y. Tamura, K. Tanaka 3. SoK: Measuring Blockchain Decentralization, C. Ovezik, D. Karakostas, M. Milad, D. Woods, A. Kiayias 4. Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols, P. Keller 5. Sassafras: Efficient Batch Single Leader Election, J. Burdges, E. Crites, H. Alper, A. Stewart, S. Vasilyev |
11:30- 12:00 |
|
12:00- 12:40 |
|
12:40- 13:00 |
Lunch
|
13:00- 13:30 |
|
13:30- 14:00 |
|
14:00- 14:30 |
Session: MPC
1. Oblivious suffix sorting: A multi-party computation scheme for secure and efficient suffix sorting, K. Isayama, K. Jimbo, N. Okamoto, K. Sadakane, K. Tozawa 2. Share&Shrink: Efficient and Delegatable MPC in one Broadcast then Asynchrony, A. Urban, M. Rambaud 3. Delayed-Input Multi-Party Computation, M. Ciampi, J. Sternad, Y. Xia 4. Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes, S. Balumuri, E. Eaton, P. Lamontagne |
14:30- 15:00 |
|
15:00- 15:20 |
|
15:20- 16:00 |
Coffee break |
16:00- 16:30 |
Keynote: Bart Preneel
|
16:30- 17:00 |
|
17:00-end | Poster & Networking Session |
Day 2 (24 June)
09:00-09:30 |
Keynote: Shweta Shinde, incl. 5min room switching
|
09:30-10:00 | |
10:00-10:40 |
Session: Network Security |
10:40-11:00 | Coffee break |
11:00-11:30 |
Session: Cryptographic primitives and protocols
1. Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization, G. Lebrun, C. Chevalier, A. Martinelli 2. Distributed Asynchronous Remote Key Generation, H. Nartz, M. Manulis 3. Anonymous Authenticated Key Exchange, J. Pablos, M. Vasco, Á. Pozo, C. Soriente 4. Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor, N. Shimoe, N. Kunihiro 5. Tighter provable security for TreeKEM, K. Azari, A. Ellison |
11:30-12:00 | |
12:00-12:40 | |
12:40-13:00 |
Lunch
|
13:00-13:30 | |
13:30-14:00 | |
14:00-14:30 |
Session: Side Channels
1. Not So Secure TSC, J. Juffinger, S. Neela, D. Gruss 2. G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels, B. Bourassa, Y. Michalevsky, S. Eskandarian 3. Decompose and conquer: ZVP attacks on GLV curves, V. Suchanek, V. Sedlacek, M. Sys 4. Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO, Y. Li, Z. Zhang, Z. Lang, X. Li, J. Zhang, D. Sun |
14:30-15:00 | |
15:00-15:20 | |
15:20-16:00 | Coffee break |
16:00-16:30 |
Session: Information Security
1. Optimal Communication Unbalanced Private Set Union, A. Galan, J. Dumas, A. Maignan, B. Grenet, D. Roche 2. Negative Results on Information-theoretic Additive Randomized Encodings, K. Hiwatashi 3. Two-party ECDSA with JavaCard-based smartcards, A. Dufka, P. Laud, P. Svenda 4. MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion, H. Li, Q. Li, Y. Chen, Q. Chang, X. Wu |
16:30-17:00 | |
17:00-17:20 |
Day 3 (25 June)
09:00-09:30 |
Session: Privacy & Anonymity |
09:30-10:00 | |
10:00-10:20 | |
10:20-11:10 | Coffee break |
11:10-11:30 |
Session: Cryptanalysis |
11:30-12:00 | |
12:00-12:30 | |
12:30-13:00 |
Lunch
|
13:00-13:30 | |
13:30-14:00 | |
14:00-14:30 |
Session: Attacks & Vulnerabilities |
14:30-15:00 | |
15:00-15:20 | |
15:20-16:00 | Coffee break |
16:00-16:30 |
Session: Quantum & Post-Quantum |
16:30-17:00 | |
17:00-17:30 | Awards |
Day 4 (26 June)
09:30-10:00 |
Session: Biometrics & Authentication
1. SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation, F. Wang, J. Ouyang, L. Zhang, L. Pan, S. Hu, R. Doss, J. Zhou 2. SoK: Continuous User Authentication Beyond Error Rates: Reviewing General System Properties, F. Dehling, S. Kawelke, L. Iacono 3. Cancelable Biometrics based on Cosine Locality Sensitive Hashing and Grouped Inner Product Transformation for Real-valued Features, R. Zhang, Y. Ni, P. Shen, X. Tian, Y. E |
10:00-10:30 | |
10:30-11:00 | Coffee break |
11:00-11:30 |
Session: Privacy
1. PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks, M. Rahimi 2. ProvDP: Differential Privacy for System Provenance Dataset, K. Mukherjee, J. Yu, P. De, D. Divakaran 3. A New Quadratic Noisy Functional Encryption Scheme and Its Application for Privacy Preserving Machine Learning, J. Zalonis, L. Scheu-Hachtel, F. Armknecht 4. FNSA: An Adaptive Privacy Protection Model for Trajectory Data, J. Shang, Z. Xia 5. SPPM: A Stackelberg Game-based Personalized Privacy-Preserving Model in Mobile Crowdsensing Systems, J. Jiao, Z. Xia |
11:30-12:00 | |
12:00-12:40 | |
12:40-13:00 |
Lunch
|
13:00-13:30 | |
13:30-14:00 | |
14:00-14:30 |
Session: Machine Learning
1. Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data, L. Neumann, A. Guimarães, D. Aranha, E. Borin 2. LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks, Y. Xu, G. Chen, F. Song, Y. Chen 3. Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning, D. Kwon, D. Hong, J. Sung, S. Hong 4. Obfuscation for Deep Neural Networks against Model-based Extraction Attacks: Taxonomy and Optimization, Y. Sun, V. Bonde, L. Duan, Y. Li |
14:30-15:00 | |
15:00-15:20 | |
15:20-15:30 | Closing remarks |