The 8th ACM ASIA Public-Key Cryptography Workshop (APKC 2021)
|
held in conjunction with The 16th ACM ASIA Conference on Information, Computer and Communications Security (ACM AsiaCCS 2021) |
Since ACM ASIACCS 2021 will be held as a virtual event due to COVID-19 from June 7th to June 11th, 2021, APKC 2021 also will be held as a virtual event. As in the previous series, the proceedings of APKC 2021 will be published by ACM Press and appear in ACM digital library. This workshop may grant the Best Paper Award. For the sake of fairness, we grant the award depending on aggregate score, and it should get no rejection from its every reviewer. If no such paper exists, workshop organizers will reserve the right to present the award. Topics of interest to the workshop include, but are not limited to:
We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although SoK papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title. Contact E-mail: apkc2021(at)ml(dot)nict(dot)go(dot)jp |
Submission due: 1st Notification: February 22, 2021 Resubmission due: March 1, 2021 2nd Notification: March 8, 2021 Proceedings version due: March 31, 2021 APKC workshop: June 7, 2021 |
Submission Page: https://easychair.org/conferences/?conf=apkc2021 Instructions for authors:APKC 2021 adopts the following two-round submission policy. Basically, authors will receive either Accept or Reject in the 1st notification. Meanwhile, a few authors may receive a Resubmission Notification, which means that they are recommended to resubmit their papers with a reply letter. Then, they will receive either Accept or Reject in the 2nd notification. Note that this is NOT Conditional Acceptance, and the papers are automatically rejected if we did not get the authors' resubmission. We do not accept any new submission in the resubmission phase. Technical papers submitted for APKC are to be written in English. Papers must be at most 8 pages excluding bibliography and appendices, and at most 10 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submissions must follow the new ACM conference template, which has been updated on September 21, 2020 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers. APKC requires double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs. Submissions to APKC 2021 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection. Detected violations may be reported to other conference chairs and journal editors. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits. Note that for attending APKC 2021, please make a registration for AsiaCCS 2021. For each paper requires a separate full pack or workshop only registration. On Conflicts of Interest:The program chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who may have a conflict of interest. During the submission, authors should identify members of the program committee with whom they have a conflict of interest. Conflict of interest includes but not limited to: advisors and advisees (at any time in the past); authors and PC members who share an institutional relationship; professional collaborations (regardless of whether they resulted in a publication) that occurred in the past 2 years; line-of-management relationship, grant program manager, close personal relationships. |
Program Co-Chairs: | ||
Keita Emura | National Institute of Information and Communications Technology (NICT), Japan | |
Yuntao Wang | Japan Advanced Institute of Science and Technology (JAIST), Japan | |
Program Committee: |
||
Jonathan Bootle | IBM Research - Zurich, Switzerland | |
Xavier Bultel | INSA CVL, France | |
Jie Chen | East China Normal University, China | |
Long Chen | New Jersey Institute of Technology, USA | |
K.P. Chow | The University of Hong Kong, China | |
Shuichi Katsumata | National Institute of Advanced Industrial Science and Technology (AIST), Japan | |
Alexander Koch | Karlsruhe Institute of Technology (KIT), Germany | |
Hyung Tae Lee | Jeonbuk National University, Korea | |
Iraklis Leontiadis | Inpher, Switzerland | |
Shengli Liu | Shanghai Jiao Tong University, China | |
Xingye Lu | The University of Hong Kong, China | |
Yuan Lu | Chinese Academy of Sciences, China | |
Khoa Nguyen | Nanyang Technological University, Singapore | |
Tran Viet Xuan Phuong | University of Wollongong, Australia | |
Jae Hong Seo | Hanyang University, Korea | |
Daniel Slamanig | AIT Austrian Institute of Technology, Austria | |
Atsushi Takayasu | National Institute of Information and Communications Technology (NICT), Japan | |
Yohei Watanabe | The University of Electro-Communications, Japan | |
Naoto Yanai | Osaka University, Japan | Kazuki Yoneyama | Ibaraki University, Japan |
Rui Zhang | Chinese Academy of Sciences, China | |
Yongjun Zhao | Nanyang Technological University, Singapore |
07:55--08:00 Welcome from Chairs : Yuntao Wang (JAIST) | |
Best Papers Chair: Keita Emura (NICT) |
|
08:00--08:30 | Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption |
Jan-Pieter D'Anvers (imec-COSIC KU Leuven), Emmanuela Orsini (imec-COSIC KU Leuven) and Frederik Vercauteren (imec-COSIC KU Leuven) | |
08:30--09:00 | New Card-based Copy Protocols Using Only Random Cuts |
Hiroto Koyama (Tohoku University), Kodai Toyoda (Tohoku University), Daiki Miyahara (Tohoku University) and Takaaki Mizuki (Tohoku University) | |
09:00--09:10 Break | |
Invited Talk Chair: Yuntao Wang (JAIST) |
|
09:10--09:55 | Mitaka: Faster, Simpler, Parallelizable and Maskable Hash-and-Sign Signatures on NTRU Lattices |
Thomas Espitau (NTT) | |
09:55--10:05 Break | |
Session 1 Chair: Keisuke Hara (Tokyo Tech/AIST) |
|
10:05--10:30 | Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption |
Masahiro Ebina (Yokohama National University), Jumpei Mita (Yokohama National University), Junji Shikata (Yokohama National University) and Yohei Watanabe (University of Electro-Communications/AIST) | |
10:30--10:55 | Perfect ZK Argument of Knowledge of Discrete Logarithm in A Cyclic Group with Unknown Order |
Kun Peng (Huawei Technology) | |
10:55--11:05 Break | |
Session 2 Chair: Yohei Watanabe (UEC) |
|
11:05--11:30 | Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption |
Toshiya Shibata (Ibaraki University) and Kazuki Yoneyama (Ibaraki University) | |
11:30--11:55 | Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption |
Keisuke Hara (Tokyo Institute of Technology, National Institute of Advanced Industrial Science and Technology), Takahiro Matsuda (National Institute of Advanced Industrial Science and Technology) and Keisuke Tanaka (Tokyo Institute of Technology) | |
11:55--12:00 Closing from Chairs : Keita Emura (NICT) |