ACNS 2026: Cycle 1 Accepted Papers (original) (raw)
Cycle1 accepted papers
SoK: A Taxonomy of Attacks and Defenses in Split Learning
Aqsa Shabbir (Bilkent University), Halil Ibrahim Kanpak (Koç University), Alptekin Küpçü (Koç University), Sinem Sav (Bilkent University)
Efficient Post-Quantum EPID Signatures From VOLE-in-the-Head
Zuming Liu (Shanghai Jiao Tong University), Deng Tang (Shanghai Jiao Tong University), Yanhong Xu (Shanghai Jiao Tong University)
From Sands to Mansions: Actionable, Customizable, and Causality-Preserving Cyberattack Emulation with LLM-powered Symbolic Planning
Lingzhi Wang (Northwestern University), Zhenyuan LI (Zhejiang University), Yi Jiang (Zhejiang University), Zhengkai Wang (Zhejiang University), Xiangmin Shen (Hofstra University), Wei Ruan (Zhejiang University), Yan Chen (Northwestern University)
Improving Correlation Power Analysis on Masked CRYSTALS-Kyber with Lattice Attack
Yen-Ting Kuo (The University of Tokyo), Atsushi Takayasu (The University of Tokyo)
ChatIoT: Large Language Model-based Security Assistant for Internet of Things with RAG
Ye Dong (National University of Singapore), Yan Lin Aung (University of Derby), Sudipta Chattopadhyay (University of Missouri, Kansas City (UMKC)), Jianying Zhou (Singapore University of Technology and Design)
Protecting Quantum Circuits Through Compiler - Resistant Obfuscation
Pradyun P (Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore), Amal Raj (Singapore Institute of Technology, Singapore), Vivek Balachandran (Singapore Institute of Technology, Singapore)
Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions
Alberto Maria Mongardini (Department of Computer Science, Sapienza University of Rome), Daniele Friolo (Sapienza University of Rome), Giuseppe Ateniese (George Mason University)
Topology-Hiding Path Validation for Large-Scale Quantum Key Distribution Networks
Stephan Krenn (AIT Austrian Institute of Technology), Omid Mir (AIT Austrian Institute Of Technology), Thomas Lorünser (AIT Austrian Institute of Technology), Sebastian Ramacher (AIT Austrian Institute of Technology), Florian Wohner (AIT Austrian Institute of Technology)
How to kickstart Fsmt with Short Authentication Strings and Out-Of-Band Communication
Wasilij Beskorovajnov (FZI Research Center for Information Technology), Jörn Müller-Quade (Karlsruhe Institute of Technology (KIT))
SoK: Benchmark Datasets for Evaluating AI Safety — Gaps Between Guidelines and Practice
Nami Ashizawa (NTT), Osamu Saisho (NTT)
TAPIR: A Two-Server Authenticated PIR Scheme with Preprocessing
Francesca Falzon (ETH Zurich), Laura Hetz (ETH Zurich), Annamira O’Toole (ETH Zurich, EPFL)
Firmware Transparency: Strengthening Security Guarantees Against Bootloader-Targeting Attacks
Mario Lins (Johannes Kepler University Linz), René Mayrhofer (Johannes Kepler University Linz), David Zeuthen (Google)
FedFDP: Fairness-Aware Federated Learning with Differential Privacy
Xinpeng Ling (East China Normal University), Jie Fu (Stevens Institute of Technology), Huifa Li (East China Normal University), Tong Cheng (East China Normal University), Kuncan Wang (Nanyang Technological University), Zhili Chen (East China Normal University)
Policy-Based Access Tokens: Privacy-Preserving Verification for Digital Identity
Daniel Gardham (University of Surrey), Kiran Pun (University of Surrey), Nick Frymann (University of Surrey)
Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption
Ivan Costa (GECAD), Pedro Correia (FEUP), Ivone Amorim (ISEP), Eva Maia (GECAD), Isabel Praça (ISEP)
Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM
Yusuke Naito (Mitsubishi Electric Corporation), Yu Sasaki (NTT Social Informatics Laboratories, NIST Associate), Takeshi Sugawara (The University of Electro-Communications)
SoK: Outsourced Private Set Intersection
Sophie Hawkes (Royal Holloway, University of London), Christian Weinert (Royal Holloway, University of London)
FlexProofs: A Vector Commitment with Flexible Linear Time for Computing All Proofs
Jing Liu (ShanghaiTech University), Liang Feng Zhang (ShanghaiTech University)
OptiBridge: A Trustless, Cost-Efficient Bridge Between the Lightning Network and Ethereum
Mohsen Minaei (Visa Research), Duc Le (Visa Research), Pedro Moreno-Sanchez (IMDEA Software Institute, MPI-SP)
Deception by Design: A Configurable Platform for Flexible Cyber Deception Strategy Testing and Evaluation
Sukwha Kyung (Arizona State University), Souradip Nath (Arizona State University), Jaejong Baek (Arizona State University), Gail-Joon Ahn (Arizona State University)
$2B Lessons: Brigade as a Defense Against Real-World DeFi Bridge Exploits
Pascal Winkler (University of Duisburg-Essen), Jens-Rene Giesen (University of Duisburg-Essen), Oussama Draissi (University of Duisburg-Essen), Federico Badaloni (Max Planck Institute for Security and Privacy), Sebastian Holler (Max Planck Institute for Security and Privacy), Clara Schneidewind (MPI-SP), Lucas Davi (University of Duisburg-Essen)
PrivSpike: A Privacy-Preserving Inference Framework for Deep Spiking Neural Networks using Homomorphic Encryption
Nges Brian Njungle (Arizona State University), Eric Jahns (Arizona State University), Milan Stojkov (Faculty of Technical Sciences, University of Novi Sad), Michel Kinsy (Arizona State University)
X-CHAIN: Enhancing Electronic Supply Chain Security with 3D X-ray Inspection and Blockchain Integration
Tishya Sarma Sarkar (Indian Institute of Technology Kharagpur), Chandan Kumar (Indian Institute of Technology Kharagpur), Abhishek Chakraborty (Indian Institute of Technology Kharagpur), Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)
Faster signature verification with 3-dimensional decomposition
Vojtech Suchanek (Masaryk University), Marek Sýs (Masaryk University), Lukasz Chmielewski (Masaryk University)
RESPEC-CFA: Representation-Aware Speculative Control Flow Attestation
Liam Tyler (University of Zurich), Adam Caulfield (University of Waterloo), Ivan De Oliveira Nunes (University of Zurich)
Practice-Oriented Instances of Deterministic LPN
Carlos Cid (Simula UiB and Okinawa Institute of Science and Technology), Alex Davidson (LASIGE, Faculdade de Ciencias, Universidade de Lisboa), Atharva Phanse (Simula UiB)
The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes
Gorjan Alagic (University of Maryland and NIST), Fahran Bajaj (University of Maryland), Aybars Kocoglu (University of Maryland, College Park)