> The 19th ACM ASIA Conference on Computer and Communications Security (**ACM ASIACCS 2024**) is held in **Singapore** from the **1st to 5th of July, 2024**. - https://asiaccs2024.sutd.edu.sg/wp-content/uploads/2024/06/toc.html ## Privacy-Preserving Protocols - [SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing](https://dl.acm.org/doi/10.1145/3634737.3657024 " ") - [zkMatrix: Batched Short Proof for Committed Matrix Multiplication](https://dl.acm.org/doi/10.1145/3634737.3645003 " ") - [Honest Majority Multiparty Computation over Rings with Constant Online Communication](https://dl.acm.org/doi/10.1145/3634737.3661136 " ") - [Ratel: MPC-extensions for Smart Contracts](https://dl.acm.org/doi/10.1145/3634737.3661142 " ") ## Post Quantum - [HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning](https://dl.acm.org/doi/10.1145/3634737.3656285 " ") - [Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies](https://dl.acm.org/doi/10.1145/3634737.3657008 " ") - [REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography](https://dl.acm.org/doi/10.1145/3634737.3657016 " ") - [Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond](https://dl.acm.org/doi/10.1145/3634737.3637661 " ") - [SoK: CryptographicEstimators -- a Software Library for Cryptographic Hardness Estimation](https://dl.acm.org/doi/10.1145/3634737.3645007 " ") - [OPRFs from Isogenies: Designs and Analysis](https://dl.acm.org/doi/10.1145/3634737.3645010 " ") ## Crypto and Privacy - [Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries](https://dl.acm.org/doi/10.1145/3634737.3657012 " ") - [Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption](https://dl.acm.org/doi/10.1145/3634737.3656292 " ") - [Efficient Unbalanced Quorum PSI from Homomorphic Encryption](https://dl.acm.org/doi/10.1145/3634737.3657001 " ") - [SweetPAKE: Key exchange with decoy passwords](https://dl.acm.org/doi/10.1145/3634737.3645009 " ") - [MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning](https://dl.acm.org/doi/10.1145/3634737.3637680 " ") - [LightPIR: Single-Server PIR via FHE without Gaussian Noise](https://dl.acm.org/doi/10.1145/3634737.3661140 " ") - [Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting](https://dl.acm.org/doi/10.1145/3634737.3656291 " ") - [Skye: An Expanding PRF based Fast KDF and its Applications](https://dl.acm.org/doi/10.1145/3634737.3637673 " ") - [Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy](https://dl.acm.org/doi/10.1145/3634737.3637646 " ") ## Distributed and Decentralized Systems - [An Empirical Study of Consensus Protocols’ DoS Resilience](https://dl.acm.org/doi/10.1145/3634737.3656997 " ") - [SilentProof: Anonymous Authentication with Blockchain-Backed Offloading](https://dl.acm.org/doi/10.1145/3634737.3637635 " ") - [Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains](https://dl.acm.org/doi/10.1145/3634737.3637656 " ") - [SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks](https://dl.acm.org/doi/10.1145/3634737.3637681 " ") - [zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain](https://dl.acm.org/doi/10.1145/3634737.3637663 " ") - [CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification](https://dl.acm.org/doi/10.1145/3634737.3637664 " ") - [BlindShuffler: Universal and Trustless Mixing for Confidential Transactions](https://dl.acm.org/doi/10.1145/3634737.3637669 " ") - [PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge](https://dl.acm.org/doi/10.1145/3634737.3637679 " ") ## Authentication and Signatures - [Delegating FIDO Credentials Using Single-use ECDSA Signatures](https://dl.acm.org/doi/10.1145/3634737.3657004 " ") - [Quantum-Safe Account Recovery for WebAuthn](https://dl.acm.org/doi/10.1145/3634737.3661138 " ") - [Byzantine Fault-Tolerant Aggregate Signatures](https://dl.acm.org/doi/10.1145/3634737.3657020 " ") - [Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications](https://dl.acm.org/doi/10.1145/3634737.3637657 " ")