20th International Conference on
Applied Cryptography and Network Security
Detailed main conference program
All the times are in CET (GMT+2)
The venue is arranged with three different rooms. We will use the zoom webinar to stream the works of the main conference from the auditorium of CNR, while we will stream the two concurrent workshops in two other rooms. In this way, every in person attendee can choose to attend the main conference or one of the two workshops running in parallel.
Day 1: Monday, 20 June 2022
From 8:45 Reception of participants
09:15 - 9.30 Welcoming Remarks: PC Chairs and General Chairs
09:30 - 11:00 Session 1: ENCRYPTION (session chair Daniele Venturi)
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation.
S. Sato, K. Emura, A. Takayasu.A Performance Evaluation of Pairing-Based Broadcast Encryption Systems.
A. Chhatrapati, S. Hohenberger, J. Trombo, S. Vusirikala.An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
L. Zhao, Z. Chen, L. Chen, X. Huang.
11:00 - 11:30 Coffee Break
11:30 - 13:00 Session 2: ATTACKS 1 (session chair Fabio De Gaspari)
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
A. Inoue, T. Iwata, K. Minematsu.Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
P. Shrestha, N. Saxena.ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes.
N. Shafqat, D. J. Dubois, D. Choffnes, A. Schulman, D. Bharadia, A. Ranganathan.
13:00 - 14:00 Lunch Break
14:00 - 15:00 Invited Talk: Susan Hohenberger Waters
Chosen Ciphertext Security from Injective Trapdoor Functions
15:00 - 15:30 Coffee Break
15:30 - 17:30 Session 3: CRYPTOGRAPHIC PROTOCOLS (session chair Mark Manulis)
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
F. Günther, S. Rastikian, P. Towa, T. Wiggers.Improving the Privacy of Tor Onion Services.
E. Eaton, S. Sasy, I. Goldberg.Privacy-Preserving Authenticated Key Exchange for Constrained Devices.
L. Ferreira.Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols.
A. Pankova, J. Willemson.
17:30 - 17.45 Move to the Museo dell'Arte Classica in the Sapienza Main Campus
17.45 - 18.15 Guided tour of the museum
18.15 - 18:45 Poster session (session chair Emiliano Casalicchio)
18.45 - 19.30 Concert
Italian journey musical stroll from song to opera
Ensemble L’Architasto: Cristiana Arcari soprano, Francesco Tomasi tiorba e chitarra, Massimo Carrano percussioni, Chiara Tiboni clavicembalo e pianoforte
19.30 - 21.00 Welcome reception party
Day 2: Tuesday, 21 June 2022
09:00 - 10:30 Session 4: SYSTEM SECURITY (session chair Alessandro Brighente)
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception.
M. Sahin, C. Hebert, R. C. Lozoya.IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
Y. Sun, S. Lv, J. You, Y. Sun, X. Chen, Y. Zheng, L. Sun.Probing for Passwords – Privacy Implications of SSIDs in Probe Requests.
J. A. McDougall, C. Burkert, D. Demmler, M. Schwarz, V. Hubbe, H. Federrath.
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 5: ATTACKS 2 (session chair Angelo Spognardi)
Passive query-recovery attack against secure conjunctive keyword search schemes.
M. Dijkslag, M. Damie, F. Hahn, A. Peter.Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques.
Z. Liu, P. Shrestha, N. Saxena.Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators.
F. Martinez (rescheduled from Session 9)Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.H. Esquivel-Vargas, J. H. Castellanos, M. Caselli, N. O. Tippenhauer, A. Peter.(rescheduled in Session 9)
12:30 - 14:00 Lunch Break
14:00 - 16:00 Session 6: CRYPTOGRAPHIC PRIMITIVES 1 (session chair Daniele Friolo)
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
L. Robert, P. Lafourcade, C. Onete, P. A. Fouque, T. Jacques, G. Arfaoui, A. Nedelcu.Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE).
T. H. Yuen, C. Zhang, S. S. M. Chow.Progressive and Efficient Verification for Digital Signatures.
C. Boschini, D. Fiore, E. Pagnin.Revocable Hierarchical Attribute-based Signatures from Lattices.
D. Gardham, M. Manulis.
16:00 - 16:30 Coffee Break
16:30 - 18:30 Session 7: MPC 1 (session chair Luigi V. Mancini)
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities.
A. Leroux, K. Eldefrawy, T. Lepoint.PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
J. H. M. Ying, S. Cao, G. S. Poh, J. Xu, H. W. Lim.Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
K. Phalakarn, N. Attrapadung, K. Matsuura.Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security.
S. Badrinarayanan, D. Masny, P. Mukherjee.
Day 3: Wednesday, 22 June 2022
09:00 - 10:30 Session 8: MPC 2 (session chair Daniele Friolo)
Efficient Two-party Exponentiation from Quotient Transfer.
Y. Lu, K. Hara, K. Ohara, J. Schuldt, K. Tanaka.Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
T. Attema, V. Dunning, M. Everts, P. Langenkamp.How Byzantine is a Send Corruption?
K. Eldefrawy, J. Loss, B. Terner.
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 9: ATTACKS 3 (session chair Jianying Zhou)
RSA Key Recovery from Digit Equivalence Information.
C. Chuengsatiansup, A. Feutrill, R. Q. Sim, Y. Yarom.Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
H. Esquivel-Vargas, J. H. Castellanos, M. Caselli, N. O. Tippenhauer, A. Peter (rescheduled from Session 5)Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
H. Hadipour, M. Eichlseder.Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Generators.F. Martinez.(rescheduled in Session 5)
12:30 - 14:00 Lunch Break
14:00 - 15:00 Invited Talk: Raluca Ada Popa
Secure computation in practice
15:00 - 15:30 Coffee Break
15:30 - 17:00 Session 10: BLOCKCHAIN (session chair Riccardo Lazzeretti)
Babel Fees via Limited Liabilities.
M. Chakravarty, N. Karayannidis, A. Kiayias, M. P. Jones, P. Vinogradova.FAST: Fair Auctions via Secret Transactions
B. David, L. Gentile, M. Pourpouneh.Astrape: Anonymous Payment Channels with Boring Cryptography.
Y. Dong, I. Goldberg, S. Gorbunov, R. Boutaba.
From 17:00 Guided tour + social dinner
Day 4: Thursday, 23 June 2022
09:00 - 11:00 Session 11: BLOCK-CIPHERS (session chair Mauro Conti)
Covert Authentication from Lattices.
R. Kumar, K. Nguyen. (rescheduled from Session 12)A White-Box Speck Implementation using Self-Equivalence Encodings.
J. Vandersmissen, A. Ranea, B. Preneel.Improved Differential-Linear Attack with Application to Round-reduced Speck32/64
F. Wang, G. Wang.Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher.
N. Bacuieti, L. Batina, S. Picek.
11:00 - 11:30 Coffee Break
11:30 - 13:00 Session 12: CRYPTOGRAPHIC PRIMITIVES 2 (session chair Giuseppe Ateniese)
Covert Authentication from Lattices.R. Kumar, K. Nguyen.(rescheduled in Session 11)Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy.
M. Liang, D. Gordon, J. Katz, J. Xu.Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation.
J. P. Bossuat, J. R. Troncoso-Pastoriza, J. P. Hubaux.(Commit-and-Prove) Predictable Arguments with Privacy.
H. Khoshakhlagh.
13:00 - 14:00 Lunch Break
14:00 - 16:00 Session 13: POST-QUANTUM CRYPTOGRAPHY (session chair Sergejs Kozlovičs)
Carry-Less to BIKE Faster.
M. Krausz, J. Thoma, M. Chen, T. Güneysu.Faster Kyber and Dilithium on the Cortex-M4.
A. Abdulrahman, V. Hwang, M. J. Kannwischer, D. Sprenkels.Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices.
G. Banegas, K. Zandberg, A. Herrmann, E. Baccelli, B. Smith.Post-Quantum ID-based Ring Signatures from Symmetric-key primitives.
M. Buser, J. Liu, A. Sakzad, R. Steinfeld.
16:00 - 16:15 Closing remarks and committee acknowledgment