| |||||||||||||||
APKC 2022 : The 9th ACM ASIA Public-Key Cryptography Workshop | |||||||||||||||
Link: https://sites.google.com/view/apkc2022 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography. The 1st edition of the event (ASIAPKC 2013, DBLP) has been held in Hangzhou, China, the 2nd edition of the event (ASIAPKC 2014, DBLP) has been held in Kyoto, Japan, the 3rd edition of the event (ASIAPKC 2016, DBLP) has been held in Xi'an, China, the 4th edition of the event (APKC 2017, DBLP) has been held in Abu Dhabi, UAE, the 5th edition of the event (APKC 2018, DBLP) has been held in Incheon, Korea, the 6th edition of the event (APKC 2019, DBLP) has been held in Auckland, New Zealand, the 7th edition of the event (APKC 2020, DBLP) has been held in Taipei, Taiwan (Online Event), and the 8th edition of the event (APKC 2021, DBLP) has been held in Hong Kong, China (Online Event). The 9th edition of the event (APKC 2022) will be held in Nagasaki, Japan in conjunction with AsiaCCS 2022 (Web).
As in the previous series, the proceedings of APKC 2022 will be published by ACM Press and appear in ACM digital library. This workshop may grant the Best Paper Award. For the sake of fairness, we will grant the award based on an aggregate score, and the paper should not get rejection from any reviewer. If no such paper exists, workshop organizers reserve the right to present the award. Topics of interest to the workshop include, but are not limited to: Applied public-key cryptography for solving emerging application problems Provably-secure public-key primitives and protocols Key management for, and by, public-key cryptosystems Privacy-preserving cryptographic computations Cryptographic protocols for blockchains Public-key cryptography for cryptocurrencies Two-party and multi-party computations Card-based cryptographic protocols Homomorphic public-key cryptosystems Attributed-based and functional public-key cryptography System security properties of public-key cryptography Digital signatures with special properties Post-quantum public-key cryptography Fast implementation of public-key cryptosystems We solicit Systematization of Knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although SoK papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix "SoK:" in the title. |
|