sigsac-logo

 

2013 ACM Asia Public-Key Cryptography Workshop

(AsiaPKC 2013)

  Tuesday May 7, 2013, Hangzhou, China

held in conjunction with The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)

Call For Paper

   

(PDF) Public-key cryptography plays an essential role in processing various kinds of data while assuring different flavors of cryptographic properties. The theme of this workshop is focused on novel public-key cryptosystems and techniques that can be used to solve a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretic aspects of public-key cryptography.

The proceedings will be published by ACM Press as conference proceedings in USB thumb drives and in ACM digital library (i.e., the same as how the proceedings of ACM AsiaCCS 2013 will be published and indexed by EI). Final proceedings versions for regular papers will be 10 pages and for short papers will be 6 pages, both in ACM standard double-column format.

Topics of interest to the workshop include, but at not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Two-party and multi-party computations
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • Digital signatures with special properties
  • System security properties of public-key cryptography
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems

Important Dates

   

Submission due: Feb 1, 2013 (Extend to Feb 8, 2013, Passed)

Notification:  Feb 27, 2013 (Passed)

Proceedings version due: March 10, 2013

AsiaPKC workshop: May 7, 2013

AsiaCCS symposium: May 8 – May 10, 2013

Submission

   

Submission Website: https://www.easychair.org/conferences/?conf=asiapkc2013

Instructions for authors:

Submission must be written in English. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages overall. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submitted papers must be in the double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates, both Option 1 and Option 2 on the page are fine) with page numbers marked. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. The workshop reserves the right to request the source files for a submission to verify compliance with these requirements. Submitted papers must be PDF files.

Submitted papers must be appropriately anonymized. No information about author's name should be identifiable from the paper (including abstract, related work, references). When citing ones own previous work, third person should be used. Submitted papers must not substantially overlap papers that have been published or are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is prohibited. Authors of accepted papers must guarantee that their papers will be presented at the workshop. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merit.

Camera Ready

   

Please visit www.sheridanprinting.com/typedept/asiaccs13.htm for instructions to prepare camera ready version.

Organizers

   
General Co-Chairs  
Kefei Chen Shanghai JiaoTong University, China
Qi Xie Hangzhou Normal University, China
Weidong Qiu Shanghai JiaoTong University, China
   
Program Co-Chairs  
Shouhuai Xu University of Texas at San Antonio, USA
Yunlei Zhao Fudan University, China
   
Web and Publicity Chair  
Qingji Zheng University of Texas at San Antonio, USA
   
Program Committee
 
Xiaofeng Chen Xidian University, China
Sherman S.M. Chow Chinese University of Hong Kong, Hong Kong
Cheng-Kang Chu I2R, Singapore
Qiong Huang South China Agricultural University, China
Xinyi Huang Fujian Normal University, China
Junzuo Lai Singapore Management University, Singapore
Fagen Li University of Electronic Science and Technology of China, China
Shengli Liu Shanghai JiaoTong University, China
Kirill Morozov Kyushu University, Japan
Kouichi Sakurai Kyushu University, Japan
Guilin Wang University of Wollongong, Australia
Jian Weng Jinan University, China
Duncan Wong City University of Hong Kong, China
Rui Xue Chinese Academy of Sciences, China
Kazuki Yoneyama NTT, Japan
Fangguo Zhang Sun Yat-sen University, China
Rui Zhang Chinese Academy of Sciences, China
Hong-Sheng Zhou University of Maryland, USA

Program

   
08:00 Welcome
Invited Talk, Chair: TBD
08:10-09:00 On the Properties of Public Key Encryption from Group Signatures
  Goichiro Hanaoka, National Institute of Advanced Industrial Science and Technology, Japan.
09:00- 09:10 Break
Session I: Public-Key Cryptography, Chair: TBD
09:10-09:35 Leakage-Resilient Lossy Trapdoor Functions and Public-Key Encryption
  Baodong Qin, Shengli Liu, Kefei Chen and Manuel Charlemagne.
09:35-10:00 Leakage-Resilient Certificateless Public Key Encryption
  Hao Xiong, Tsz Hon Yuen, Cong Zhang, S.M. Yiu and Yijun He
10:00-10:25 Efficient Variants of the Naor-Yung and Dolev-Dwork-Naor Transforms for CCA Secure Key Encapsulation Mechanism
  Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka and Noboru Kunihiro.
10:25-10:45 Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus(short paper)
  Motoki Kitahara, Takanori Yasuda, Takashi Nishide and Kouichi Sakurai.
10:45- 10:55 Break
Session: Applied Public-Key Cryptography, Chair: TBD
10:55-11:20 Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
  Dalin Chu, Johann Groszschaedl, Zhe Liu, Volker Muller, and Yang Zhang.
11:20-11:40 Secure Group Key Management Scheme Based On Dual Receiver Cryptosystem (short paper)
  Purushothama B R and Amberker B B.
11:40-12:00 End-to-End Aggregate Authentication of Time-Series Data(short paper)
  Di Ma and Yan Zhu.
12:00-12:20 A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation (short paper)
  Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi and Kouichi Sakurai.