The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) is held in Singapore from the 1st to 5th of July, 2024.
https://asiaccs2024.sutd.edu.sg/wp-content/uploads/2024/06/toc.html
Privacy-Preserving Protocols
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing[1] zkMatrix: Batched Short Proof for Committed Matrix Multiplication[2] Honest Majority Multiparty Computation over Rings with Constant Online Communication[3] Ratel: MPC-extensions for Smart Contracts[4]
Post Quantum
HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning[5] Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies[6] REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography[7] Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond[8] SoK: CryptographicEstimators -- a Software Library for Cryptographic Hardness Estimation[9] OPRFs from Isogenies: Designs and Analysis[10]
Crypto and Privacy
Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries[11] Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption[12] Efficient Unbalanced Quorum PSI from Homomorphic Encryption[13] SweetPAKE: Key exchange with decoy passwords[14] MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning[15] LightPIR: Single-Server PIR via FHE without Gaussian Noise[16] Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting[17] Skye: An Expanding PRF based Fast KDF and its Applications[18] Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy[19]
Distributed and Decentralized Systems
An Empirical Study of Consensus Protocols’ DoS Resilience[20] SilentProof: Anonymous Authentication with Blockchain-Backed Offloading[21] Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains[22] SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks[23] zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain[24] CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification[25] BlindShuffler: Universal and Trustless Mixing for Confidential Transactions[26] PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge[27]
Authentication and Signatures
Delegating FIDO Credentials Using Single-use ECDSA Signatures[28] Quantum-Safe Account Recovery for WebAuthn[29] Byzantine Fault-Tolerant Aggregate Signatures[30] Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications[31]
: https://dl.acm.org/doi/10.1145/3634737.3657024
[2]: https://dl.acm.org/doi/10.1145/3634737.3645003
[3]: https://dl.acm.org/doi/10.1145/3634737.3661136
[4]: https://dl.acm.org/doi/10.1145/3634737.3661142
[5]: https://dl.acm.org/doi/10.1145/3634737.3656285
[6]: https://dl.acm.org/doi/10.1145/3634737.3657008
[7]: https://dl.acm.org/doi/10.1145/3634737.3657016
[8]: https://dl.acm.org/doi/10.1145/3634737.3637661
[9]: https://dl.acm.org/doi/10.1145/3634737.3645007
[10]: https://dl.acm.org/doi/10.1145/3634737.3645010
[11]: https://dl.acm.org/doi/10.1145/3634737.3657012
[12]: https://dl.acm.org/doi/10.1145/3634737.3656292
[13]: https://dl.acm.org/doi/10.1145/3634737.3657001
[14]: https://dl.acm.org/doi/10.1145/3634737.3645009
[15]: https://dl.acm.org/doi/10.1145/3634737.3637680
[16]: https://dl.acm.org/doi/10.1145/3634737.3661140
[17]: https://dl.acm.org/doi/10.1145/3634737.3656291
[18]: https://dl.acm.org/doi/10.1145/3634737.3637673
[19]: https://dl.acm.org/doi/10.1145/3634737.3637646
[20]: https://dl.acm.org/doi/10.1145/3634737.3656997
[21]: https://dl.acm.org/doi/10.1145/3634737.3637635
[22]: https://dl.acm.org/doi/10.1145/3634737.3637656
[23]: https://dl.acm.org/doi/10.1145/3634737.3637681
[24]: https://dl.acm.org/doi/10.1145/3634737.3637663
[25]: https://dl.acm.org/doi/10.1145/3634737.3637664
[26]: https://dl.acm.org/doi/10.1145/3634737.3637669
[27]: https://dl.acm.org/doi/10.1145/3634737.3637679
[28]: https://dl.acm.org/doi/10.1145/3634737.3657004
[29]: https://dl.acm.org/doi/10.1145/3634737.3661138
[30]: https://dl.acm.org/doi/10.1145/3634737.3657020
[31]: https://dl.acm.org/doi/10.1145/3634737.3637657