The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020)
|
held in conjunction with The 15th ACM ASIA Conference on Information, Computer and Communications Security (ACM AsiaCCS 2020) |
Due to the escalation of the COVID-19 situation around the world, AsiaCCS 2020 is rescheduled to October 5-9, 2020. APKC 2020 will be held on October 6.
As in the previous series, the proceedings of APKC 2020 will be published by ACM Press and appear in ACM digital library. Topics of interest to the workshop include, but are not limited to:
We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although SoK papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title. Contact E-mail: apkc2020(at)ml(dot)nict(dot)go(dot)jp |
Submission due: Notification: March 4, 2020 Proceedings version due: March 30, 2020 APKC workshop: |
Submission Page: https://easychair.org/conferences/?conf=apkc2020 Instructions for authors:Technical papers submitted for APKC are to be written in English. Papers must be at most 8 pages excluding bibliography and appendices, and at most 10 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submissions must follow the new ACM conference template, which has been updated for 2019 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers. APKC requires double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs. Submissions to APKC 2020 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection. Detected violations may be reported to other conference chairs and journal editors. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits. Note that for attending APKC 2020, please make a registration for AsiaCCS 2020. On Conflicts of Interest:The program chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who may have a conflict of interest. During the submission, authors should identify members of the program committee with whom they have a conflict of interest. Conflict of interest includes but not limited to: advisors and advisees (at any time in the past); authors and PC members who share an institutional relationship; professional collaborations (regardless of whether they resulted in a publication) that occurred in the past 2 years; line-of-management relationship, grant program manager, close personal relationships. |
Program Co-Chairs: | ||
Keita Emura | National Institute of Information and Communications Technology (NICT), Japan | |
Naoto Yanai | Osaka University, Japan | |
Program Committee: |
||
Jonathan Bootle | IBM Research - Zurich, Switzerland | |
Jie Chen | East China Normal University, China | |
Long Chen | New Jersey Institute of Technology, USA | |
Kai-Min Chung | Academia Sinica, Taiwan | |
Jason Paul Cruz | Osaka University, Japan | |
Ruei-Hau Hsu | National Sun Yat-sen University, Taiwan | |
Alexander Koch | Karlsruhe Institute of Technology (KIT), Germany | |
Pascal Lafourcade | Université Clermont Auvergne, LIMOS, France | |
Hyung Tae Lee | Jeonbuk National University, Korea | |
Iraklis Leontiadis | Inpher, Switzerland | |
Shengli Liu | Shanghai Jiao Tong University, China | |
Khoa Nguyen | Nanyang Technological University, Singapore | |
Tran Viet Xuan Phuong | University of Wollongong, Australia | |
Yusuke Sakai | National Institute of Advanced Industrial Science and Technology (AIST), Japan | |
Jae Hong Seo | Hanyang University, Korea | |
Daniel Slamanig | AIT Austrian Institute of Technology, Austria | |
Atsushi Takayasu | National Institute of Information and Communications Technology (NICT), Japan | |
Raylin Tso | National Chengchi University, Taiwan | |
Wen-Guey Tzeng | National Chiao Tung University, Taiwan | |
Yohei Watanabe | The University of Electro-Communications, Japan | Kazuki Yoneyama | Ibaraki University, Japan |
Rui Zhang | Chinese Academy of Sciences, China |
08:25--08:30 Welcome from Chairs : Naoto Yanai (Osaka University) | |
Session 1 Chair: Yuntao Wang (JAIST) |
|
08:30--08:55 | Six-Card Finite-Runtime XOR Protocol with Only Random Cut |
Kodai Toyoda (Tohoku University), Daiki Miyahara (Tohoku University), Takaaki Mizuki (Tohoku University), and Hideaki Sone (Tohoku University) | |
08:55--09:20 | Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator |
Toru Nakanishi (Hiroshima University), Hiromi Yoshino (Hiroshima University), Tomoki Murakami (Hiroshima University) and Guru-Vamsi Policharla (Indian Institute of Technology, Bombay) | |
09:20--09:45 | Verification of Group Key Management of IEEE 802.21 using ProVerif |
Ryoga Noguchi (Ibaraki University), Yoshikazu Hanatani (Toshiba Corporation), and Kazuki Yoneyama (Ibaraki University) | |
09:45--10:00 Break | |
Invited Talk Chair: Naoto Yanai (Osaka University) | |
10:00--10:45 | Insider Collusion Attack on Distributed Machine Learning System and its Solutions -- A Case of SVM |
Peter Shaojui Wang (Chunghwa Telecom Laboratories) | |
10:45--11:00 Break | |
Session 2 Chair: Kazuki Yoneyama (Ibaraki University) |
|
11:00--11:25 | Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack |
Yuntao Wang (JAIST), Yasuhiko Ikematsu (Kyushu University), Koichiro Akiyama (Toshiba Corporation R&D Center), and Tsuyoshi Takagi (The University of Tokyo) | |
11:25--11:50 | Hybrid meet-in-the-middle attacks for the isogeny path-finding problem |
Yasuhiko Ikematsu (Kyushu University), Ryoya Fukasaku (Kyushu University), Momonari Kudo (Kobe City College of Technology), Masaya Yasuda (Rikkyo University), Katsuyuki Takashima (Mitsubishi Electric Corporation), and Kazuhiro Yokoyama (Rikkyo University) | |
11:50--12:15 | Exploiting Decryption Failures in Mersenne Number Cryptosystems |
Marcel Tiepelt (Karlsruhe Institute of Technology) and Jan-Pieter D'Anvers (KU Leuven) | |
12:15--12:20 Closing from Chairs : Keita Emura (NICT) | |