The 5th ACM ASIA Public-Key Cryptography Workshop (APKC 2018)

  June 4, 2018, Incheon, Korea

held in conjunction with The 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018)

Call For Paper

APKC 2018 Program is Available (Acceptance ratio: 7/20 (35%))

APKC 2018 Proceedings: (See ACM Digital Library and DBLP)

Registration for AsiaCCS 2018 covers registration for all workshops. To attend APKC 2018, please make registration at AsiaCCS 2018 website.

Note: Lunch will be provided before the start of APKC 2018, but keep in mind that the workshop will start at 13:25!!

(PDF) Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography. The 1st edition of the event (ASIAPKC 2013, DBLP) has been held in Hangzhou, China, the 2nd edition of the event (ASIAPKC 2014, DBLP) has been held in Kyoto, Japan, the 3rd edition of the event (ASIAPKC 2016, DBLP) has been held in Xi'an, China, and the 4th edition of the event (APKC 2017, DBLP) has been held in Abu Dhabi, UAE. The 5th edition of the event (APKC 2018) will be held in Incheon, Korea, in conjunction with AsiaCCS 2018 (Web).

As in the previous series, the proceedings of APKC 2018 will be published by ACM Press and appear in ACM digital library.

Topics of interest to the workshop include, but are not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Two-party and multi-party computations
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • Digital signatures with special properties
  • System security properties of public-key cryptography
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems

We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although Sok papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title.

Contact E-mail: apkc2018(at)ml(dot)nict(dot)go(dot)jp

Important Dates


Submission due: Jan. 15, 2018 Jan. 29 (23:59 (UTC)), 2018 (Extended)

Notification: Feb. 28, 2018

Proceedings version due: Mar. 31, 2018

APKC workshop: June 4, 2018



Submission Page:

Instructions for authors:

Technical papers submitted for APKC are to be written in English. Papers must be at most 8 pages excluding bibliography and appendices, and at most 10 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submissions must follow the new ACM conference template, which has been updated for 2017 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers.

Submitted papers must be appropriately anonymized. No information about author's name should be identifiable from the paper (including abstract, related work, references). When citing one's own previous work, third person should be used. Submitted papers must not substantially overlap papers that have been published or are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is prohibited. Authors of accepted papers must guarantee that their papers will be presented at the workshop. Note that for attending APKC 2018, please make a registration for AsiaCCS 2018. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits.

On Conflicts of Interest (Drawn from AsiaCCS 2018 CFP):

The program chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who may have a conflict of interest. During the submission, authors should identify members of the program committee with whom they have a conflict of interest. Conflict of interest includes but not limited to: advisors and advisees (at any time in the past); authors and PC members who share an institutional relationship; professional collaborations (regardless of whether they resulted in a publication) that occurred in the past 2 years; line-of-management relationship, grant program manager, close personal relationships.

Camera Ready


Preparation Instructions for APKC'18 Submissions:


Program Co-Chairs:  
Keita Emura National Institute of Information and Communications Technology (NICT), Japan
Jae Hong Seo Hanyang University, Korea
Yohei Watanabe The University of Electro-Communications, Japan
Program Committee:
Nuttapong Attrapadung National Institute of Advanced Industrial Science and Technology (AIST), Japan
Joonsang Baek University of Wollongong, Australia
Jonathan Bootle University College London, UK
Jie Chen East China Normal University, China
David Derler Graz University of Technology, Austria
Junqing Gong ENS de Lyon, France
Jihye Kim Kookmin University, Korea
Alexander Koch Karlsruhe Institute of Technology (KIT), Germany
Changmin Lee Seoul National University (SNU), Korea
Hyung Tae Lee Chonbuk National University, Korea
Iraklis Leontiadis Ecole Polytechnique Fédérale de Lausanne, Switzerland
Shengli Liu Shanghai Jiao Tong University, China
Takahiro Matsuda National Institute of Advanced Industrial Science and Technology (AIST), Japan
Khoa Nguyen Nanyang Technological University, Singapore
Miyako Ohkubo National Institute of Information and Communications Technology (NICT), Japan
Ji Sun Shin Sejong University, Korea
Daniel Slamanig AIT Austrian Institute of Technology, Austria
Atsushi Takayasu The University of Tokyo, Japan
Qiang Tang New Jersey Institute of Technology, USA
Takashi Yamakawa NTT Secure Platform Laboratories, Japan
Kazuki Yoneyama Ibaraki University, Japan
Rui Zhang Chinese Academy of Sciences, China


13:25--13:30 Welcome from Chairs : Yohei Watanabe (The University of Electro-Communications)
Session 1 (Card-based Protocol, Implementation, and Authentication for IoT)
Chair: Yohei Watanabe (The University of Electro-Communications)
13:30--13:55 Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
  Yuta Abe (Tohoku University, Japan), Yu-ichi Hayashi (Nara Institute of Science and Technology, Japan), Takaaki Mizuki (Tohoku University, Japan), and Hideaki Sone (Tohoku University, Japan)
13:55--14:20 SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures
  Armando Faz-Hernández (University of Campinas, Brazil), Julio López (University of Campinas, Brazil) and Ana Karina D. S. De Oliveira (Federal University of Mato Grosso do Sul, Brazil)
14:20--14:45 You shall not pass! (once again)
  Emanuele Bellini (DarkMatter LLC, Abu Dhabi, UAE), Florian Caullery (DarkMatter LLC, Abu Dhabi, UAE), Alexandros Hasikos (DarkMatter LLC, Abu Dhabi, UAE), Marcos Manzano (DarkMatter LLC, Abu Dhabi, UAE), Victor Mateu (DarkMatter LLC, Abu Dhabi, UAE)
14:45--15:00 Break
Session 2 (Invited Talk)
Chair: Jae Hong Seo (Hanyang University)
15:00--16:00 Towards Ideal Self-bilinear Map
  Takashi Yamakawa (NTT Secure Platform Laboratories, Japan)
16:00--16:15 Break
Session 3 (Code-based and Elliptic Curve Cryptography)
Chair: Keita Emura (NICT)
16:15--16:40 A New LRPC-Kronecker Product Codes Based Public-Key Cryptography
  Jon-Lark Kim (Sogang University, South Korea), Lucky Galvez (Sogang University, South Korea), Young-Sik Kim (Chosun University, South Korea), and Nari Lee (Sogang University, South Korea)
16:40--17:05 A Note on Subgroup Security in Pairing-Based Cryptography
  Tadanori Teruya (National Institute of Advanced Industrial Science and Technology, Japan)
17:05--17:30 On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption
  Sebastian Lauer (Ruhr University Bochum, Germany)
17:30--17:55 SoK: The Problem Landscape of SIDH
  David Urbanik (University of Waterloo, Canada) and David Jao (University of Waterloo, Canada)
17:55--18:00 Closing from Chairs : Keita Emura (NICT)