It is our great pleasure to welcome you to The 2nd ACM Asia Public-Key Cryptography Workshop -- AsiaPKC'14, held on June 3, 2014, in conjunction with The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS'14). Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography.
The call for papers attracted 22 submissions from Asia, Europe, North America, and South America. The program committee accepted 6 papers based on their overall quality and novelty (acceptance ratio: 27%). In addition, the program includes an invited talk by Dr. Miyako Ohkubo of the National Institute of Information and Communications Technology (NICT), Japan ("Introduction of Structure-Preserving Signatures"). We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography and its applications.
Proceeding Downloads
Generalized homomorphic MACs with efficient verification
Homomorphic MACs allow the holder of a secret key to construct authenticators for data blocks such that an untrusted server that computes a function of the data, can also compute an authenticator that can be verified by the key holder, guaranteeing ...
Two applications of multilinear maps: group key exchange and witness encryption
Constructing multilinear maps has been long-standing open problem, before recently the first construction based on ideal lattices has been proposed by Garg et al. After this breakthrough, various new cryptographic systems have been proposed. They ...
Privacy-preserving smart metering with verifiability for both billing and energy management
In smart grid systems, security and privacy prevention is great concerns. The suppliers of the power in smart grid systems demand to know the consumption of each customer for correctly calculating billing price and the total amount of consumption in a ...
Provably secure LWE encryption with smallish uniform noise and secret
In this paper we propose the first provably secure public key encryption scheme based on the Learning with Errors (LWE) problem, in which secrets and errors are sampled uniformly at random from a relatively small set rather than from the commonly used ...
A new perturbed matsumoto-imai signature scheme
Two new modification methods, triangular perturbation and dual perturbation, are proposed for multivariate signature schemes to enhance the security with almost no loss of efficiency. A new multivariate signature scheme is then constructed by applying ...
Attribute-based signatures without pairings via the fiat-shamir paradigm
We propose the first practical attribute-based signature (ABS) scheme with attribute privacy without pairings in the random oracle model. Our strategy is in the Fiat-Shamir paradigm; we first provide a generic construction of a boolean proof system of ...
Index Terms
- Proceedings of the 2nd ACM workshop on ASIA public-key cryptography
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
APKC '19 | 9 | 3 | 33% |
APKC '18 | 20 | 7 | 35% |
APKC '17 | 10 | 5 | 50% |
AsiaPKC '16 | 24 | 7 | 29% |
ASIAPKC '14 | 22 | 6 | 27% |
AsiaPKC '13 | 18 | 8 | 44% |
Overall | 103 | 36 | 35% |