Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2600694acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
ASIAPKC '14: Proceedings of the 2nd ACM workshop on ASIA public-key cryptography
ACM2014 Proceeding
  • Program Chairs:
  • Keita Emura,
  • Goichiro Hanaoka,
  • Yunlei Zhao
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security Kyoto Japan 3 June 2014
ISBN:
978-1-4503-2801-2
Published:
03 June 2014
Sponsors:

Reflects downloads up to 20 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to The 2nd ACM Asia Public-Key Cryptography Workshop -- AsiaPKC'14, held on June 3, 2014, in conjunction with The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS'14). Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography.

The call for papers attracted 22 submissions from Asia, Europe, North America, and South America. The program committee accepted 6 papers based on their overall quality and novelty (acceptance ratio: 27%). In addition, the program includes an invited talk by Dr. Miyako Ohkubo of the National Institute of Information and Communications Technology (NICT), Japan ("Introduction of Structure-Preserving Signatures"). We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography and its applications.

Skip Table Of Content Section
SESSION: Keynote talk
keynote
Introduction of structure-preserving signatures
SESSION: Session 1
research-article
Generalized homomorphic MACs with efficient verification

Homomorphic MACs allow the holder of a secret key to construct authenticators for data blocks such that an untrusted server that computes a function of the data, can also compute an authenticator that can be verified by the key holder, guaranteeing ...

research-article
Two applications of multilinear maps: group key exchange and witness encryption

Constructing multilinear maps has been long-standing open problem, before recently the first construction based on ideal lattices has been proposed by Garg et al. After this breakthrough, various new cryptographic systems have been proposed. They ...

research-article
Privacy-preserving smart metering with verifiability for both billing and energy management

In smart grid systems, security and privacy prevention is great concerns. The suppliers of the power in smart grid systems demand to know the consumption of each customer for correctly calculating billing price and the total amount of consumption in a ...

SESSION: Session 2
research-article
Provably secure LWE encryption with smallish uniform noise and secret

In this paper we propose the first provably secure public key encryption scheme based on the Learning with Errors (LWE) problem, in which secrets and errors are sampled uniformly at random from a relatively small set rather than from the commonly used ...

research-article
A new perturbed matsumoto-imai signature scheme

Two new modification methods, triangular perturbation and dual perturbation, are proposed for multivariate signature schemes to enhance the security with almost no loss of efficiency. A new multivariate signature scheme is then constructed by applying ...

research-article
Attribute-based signatures without pairings via the fiat-shamir paradigm

We propose the first practical attribute-based signature (ABS) scheme with attribute privacy without pairings in the random oracle model. Our strategy is in the Fiat-Shamir paradigm; we first provide a generic construction of a boolean proof system of ...

Contributors
  • National Institute of Information and Communications Technology
  • National Institute of Advanced Industrial Science and Technology
  • Fudan University

Index Terms

  1. Proceedings of the 2nd ACM workshop on ASIA public-key cryptography
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations

    Acceptance Rates

    ASIAPKC '14 Paper Acceptance Rate 6 of 22 submissions, 27%;
    Overall Acceptance Rate 36 of 103 submissions, 35%
    YearSubmittedAcceptedRate
    APKC '199333%
    APKC '1820735%
    APKC '1710550%
    AsiaPKC '1624729%
    ASIAPKC '1422627%
    AsiaPKC '1318844%
    Overall1033635%