The 2nd ACM ASIA Public-Key Cryptography Workshop

(ASIAPKC 2014)

  Tuesday June 3, 2014, Kyoto, Japan

held in conjunction with The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)

Call For Paper

   

ASIAPKC 2014 Program is Available (Acceptance ratio: 6/22 (27%))

ASIAPKC 2014 Proceedings: (See ACM Digital Library and DBLP)

(PDF) Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography.

The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014 and 1st ASIAPKC proceedings). See also ASIAPKC 2013 DBLP page as a reference. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format.

Topics of interest to the workshop include, but are not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Two-party and multi-party computations
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • Digital signatures with special properties
  • System security properties of public-key cryptography
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems

Important Dates

   

Submission due: Feb 10, 2014 Feb 21, 2014  Closed

Notification: March 10, 2014 March 21, 2014

Proceedings version due: March 24, 2014 April 8, 2014

ASIAPKC workshop: June 3, 2014

ASIACCS symposium: June 4 - June 6, 2014 (2-3 June 2014 for workshops)

Submission

   

Submission Page: Online Submission has been closed.

Instructions for authors:

Submission must be written in English. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submitted papers must be in the double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates, both Option 1 and Option 2 on the page are fine) with page numbers marked. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. The workshop reserves the right to request the source files for a submission to verify compliance with these requirements. Submitted papers must be PDF files.

Submitted papers must be appropriately anonymized. No information about author's name should be identifiable from the paper (including abstract, related work, references). When citing one's own previous work, third person should be used. Submitted papers must not substantially overlap papers that have been published or are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is prohibited. Authors of accepted papers must guarantee that their papers will be presented at the workshop. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits.

Camera Ready

   

Instructions to Authors: http://www.sheridanprinting.com/typedept/asiapkc.htm

Organizers

   
Program Co-Chairs  
Keita Emura National Institute of Information and Communications Technology, Japan
Goichiro Hanaoka National Institute of Advanced Industrial Science and Technology, Japan
Yunlei Zhao Fudan University, China
   
Program Committee
 
Nuttapong Attrapadung National Institute of Advanced Industrial Science and Technology, Japan
Sherman S.M. Chow Chinese University of Hong Kong, Hong Kong
Keita Emura (co-chair) National Institute of Information and Communications Technology, Japan
Sebastian Faust Ecole Polytechnique Federale de Lausanne, Switzerland
Ryou Fujita Chuo University, Japan
Goichiro Hanaoka (co-chair) National Institute of Advanced Industrial Science and Technology, Japan
Noboru Kunihiro The University of Tokyo, Japan
Benoit Libert Technicolor, France
Shengli Liu Shanghai Jiaotong University, China
Takahiro Matsuda National Institute of Advanced Industrial Science and Technology, Japan
Jacob Schuldt Royal Holloway, University of London, UK
Jian Weng Jinan University, China
Duncan S. Wong City University of Hong Kong, Hong Kong
Xun Yi Victoria University, Australia
Kazuki Yoneyama NTT, Japan
Fangguo Zhang Sun Yat-sen University, China
Yunlei Zhao (co-chair) Fudan University, China
   

Program

   
08:30--08:40 Opening Remark: Keita Emura (NICT)
   
Session I: Chair: Noboru Kunihiro (The University of Tokyo)
08:40--9:10 Generalized Homomorphic MACs with Efficient Verification
  Liang Feng Zhang (University of Calgary, Canada) and Reihaneh Safavi-Naini (University of Calgary, Canada)
09:10--9:40 Two Applications of Multilinear Maps: Group Key Exchange and Witness Encryption
  Seiko Arita (Institute of Information Security, Japan) and Sari Handa (Institute of Information Security, Japan)
09:40--10:10 Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management
  Kazuma Ohara (The University of Electro-Communications, Japan), Yusuke Sakai (National Institute of Advanced Industrial Science and Technology, Japan), Fumiaki Yoshida (The University of Electro-Communications, Japan), Mitsugu Iwamoto (The University of Electro-Communications, Japan) and Kazuo Ohta (The University of Electro-Communications, Japan)
   
10:10--10:30 Coffee Break
   
Session II, Chair: Takahiro Matsuda (AIST)
10:30--11:00 Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
  Daniel Cabarcas (Universidad Nacional de Colombia, Colombia), Florian Göpfert (Technische Universität Darmstadt, Germany) and Patrick Weiden (Technische Universität Darmstadt, Germany)
11:00--11:30 A New Perturbed Matsumoto-Imai Signature Scheme
  Wenbin Zhang (National University of Singapore, Singapore) and Chik How Tan (National University of Singapore, Singapore)
11:30--12:00 Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm
  Hiroaki Anada (Institute of Systems, Information Technologies and Nanotechnologies, Japan), Seiko Arita (Institute of Information Security, Japan) and Kouichi Sakurai (Kyushu University, Japan)
   
12:00--13:30 Lunch Break
   
Invited Talk, Chair: Goichiro Hanaoka (AIST)
13:30--14:30 Introduction of Structure-Preserving Signatures
  Miyako Ohkubo (National Institute of Information and Communications Technology, Japan)
   
14:30--14:40 Closing Remark: Goichiro Hanaoka (AIST)