The 6th ACM ASIA Public-Key Cryptography Workshop (APKC 2019)

  July 8, 2019, Auckland, New Zealand

held in conjunction with The 14th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2019)

Call For Paper

The workshop will be held on July 8 from 09:25 at Seminar Room 503-020, University of Auckland Faculty of Medical and Health Sciences 85 Park Road, Grafton.

(PDF) Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography. The 1st edition of the event (ASIAPKC 2013, DBLP) has been held in Hangzhou, China, the 2nd edition of the event (ASIAPKC 2014, DBLP) has been held in Kyoto, Japan, the 3rd edition of the event (ASIAPKC 2016, DBLP) has been held in Xi'an, China, the 4th edition of the event (APKC 2017, DBLP) has been held in Abu Dhabi, UAE, and the 5th edition of the event (APKC 2018, DBLP) has been held in Incheon, Korea. The 6th edition of the event (APKC 2019) will be held in Auckland, New Zealand, in conjunction with ASIACCS 2019 (Web).

As in the previous series, the proceedings of APKC 2019 will be published by ACM Press and appear in ACM digital library.

Topics of interest to the workshop include, but are not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Two-party and multi-party computations
  • Card-based cryptographic protocols
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • System security properties of public-key cryptography
  • Digital signatures with special properties
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems
  •  
  •  
  •  

       

We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although SoK papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title.

Contact E-mail: apkc2019(at)ml(dot)nict(dot)go(dot)jp

Important Dates

   

Submission due: January 28, 2019 Feb. 11 (23:59 (UTC)), 2019 (Extended)

Notification: April 8, 2019

Proceedings version due: April 22, 2019

APKC workshop: July 8 AM, 2019

Submission

   

Submission Page: https://easychair.org/conferences/?conf=apkc2019

Instructions for authors:

Technical papers submitted for APKC are to be written in English. Papers must be at most 8 pages excluding bibliography and appendices, and at most 10 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submissions must follow the new ACM conference template, which has been updated for 2017 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers.

APKC requires double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs. Authors of accepted papers must guarantee that their papers will be presented at the workshop. Note that for attending APKC 2019, please make a registration for ASIACCS 2019. Submissions to APKC 2019 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection. Detected violations may be reported to other conference chairs and journal editors. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits.

On Conflicts of Interest:

The program chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who may have a conflict of interest. During the submission, authors should identify members of the program committee with whom they have a conflict of interest. Conflict of interest includes but not limited to: advisors and advisees (at any time in the past); authors and PC members who share an institutional relationship; professional collaborations (regardless of whether they resulted in a publication) that occurred in the past 2 years; line-of-management relationship, grant program manager, close personal relationships.

Camera Ready

   

Organizers

   
Program Co-Chairs:  
Keita Emura National Institute of Information and Communications Technology (NICT), Japan
Takaaki Mizuki Tohoku University, Japan
   
Program Committee:
   
Jonathan Bootle IBM Research - Zurich, Switzerland
Jie Chen East China Normal University, China
Alexander Koch Karlsruhe Institute of Technology (KIT), Germany
Pascal Lafourcade Université Clermont Auvergne, LIMOS, France
Sebastian Lauer Ruhr University Bochum, Germany
Hyung Tae Lee Chonbuk National University, Korea
Iraklis Leontiadis Ecole Polytechnique Fédérale de Lausanne, Switzerland
Shengli Liu Shanghai Jiao Tong University, China
Joseph Liu Monash University, Australia
Takahiro Matsuda National Institute of Advanced Industrial Science and Technology (AIST), Japan
Khoa Nguyen Nanyang Technological University, Singapore
Tran Viet Xuan Phuong University of Wollongong, Australia
Jae Hong Seo Hanyang University, Korea
Daniel Slamanig AIT Austrian Institute of Technology, Austria
Atsushi Takayasu The University of Tokyo, Japan
Qiang Tang New Jersey Institute of Technology, USA
Takashi Yamakawa NTT Secure Platform Laboratories, Japan
Yohei Watanabe National Institute of Information and Communications Technology (NICT), Japan
Kazuki Yoneyama Ibaraki University, Japan
Rui Zhang Chinese Academy of Sciences, China
   

Program

   
09:25--09:30 Welcome from Chairs : Keita Emura (NICT)
Invited Talk
Chair: Keita Emura (NICT)
09:30--10:30 Recent Advances in Attribute-Based Signature [PDF]
  Yusuke Sakai (AIST, Japan)
   
10:30--11:00 Break
   
Main Session
Chair: Takaaki Mizuki (Tohoku University)
11:00--11:30 Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption [PDF]
  Yoshitatsu Matsuda (Seikei University, Japan), Tadanori Teruya (National Institute of Advanced Industrial Science and Technology, Japan) and Kenji Kashiwabara (The University of Tokyo, Japan)
11:30--12:00 Rank-metric encryption on Arm-Cortex M0 [PDF]
  Ameera Al Abdouli (DarkMatter LLC, Abu Dhabi, UAE), Emanuele Bellini (DarkMatter LLC, Abu Dhabi, UAE), Florian Caullery (DarkMatter LLC, Abu Dhabi, UAE), Marc Manzano (DarkMatter LLC, Abu Dhabi, UAE) and Victor Mateu (DarkMatter LLC, Abu Dhabi, UAE)
12:00--12:30 A Tightly-Secure Lattice-Based Multisignature [PDF]
  Masayuki Fukumitsu (Hokkaido Information University, Japan) and Shingo Hasegawa (Tohoku University, Japan)
   
12:30--12:35 Closing from Chairs : Keita Emura (NICT)