The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020)

  June 1 October 6, 2020, Taipei, Taiwan

held in conjunction with The 15th ACM ASIA Conference on Information, Computer and Communications Security (ACM AsiaCCS 2020)

Call For Paper

Due to the escalation of the COVID-19 situation around the world, AsiaCCS 2020 is rescheduled to October 5-9, 2020. APKC 2020 will be held on October 6.

(PDF) Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography. The 1st edition of the event (ASIAPKC 2013, DBLP) has been held in Hangzhou, China, the 2nd edition of the event (ASIAPKC 2014, DBLP) has been held in Kyoto, Japan, the 3rd edition of the event (ASIAPKC 2016, DBLP) has been held in Xi'an, China, the 4th edition of the event (APKC 2017, DBLP) has been held in Abu Dhabi, UAE, the 5th edition of the event (APKC 2018, DBLP) has been held in Incheon, Korea, and the 6th edition of the event (APKC 2019, DBLP) has been held in Auckland, New Zealand. The 7th edition of the event (APKC 2020) will be held in Taipei, Taiwan in conjunction with AsiaCCS 2020 (Web).

As in the previous series, the proceedings of APKC 2020 will be published by ACM Press and appear in ACM digital library.

Topics of interest to the workshop include, but are not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Cryptographic protocols for blockchains
  • Public-key cryptography for cryptocurrencies
  • Two-party and multi-party computations
  • Card-based cryptographic protocols
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • System security properties of public-key cryptography
  • Digital signatures with special properties
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems
  •  
  •  
  •  

       

We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although SoK papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title.

Contact E-mail: apkc2020(at)ml(dot)nict(dot)go(dot)jp

Important Dates

   

Submission due: January 15, 2020 January 29 (23:59 (UTC)), 2020 (Extended)

Notification: March 4, 2020

Proceedings version due: March 30, 2020

APKC workshop: June 1 October 6, 2020

Submission

   

Submission Page: https://easychair.org/conferences/?conf=apkc2020

Instructions for authors:

Technical papers submitted for APKC are to be written in English. Papers must be at most 8 pages excluding bibliography and appendices, and at most 10 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submissions must follow the new ACM conference template, which has been updated for 2019 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers.

APKC requires double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs. Submissions to APKC 2020 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection. Detected violations may be reported to other conference chairs and journal editors. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits. Note that for attending APKC 2020, please make a registration for AsiaCCS 2020.

On Conflicts of Interest:

The program chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who may have a conflict of interest. During the submission, authors should identify members of the program committee with whom they have a conflict of interest. Conflict of interest includes but not limited to: advisors and advisees (at any time in the past); authors and PC members who share an institutional relationship; professional collaborations (regardless of whether they resulted in a publication) that occurred in the past 2 years; line-of-management relationship, grant program manager, close personal relationships.

Camera Ready

   

Organizers

   
Program Co-Chairs:  
Keita Emura National Institute of Information and Communications Technology (NICT), Japan
Naoto Yanai Osaka University, Japan
   
Program Committee:
   
Jonathan Bootle IBM Research - Zurich, Switzerland
Jie Chen East China Normal University, China
Long Chen New Jersey Institute of Technology, USA
Kai-Min Chung Academia Sinica, Taiwan
Jason Paul Cruz Osaka University, Japan
Ruei-Hau Hsu National Sun Yat-sen University, Taiwan
Alexander Koch Karlsruhe Institute of Technology (KIT), Germany
Pascal Lafourcade Université Clermont Auvergne, LIMOS, France
Hyung Tae Lee Jeonbuk National University, Korea
Iraklis Leontiadis Inpher, Switzerland
Shengli Liu Shanghai Jiao Tong University, China
Khoa Nguyen Nanyang Technological University, Singapore
Tran Viet Xuan Phuong University of Wollongong, Australia
Yusuke Sakai National Institute of Advanced Industrial Science and Technology (AIST), Japan
Jae Hong Seo Hanyang University, Korea
Daniel Slamanig AIT Austrian Institute of Technology, Austria
Atsushi Takayasu National Institute of Information and Communications Technology (NICT), Japan
Raylin Tso National Chengchi University, Taiwan
Wen-Guey Tzeng National Chiao Tung University, Taiwan
Yohei Watanabe The University of Electro-Communications, Japan
Kazuki Yoneyama Ibaraki University, Japan
Rui Zhang Chinese Academy of Sciences, China
   

Program

Time Zone: GMT+0800
   
08:25--08:30 Welcome from Chairs : Naoto Yanai (Osaka University)
Session 1
Chair: Yuntao Wang (JAIST)
08:30--08:55 Six-Card Finite-Runtime XOR Protocol with Only Random Cut
  Kodai Toyoda (Tohoku University), Daiki Miyahara (Tohoku University), Takaaki Mizuki (Tohoku University), and Hideaki Sone (Tohoku University)
08:55--09:20 Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator
  Toru Nakanishi (Hiroshima University), Hiromi Yoshino (Hiroshima University), Tomoki Murakami (Hiroshima University) and Guru-Vamsi Policharla (Indian Institute of Technology, Bombay)
09:20--09:45 Verification of Group Key Management of IEEE 802.21 using ProVerif
  Ryoga Noguchi (Ibaraki University), Yoshikazu Hanatani (Toshiba Corporation), and Kazuki Yoneyama (Ibaraki University)
   
09:45--10:00 Break
   
Invited Talk
Chair: Naoto Yanai (Osaka University)
10:00--10:45 Insider Collusion Attack on Distributed Machine Learning System and its Solutions -- A Case of SVM
  Peter Shaojui Wang (Chunghwa Telecom Laboratories)
   
10:45--11:00 Break
   
Session 2
Chair: Kazuki Yoneyama (Ibaraki University)
11:00--11:25 Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack
  Yuntao Wang (JAIST), Yasuhiko Ikematsu (Kyushu University), Koichiro Akiyama (Toshiba Corporation R&D Center), and Tsuyoshi Takagi (The University of Tokyo)
11:25--11:50 Hybrid meet-in-the-middle attacks for the isogeny path-finding problem
  Yasuhiko Ikematsu (Kyushu University), Ryoya Fukasaku (Kyushu University), Momonari Kudo (Kobe City College of Technology), Masaya Yasuda (Rikkyo University), Katsuyuki Takashima (Mitsubishi Electric Corporation), and Kazuhiro Yokoyama (Rikkyo University)
11:50--12:15 Exploiting Decryption Failures in Mersenne Number Cryptosystems
  Marcel Tiepelt (Karlsruhe Institute of Technology) and Jan-Pieter D'Anvers (KU Leuven)
12:15--12:20 Closing from Chairs : Keita Emura (NICT)
 

6 papers were accepted out of 20 submissions (acceptance ratio: 30%).