The 2nd ACM ASIA Public-Key Cryptography Workshop (ASIAPKC 2014)
|
held in conjunction with The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) |
ASIAPKC 2014 Program is Available (Acceptance ratio: 6/22 (27%))
The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014 and 1st ASIAPKC proceedings). See also ASIAPKC 2013 DBLP page as a reference. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format. Topics of interest to the workshop include, but are not limited to:
|
Submission due: Notification: Proceedings version due: ASIAPKC workshop: June 3, 2014 ASIACCS symposium: June 4 - June 6, 2014 (2-3 June 2014 for workshops) |
Submission Page: Online Submission has been closed. Instructions for authors: Submission must be written in English. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submitted papers must be in the double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates, both Option 1 and Option 2 on the page are fine) with page numbers marked. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. The workshop reserves the right to request the source files for a submission to verify compliance with these requirements. Submitted papers must be PDF files. Submitted papers must be appropriately anonymized. No information about author's name should be identifiable from the paper (including abstract, related work, references). When citing one's own previous work, third person should be used. Submitted papers must not substantially overlap papers that have been published or are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is prohibited. Authors of accepted papers must guarantee that their papers will be presented at the workshop. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits. |
Instructions to Authors: http://www.sheridanprinting.com/typedept/asiapkc.htm |
Program Co-Chairs | |
Keita Emura | National Institute of Information and Communications Technology, Japan |
Goichiro Hanaoka | National Institute of Advanced Industrial Science and Technology, Japan |
Yunlei Zhao | Fudan University, China |
Program Committee |
|
Nuttapong Attrapadung | National Institute of Advanced Industrial Science and Technology, Japan |
Sherman S.M. Chow | Chinese University of Hong Kong, Hong Kong |
Keita Emura (co-chair) | National Institute of Information and Communications Technology, Japan |
Sebastian Faust | Ecole Polytechnique Federale de Lausanne, Switzerland |
Ryou Fujita | Chuo University, Japan |
Goichiro Hanaoka (co-chair) | National Institute of Advanced Industrial Science and Technology, Japan |
Noboru Kunihiro | The University of Tokyo, Japan |
Benoit Libert | Technicolor, France |
Shengli Liu | Shanghai Jiaotong University, China |
Takahiro Matsuda | National Institute of Advanced Industrial Science and Technology, Japan |
Jacob Schuldt | Royal Holloway, University of London, UK |
Jian Weng | Jinan University, China |
Duncan S. Wong | City University of Hong Kong, Hong Kong |
Xun Yi | Victoria University, Australia |
Kazuki Yoneyama | NTT, Japan |
Fangguo Zhang | Sun Yat-sen University, China |
Yunlei Zhao (co-chair) | Fudan University, China |
08:30--08:40 Opening Remark: Keita Emura (NICT) | |
Session I: Chair: Noboru Kunihiro (The University of Tokyo) | |
08:40--9:10 | Generalized Homomorphic MACs with Efficient Verification |
Liang Feng Zhang (University of Calgary, Canada) and Reihaneh Safavi-Naini (University of Calgary, Canada) | |
09:10--9:40 | Two Applications of Multilinear Maps: Group Key Exchange and Witness Encryption |
Seiko Arita (Institute of Information Security, Japan) and Sari Handa (Institute of Information Security, Japan) | |
09:40--10:10 | Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management |
Kazuma Ohara (The University of Electro-Communications, Japan), Yusuke Sakai (National Institute of Advanced Industrial Science and Technology, Japan), Fumiaki Yoshida (The University of Electro-Communications, Japan), Mitsugu Iwamoto (The University of Electro-Communications, Japan) and Kazuo Ohta (The University of Electro-Communications, Japan) | |
10:10--10:30 | Coffee Break |
Session II, Chair: Takahiro Matsuda (AIST) | |
10:30--11:00 | Provably Secure LWE Encryption with Smallish Uniform Noise and Secret |
Daniel Cabarcas (Universidad Nacional de Colombia, Colombia), Florian Göpfert (Technische Universität Darmstadt, Germany) and Patrick Weiden (Technische Universität Darmstadt, Germany) | |
11:00--11:30 | A New Perturbed Matsumoto-Imai Signature Scheme |
Wenbin Zhang (National University of Singapore, Singapore) and Chik How Tan (National University of Singapore, Singapore) | |
11:30--12:00 | Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm |
Hiroaki Anada (Institute of Systems, Information Technologies and Nanotechnologies, Japan), Seiko Arita (Institute of Information Security, Japan) and Kouichi Sakurai (Kyushu University, Japan) | |
12:00--13:30 | Lunch Break |
Invited Talk, Chair: Goichiro Hanaoka (AIST) | |
13:30--14:30 | Introduction of Structure-Preserving Signatures |
Miyako Ohkubo (National Institute of Information and Communications Technology, Japan) | |
14:30--14:40 Closing Remark: Goichiro Hanaoka (AIST) | |