【论文速递】ASIA CCS '24(隐私保护协议、后量子、密码学、去中心化系统、认证签名)

文摘   2024-07-12 12:16   中国香港  

The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) is held in Singapore from the 1st to 5th of July, 2024.

  • https://asiaccs2024.sutd.edu.sg/wp-content/uploads/2024/06/toc.html

Privacy-Preserving Protocols

  • SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing[1]
  • zkMatrix: Batched Short Proof for Committed Matrix Multiplication[2]
  • Honest Majority Multiparty Computation over Rings with Constant Online Communication[3]
  • Ratel: MPC-extensions for Smart Contracts[4]

Post Quantum

  • HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning[5]
  • Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies[6]
  • REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography[7]
  • Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond[8]
  • SoK: CryptographicEstimators -- a Software Library for Cryptographic Hardness Estimation[9]
  • OPRFs from Isogenies: Designs and Analysis[10]

Crypto and Privacy

  • Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries[11]
  • Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption[12]
  • Efficient Unbalanced Quorum PSI from Homomorphic Encryption[13]
  • SweetPAKE: Key exchange with decoy passwords[14]
  • MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning[15]
  • LightPIR: Single-Server PIR via FHE without Gaussian Noise[16]
  • Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting[17]
  • Skye: An Expanding PRF based Fast KDF and its Applications[18]
  • Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy[19]

Distributed and Decentralized Systems

  • An Empirical Study of Consensus Protocols’ DoS Resilience[20]
  • SilentProof: Anonymous Authentication with Blockchain-Backed Offloading[21]
  • Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains[22]
  • SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks[23]
  • zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain[24]
  • CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification[25]
  • BlindShuffler: Universal and Trustless Mixing for Confidential Transactions[26]
  • PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge[27]

Authentication and Signatures

  • Delegating FIDO Credentials Using Single-use ECDSA Signatures[28]
  • Quantum-Safe Account Recovery for WebAuthn[29]
  • Byzantine Fault-Tolerant Aggregate Signatures[30]
  • Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications[31]
参考资料
[1]

: https://dl.acm.org/doi/10.1145/3634737.3657024

[2]

: https://dl.acm.org/doi/10.1145/3634737.3645003

[3]

: https://dl.acm.org/doi/10.1145/3634737.3661136

[4]

: https://dl.acm.org/doi/10.1145/3634737.3661142

[5]

: https://dl.acm.org/doi/10.1145/3634737.3656285

[6]

: https://dl.acm.org/doi/10.1145/3634737.3657008

[7]

: https://dl.acm.org/doi/10.1145/3634737.3657016

[8]

: https://dl.acm.org/doi/10.1145/3634737.3637661

[9]

: https://dl.acm.org/doi/10.1145/3634737.3645007

[10]

: https://dl.acm.org/doi/10.1145/3634737.3645010

[11]

: https://dl.acm.org/doi/10.1145/3634737.3657012

[12]

: https://dl.acm.org/doi/10.1145/3634737.3656292

[13]

: https://dl.acm.org/doi/10.1145/3634737.3657001

[14]

: https://dl.acm.org/doi/10.1145/3634737.3645009

[15]

: https://dl.acm.org/doi/10.1145/3634737.3637680

[16]

: https://dl.acm.org/doi/10.1145/3634737.3661140

[17]

: https://dl.acm.org/doi/10.1145/3634737.3656291

[18]

: https://dl.acm.org/doi/10.1145/3634737.3637673

[19]

: https://dl.acm.org/doi/10.1145/3634737.3637646

[20]

: https://dl.acm.org/doi/10.1145/3634737.3656997

[21]

: https://dl.acm.org/doi/10.1145/3634737.3637635

[22]

: https://dl.acm.org/doi/10.1145/3634737.3637656

[23]

: https://dl.acm.org/doi/10.1145/3634737.3637681

[24]

: https://dl.acm.org/doi/10.1145/3634737.3637663

[25]

: https://dl.acm.org/doi/10.1145/3634737.3637664

[26]

: https://dl.acm.org/doi/10.1145/3634737.3637669

[27]

: https://dl.acm.org/doi/10.1145/3634737.3637679

[28]

: https://dl.acm.org/doi/10.1145/3634737.3657004

[29]

: https://dl.acm.org/doi/10.1145/3634737.3661138

[30]

: https://dl.acm.org/doi/10.1145/3634737.3657020

[31]

: https://dl.acm.org/doi/10.1145/3634737.3637657


XPTY
寓形宇内复几时,曷不委心任去留?胡为乎遑遑欲何之?富贵非吾愿,帝乡不可期。怀良辰以孤往,或植杖而耘耔。登东皋以舒啸,临清流而赋诗。
 最新文章