CANS 2023: INTERNATIONAL CONFERENCE ON CRYPTOLOGY AND NETWORK SECURITY
PROGRAM

Days: Tuesday, October 31st Wednesday, November 1st Thursday, November 2nd

Tuesday, October 31st

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 1: Schemes I
09:00
Forward Security under Leakage Resilience, Revisited (abstract)
09:30
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE (abstract)
PRESENTER: Yoshinori Aono
10:00
Traceable Policy-Based Signatures with Delegation (abstract)
PRESENTER: Ismail Afia
11:00-12:30 Session 2: Basic Primitives
Chair:
11:00
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium (abstract)
PRESENTER: Timo Glaser
11:30
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks (abstract)
PRESENTER: Yuqing Zhao
12:00
Hardness of Learning AES with Gradient-based Methods (abstract)
14:00-15:30 Session 3: Security
14:00
Privacy-Preserving Digital Vaccine Passport (abstract)
PRESENTER: Jiahui Gao
14:30
Exploiting Android Browser (abstract)
15:00
Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners (abstract)
PRESENTER: Daniel Timko
16:00-17:00 Session 4: MPC with Cards
16:00
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-Input AND Protocols (abstract)
PRESENTER: Takuto Yoshida
16:30
Free-XOR in Card-based Garbled Circuits (abstract)
PRESENTER: Yoshifumi Manabe
Wednesday, November 1st

View this program: with abstractssession overviewtalk overview

09:00-11:00 Session 5: Cryptanalysis
09:00
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal (abstract)
09:30
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives (abstract)
PRESENTER: Simone Pelizzola
10:00
Key Filtering in Cube Attacks from the Implementation Aspect (abstract)
PRESENTER: Hao Fan
10:30
New Techniques for Modeling SBoxes: An MILP Approach (abstract)
PRESENTER: Debranjan Pal
11:30-12:30 Session 6: Invited Talk: Vitaly Shmatikov

Title: Building Covert Communication Systems That Resist Traffic Analysis

Covert, censorship-resistant communication in the presence of nation-state adversaries requires unobservable channels whose operation is difficult to detect via network-traffic analysis.  One promising approach is traffic substitution: use an already-existing encrypted  channel established by some application and replace that application's data with covert content.

In this talk, I will explain the challenges of traffic substitution and show how substitution channels can fail even against simple network adversaries.  I will then discuss our experience designing and implementing Telepath, a new Minecraft-based covert communication  system.

Finally, I will present general principles for building covert channels that resist traffic analysis.

14:00-15:00 Session 7: Invited Talk: Eric Toler

Title: Cultivating a National Culture of Cybersecurity

Global cyber threats are outpacing the ability of Western democracies to mitigate or defeat those threats.  The cyber capabilities of adversarial nation states have vastly improved in the last decade while cybercrime is set to become the third largest economy in the world by 2025.  At the same time, the global cyber workforce gap continues to grow at an alarming pace.  These trends, coupled with sluggish bureaucratic reaction speed, will nullify the U.S. and its allies' dominance in the information environment in the next few years – unless we do things differently.  This presentation will highlight why the status quo has led to many national shortcomings in cybersecurity and discuss why it is an existential imperative to start cultivating a national culture of cybersecurity today. 

15:30-17:30 Session 8: Blockchain
15:30
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness (abstract)
PRESENTER: Ranjit Kumaresan
16:00
Improving Privacy of Anonymous Proof-of-Stake Protocols (abstract)
PRESENTER: Shichen Wu
16:30
Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys (abstract)
PRESENTER: Surbhi Shaw
17:00
CTA: Confidential Transactions Protocol with State Accumulator (abstract)
PRESENTER: Shumin Si
Thursday, November 2nd

View this program: with abstractssession overviewtalk overview

09:00-11:00 Session 9: MPC and Secret Sharing (and two talks from Schemes II)
09:00
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets (abstract)
PRESENTER: Ranjit Kumaresan
09:30
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing (abstract)
10:00
Lattice-based Key-Value Commitment scheme with key-binding and key-hiding (abstract)
PRESENTER: Hideaki Miyaji
10:30
A Practical Forward-Secure DualRing (abstract)
PRESENTER: Atsuko Miyaji
11:30-12:30 Session 10: Schemes II
11:30
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption (abstract)
12:00
A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators (abstract)