It is our great pleasure to welcome you to the 7th ACM Asia Public-Key Cryptography Workshop - APKC 2020, held on October 6, 2020, in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). Public-key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public-key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public-key cryptography. The call for papers attracted 20 submissions from Asia, Europe, and USA. The program committee accepted 6 papers based on their overall quality and novelty (acceptance ratio: 30%). The program also includes one invited talk entitled "Insider Collusion Attack on Distributed Machine Learning System and its Solutions -- A Case of SVM" by Dr. Peter Shaojui Wang. We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography and its applications.
Proceeding Downloads
Insider Collusion Attack on Distributed Machine Learning System and its Solutions - A Case of SVM
Among several known data breaching problems, insider collusion attacks have been one of the fastest-growing threats. However, there are very few insider-related researches involving the distribution of kernel-based data mining, such as distributed ...
Six-Card Finite-Runtime XOR Protocol with Only Random Cut
Executing a card-based cryptographic protocol is an attractive way to perform secure multiparty computation (MPC) with a deck of physical cards. Crèpeau and Kilian at CRYPTO 1993 proposed card-based AND and XOR protocols that can deal with a logical ...
Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator
To prove the graph relations such as the connectivity and the isolation for a certified graph, the system of graph signature and proofs have been proposed. In this system, an issuer generates a signature certifying the topology of an undirected graph, ...
Verification of Group Key Management of IEEE 802.21 using ProVerif
Home Energy Management Systems (HEMS) contain devices of multiple manufacturers. Also, a large number of groups of devices must be managed according to several clustering situations. Hence, since it is necessary to establish a common secret group key ...
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack
The hybrid attack was proposed by Howgrave-Graham in CRYPTO2007, which was originally designed for the cryptanalysis of NTRU cryptosystems. In this paper, based on Howgrave-Graham's attack model, we propose a simulator of hybrid attack to evaluate the ...
Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem
Isogeny-based cryptography has received attention as a candidate of post-quantum cryptography (PQC), and its security is based on the hardness of isogeny problems. The idea of meet-in-the-middle (MITM) is a bidirectional search for a collision, and it ...
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Mersenne number schemes are a new strain of potentially quantum-safe cryptosystems that use sparse integer arithmetic modulo a Mersenne prime to encrypt messages. Two Mersenne number based schemes were submitted to the NIST post-quantum standardization ...
- Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
APKC '19 | 9 | 3 | 33% |
APKC '18 | 20 | 7 | 35% |
APKC '17 | 10 | 5 | 50% |
AsiaPKC '16 | 24 | 7 | 29% |
ASIAPKC '14 | 22 | 6 | 27% |
AsiaPKC '13 | 18 | 8 | 44% |
Overall | 103 | 36 | 35% |