20th International Conference on
Applied Cryptography and Network Security

Detailed main conference program

All the times are in CET (GMT+2)

The venue is arranged with three different rooms. We will use the zoom webinar to stream the works of the main conference from the auditorium of CNR, while we will stream the two concurrent workshops in two other rooms. In this way, every in person attendee can choose to attend the main conference or one of the two workshops running in parallel.

Day 1: Monday, 20 June 2022

From 8:45 Reception of participants

09:15 - 9.30 Welcoming Remarks: PC Chairs and General Chairs

09:30 - 11:00 Session 1: ENCRYPTION (session chair Daniele Venturi)

  • Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation.
    S. Sato, K. Emura, A. Takayasu.

  • A Performance Evaluation of Pairing-Based Broadcast Encryption Systems.
    A. Chhatrapati, S. Hohenberger, J. Trombo, S. Vusirikala.

  • An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
    L. Zhao, Z. Chen, L. Chen, X. Huang.

11:00 - 11:30 Coffee Break

11:30 - 13:00 Session 2: ATTACKS 1 (session chair Fabio De Gaspari)

  • Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
    A. Inoue, T. Iwata, K. Minematsu.

  • Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
    P. Shrestha, N. Saxena.

  • ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes.
    N. Shafqat, D. J. Dubois, D. Choffnes, A. Schulman, D. Bharadia, A. Ranganathan.

13:00 - 14:00 Lunch Break

14:00 - 15:00 Invited Talk: Susan Hohenberger Waters

  • Chosen Ciphertext Security from Injective Trapdoor Functions

15:00 - 15:30 Coffee Break

15:30 - 17:30 Session 3: CRYPTOGRAPHIC PROTOCOLS (session chair Mark Manulis)

  • KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
    F. Günther, S. Rastikian, P. Towa, T. Wiggers.

  • Improving the Privacy of Tor Onion Services.
    E. Eaton, S. Sasy, I. Goldberg.

  • Privacy-Preserving Authenticated Key Exchange for Constrained Devices.
    L. Ferreira.

  • Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols.
    A. Pankova, J. Willemson.

17:30 - 17.45 Move to the Museo dell'Arte Classica in the Sapienza Main Campus

17.45 - 18.15 Guided tour of the museum

18.15 - 18:45 Poster session (session chair Emiliano Casalicchio)

18.45 - 19.30 Concert

  • Italian journey musical stroll from song to opera
    Ensemble L’Architasto: Cristiana Arcari soprano, Francesco Tomasi tiorba e chitarra, Massimo Carrano percussioni, Chiara Tiboni clavicembalo e pianoforte

19.30 - 21.00 Welcome reception party

Day 2: Tuesday, 21 June 2022

09:00 - 10:30 Session 4: SYSTEM SECURITY (session chair Alessandro Brighente)

  • An Approach to Generate Realistic HTTP Parameters for Application Layer Deception.
    M. Sahin, C. Hebert, R. C. Lozoya.

  • IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
    Y. Sun, S. Lv, J. You, Y. Sun, X. Chen, Y. Zheng, L. Sun.

  • Probing for Passwords – Privacy Implications of SSIDs in Probe Requests.
    J. A. McDougall, C. Burkert, D. Demmler, M. Schwarz, V. Hubbe, H. Federrath.

10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 5: ATTACKS 2 (session chair Angelo Spognardi)

  • Passive query-recovery attack against secure conjunctive keyword search schemes.
    M. Dijkslag, M. Damie, F. Hahn, A. Peter.

  • Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques.
    Z. Liu, P. Shrestha, N. Saxena.

  • Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators.
    F. Martinez
    (rescheduled from Session 9)

  • Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
    H. Esquivel-Vargas, J. H. Castellanos, M. Caselli, N. O. Tippenhauer, A. Peter. (rescheduled in Session 9)

12:30 - 14:00 Lunch Break

14:00 - 16:00 Session 6: CRYPTOGRAPHIC PRIMITIVES 1 (session chair Daniele Friolo)

  • A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
    L. Robert, P. Lafourcade, C. Onete, P. A. Fouque, T. Jacques, G. Arfaoui, A. Nedelcu.

  • Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE).
    T. H. Yuen, C. Zhang, S. S. M. Chow.

  • Progressive and Efficient Verification for Digital Signatures.
    C. Boschini, D. Fiore, E. Pagnin.

  • Revocable Hierarchical Attribute-based Signatures from Lattices.
    D. Gardham, M. Manulis.

16:00 - 16:30 Coffee Break

16:30 - 18:30 Session 7: MPC 1 (session chair Luigi V. Mancini)

  • Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities.
    A. Leroux, K. Eldefrawy, T. Lepoint.

  • PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
    J. H. M. Ying, S. Cao, G. S. Poh, J. Xu, H. W. Lim.

  • Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
    K. Phalakarn, N. Attrapadung, K. Matsuura.

  • Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security.
    S. Badrinarayanan, D. Masny, P. Mukherjee.

Day 3: Wednesday, 22 June 2022

09:00 - 10:30 Session 8: MPC 2 (session chair Daniele Friolo)

  • Efficient Two-party Exponentiation from Quotient Transfer.
    Y. Lu, K. Hara, K. Ohara, J. Schuldt, K. Tanaka.

  • Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
    T. Attema, V. Dunning, M. Everts, P. Langenkamp.

  • How Byzantine is a Send Corruption?
    K. Eldefrawy, J. Loss, B. Terner.

10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 9: ATTACKS 3 (session chair Jianying Zhou)

  • RSA Key Recovery from Digit Equivalence Information.
    C. Chuengsatiansup, A. Feutrill, R. Q. Sim, Y. Yarom.

  • Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
    H. Esquivel-Vargas, J. H. Castellanos, M. Caselli, N. O. Tippenhauer, A. Peter (rescheduled from Session 5)

  • Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
    H. Hadipour, M. Eichlseder.

  • Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators.
    F. Martinez. (rescheduled in Session 5)

12:30 - 14:00 Lunch Break

14:00 - 15:00 Invited Talk: Raluca Ada Popa

  • Secure computation in practice

15:00 - 15:30 Coffee Break

15:30 - 17:00 Session 10: BLOCKCHAIN (session chair Riccardo Lazzeretti)

  • Babel Fees via Limited Liabilities.
    M. Chakravarty, N. Karayannidis, A. Kiayias, M. P. Jones, P. Vinogradova.

  • FAST: Fair Auctions via Secret Transactions
    B. David, L. Gentile, M. Pourpouneh.

  • Astrape: Anonymous Payment Channels with Boring Cryptography.
    Y. Dong, I. Goldberg, S. Gorbunov, R. Boutaba.

From 17:00 Guided tour + social dinner

Day 4: Thursday, 23 June 2022

09:00 - 11:00 Session 11: BLOCK-CIPHERS (session chair Mauro Conti)

  • Covert Authentication from Lattices.
    R. Kumar, K. Nguyen. (rescheduled
    from Session 12)

  • A White-Box Speck Implementation using Self-Equivalence Encodings.
    J. Vandersmissen, A. Ranea, B. Preneel.

  • Improved Differential-Linear Attack with Application to Round-reduced Speck32/64
    F. Wang, G. Wang.

  • Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher.
    N. Bacuieti, L. Batina, S. Picek.

11:00 - 11:30 Coffee Break

11:30 - 13:00 Session 12: CRYPTOGRAPHIC PRIMITIVES 2 (session chair Giuseppe Ateniese)

  • Covert Authentication from Lattices.
    R. Kumar, K. Nguyen. (rescheduled in Session 11)

  • Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy.
    M. Liang, D. Gordon, J. Katz, J. Xu.

  • Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation.
    J. P. Bossuat, J. R. Troncoso-Pastoriza, J. P. Hubaux.

  • (Commit-and-Prove) Predictable Arguments with Privacy.
    H. Khoshakhlagh.

13:00 - 14:00 Lunch Break

14:00 - 16:00 Session 13: POST-QUANTUM CRYPTOGRAPHY (session chair Sergejs Kozlovičs)

  • Carry-Less to BIKE Faster.
    M. Krausz, J. Thoma, M. Chen, T. Güneysu.

  • Faster Kyber and Dilithium on the Cortex-M4.
    A. Abdulrahman, V. Hwang, M. J. Kannwischer, D. Sprenkels.

  • Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices.
    G. Banegas, K. Zandberg, A. Herrmann, E. Baccelli, B. Smith.

  • Post-Quantum ID-based Ring Signatures from Symmetric-key primitives.
    M. Buser, J. Liu, A. Sakzad, R. Steinfeld.

16:00 - 16:15 Closing remarks and committee acknowledgment