Program
August 28th (Day 0), 2023
August 29th (Day 1), 2023
| Time (JST) | Session | Content | 
|---|---|---|
| 09:00–09:30 | Registration | |
| 09:30–09:40 | Opening Remarks | |
| 09:40–10:40 | Keynote I Session Chair: Junji Shikata (Yokohama National University, Japan) | Standardization of Ascon Family Dr. Meltem Sonmez Turan (National Institute of Standards and Technology) | 
| 10:40–11:00 | Break | |
| 11:00–12:00 | Track A Session: Session Chair: Kazumasa Shinagawa (Ibaraki University, Japan) | Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding Koji Nuida Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara and Léo Robert | 
| 12:00–14:00 | Lunch Break | |
| 14:00–15:00 | Keynote II Session Chair: Hiroki Kuzuno (Kobe University, Japan) | Provable Security for the Real World Prof. Gernot Heiser (University of New South Wales) (online) | 
| 15:00–15:20 | Break | |
| 15:20–16:20 | Track B Session: Session Chair: Masaya Sato (Okayama Prefectural University) | Power analysis pushed too far: breaking Android-based isolation with fuel gauges Vincent Giraud and David Naccache Reliability of Ring Oscillator PUFs with Reduced Helper Data Julien Béguinot, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley, Wei Cheng and Ville-Oskari Yli-Mayry | 
| 16:20–18:00 | Poster Session | |
| 19:00–21:00 | Welcome Reception | 
August 30th (Day 2), 2023
| Time (JST) | Session | Content | 
|---|---|---|
| 09:00–10:00 | Keynote III Session Chair: Koji Chida (Gunma University, Japan) | PETs: Promise, expectation, hope, and reality Dr. Kris Shrishak (Irish Council for Civil Liberties) | 
| 10:00–10:30 | Break / Poster Session | |
| 10:30–12:00 | Track A Session: Session Chair: Serge Vaudenay (EPFL, Switzerland) | A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack Hiroki Furue and Yasuhiko Ikematsu Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors Haiming Zhu, Shoichi Kamada, Momonari Kudo and Tsuyoshi Takagi Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials Max Cartor, Ryann Cartor, Mark Lewis and Daniel Smith-Tone | 
| 12:00–13:20 | Lunch Break | |
| 13:20–13:50 | Track B Session: Session Chair: Hiroki Kuzuno (Kobe University, Japan) | The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati and Stefano Zanero | 
| 13:50–14:00 | Break | |
| 14:00–15:00 | Track A Session: Session Chair: Atsushi Fujioka (Kanagawa University, Japan) | Extractable Witness Encryption for the Homogeneous Linear Equation problem Bénédikt Tran and Serge Vaudenay Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger Laurane Marco, Abdullah Talayhan and Serge Vaudenay | 
| 15:00–15:20 | Break | |
| 15:20–16:20 | Track A Session: Session Chair: Noboru Kunihiro (University of Tsukuba, Japan) | aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt and Raphael Toledo TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup Hyeonbum Lee and Jae Hong Seo | 
| 16:20–16:40 | Break | |
| 16:40–18:25 | SCIS/CSS Session Session Chair: Kazuhiko Minematsu (NEC, Japan and Yokohama National University, Japan) | Embedding Input Data Information in AI's Inference Results Kazuki Iwahana (NTT Social Informatics Laboratories) Limitations of Ring Oscillator-based Detection Methods against Laser Fault Injection Attacks on FPGA Shungo Hayashi (Yokohama National University / National Institute of Advanced Industrial Science and Technology) A Security Analysis and Efficient Generic Construction of CCA-Secure Updatable Public Key Encryption Kyoichi Asano (The University of Electro-Communications) Homomorphic Evaluation for Indeterminate Equations Public-key Cryptosystem (Giophantus+) Akira Nakashima (Secure System Platform Research Laboratories, NEC Corporation) Browser Permission Mechanisms Demystified Kazuki Nomoto (Waseda University / Deloitte Tohmatsu Cyber LLC) Qubit-less Shor's Algorithm for Binary ECDLP Ren Taguchi (The University of Tokyo) Study on Linkable Ring Signature with Unconditional Anonymity Kazuki Yamamura (NTT Social Informatics Laboratories) | 
| 19:00–21:00 | Banquet | 
August 31st (Day 3), 2023
| Time (JST) | Session | Content | 
|---|---|---|
| 09:00–10:00 | Track A Session: Session Chair: Shoichi Hirose (University of Fukui, Japan) | Improved Boomerang Attacks on Deoxys-BC Jiahao Zhao, Ling Song, Qianqian Yang, Nana Zhang and Lei Hu PMACrx: a vector-input MAC for high-dimensional vectors with BBB security Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu and Tetsu Iwata | 
| 10:00–10:20 | Break | |
| 10:20–11:35 | SCIS/CSS Session Session Chair: Naoto Yanai (Osaka University, Japan) | xltrace: Cross-architecture Tracing for Library Functions Shu Akabane (Kanagawa Institute of Technology) Card-based Cryptographic Protocols for Private Set Intersection and Union Tomoki Ono (The University of Electro-Communications) Post-Quantum Authenticated Key Exchange Resilient to Ephemeral Key Leakage in the Bounded-Retrieval Model for IoT Kazuki Yoneyama (Ibaraki University) The Catcher in the Eye: Recognizing Users by their Blinks Ryo Iijima (National Institute of Advanced Industrial Science and Technology (AIST) / Waseda University) On Rényi Differential Privacy in Statistics-Based Synthetic Data Generation Takayuki Miura (NTT Social Informatics Laboratories) | 
| 11:35–11:45 | Closing Remarks | |
| 12:30–18:00 | Excursion | 
Accepted Papers
Track A
- 
                Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding 
- 
                Extractable Witness Encryption for the Homogeneous Linear Equation problem 
- 
                Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger 
- 
                Improved Boomerang Attacks on Deoxys-BC 
- 
                TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup 
- 
                PMACrx: a vector-input MAC for high-dimensional vectors with BBB security 
- 
                Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors 
- 
                A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack 
- 
                aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes 
- 
                Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun 
- 
                Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials 
Track B
- 
                Power analysis pushed too far: breaking Android-based isolation with fuel gauges 
- 
                Reliability of Ring Oscillator PUFs with Reduced Helper Data 
- 
                The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 
Accepted Posters
- 
                Proposal of the IoT malware-disabling method 
- 
                A Combinatorial Approach to IoT Data Security 
- 
                KOTO Crypto: Educational cryptography with the Koto 
- 
                Credit-Aware Voting for Decentralized Federated Learning 
- 
                Security Analysis on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator 
- 
                Research on False Base Station Attack Detection Technique Based on Behavior Rule Specification 
- 
                Multivariate Gaussian Mechanism for Approximate Differential Privacy 
- 
                Confidentiality Assurance Using Proof-Carrying Code for TEE-Based Secure Computation: Experiment on TEE 
- 
                Member Removal Mechanism for TreeKEM to Deal with Offline Members 
- 
                Leveraging Trusted Execution Environment and Distributed Ledger Technology for Data Usage Control: Towards Confidential Data Integration 
Contest Summary
Hiroaki Kikuchi and Makoto Iguchi
Talks by excellent teams
Award ceremony