It is our great pleasure to usher in the First ACM Asia Public-Key Cryptography Workshop (AsiaPKC'13), held on May 7, 2013 and affiliated with The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Public-key cryptography plays a crucial role in processing various kinds of data, while assuring various flavors of security properties. The mission of this new workshop is to bring together public-key cryptography researchers and practitioners, who need solutions for securely processing their data, to share and discuss recent advances and results in addressing emerging problems. The topics of interests cover both the theoretic and applied aspects of public-key cryptography.
The call for papers attracted 18 submissions from Asia, Europe and the United States. The program committee accepted 4 regular papers and 4 short papers, based on their overall quality and novelty. In addition, the program includes an invited talk by Dr. Goichiro Hanaoka of the National Institute of Advanced Industrial Science and Technology, Japan ("On the Properties of Public Key Encryption from Group Signatures"). We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography as well as its applications.
Proceeding Downloads
On the properties of public key encryption from group signatures
In this talk, we discuss properties of public key encryption schemes which are derived from group signatures. Abdalla and Warinschi (ICICS 2004) and Ohtake et al. (AFRICACRYPT 2009) already showed that it is possible to construct a chosen-ciphertext ...
Leakage-resilient lossy trapdoor functions and public-key encryption
Lossy Trapdoor Functions (LTFs) was introduced by Peikert and Waters in 2008. The importance of the LTFs was justified by their numerous cryptographic applications, like the construction of injective one-way trapdoor functions, CCA-secure public-key ...
Leakage-resilient certificateless public key encryption
In certificateless public key encryption (CL-PKE), the Private Key Generator (PKG) keeps a master secret key to generate a partial private key corresponding to a user's identity. Together with a secret value generated by the user, a full private key can ...
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
In this paper, we present novel constructions of chosen-ciphertext secure (CCA secure) key encapsulation mechanism (KEM) from chosen-plaintext secure (CPA secure) KEM in the standard model. It is already known that CCA secure public key encryption (PKE) ...
Upper bound of the length of information embedd in RSA public key efficiently
Lenstra proposed a method by which information can be efficiently in a public key N in RSA encryption. Since then, many methods such as the additional key escrow function and a visible public key have been proposed. Lenstra made an assertion that the ...
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve ...
Secure group key management scheme based on dual receiver cryptosystem
Providing the confidentiality to the messages delivered between group members in secure group communication model is a critical networking issue. Key management is a challenging task in secure group communication. Tree based group key management scheme ...
End-to-end aggregate authentication of time-series data
We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by ...
A variant of rainbow with shorter secret key and faster signature generation
Multivariate public key cryptosystems are being focused on as candidates for post-quantum cryptography. Rainbow is one of the most efficient signature schemes in multivariate public key cryptosystems. The main drawback of Rainbow is that their key size ...
Index Terms
Proceedings of the first ACM workshop on Asia public-key cryptography
Recommendations
Acceptance Rates
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| APKC '19 | 9 | 3 | 33% |
| APKC '18 | 20 | 7 | 35% |
| APKC '17 | 10 | 5 | 50% |
| AsiaPKC '16 | 24 | 7 | 29% |
| ASIAPKC '14 | 22 | 6 | 27% |
| AsiaPKC '13 | 18 | 8 | 44% |
| Overall | 103 | 36 | 35% |




