| |||||||||||||||
APKC 2024 : The 11th ACM ASIA Public-Key Cryptography Workshop | |||||||||||||||
Link: https://sites.google.com/gl.cc.uec.ac.jp/apkc2024/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Public-key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of ASIA Public-Key Cryptography (APKC) Workshop is novel public-key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public-key cryptography. The 1st workshop was held in Hangzhou, China, the 2nd workshop was held in Kyoto, Japan, the 3rd workshop was held in Xi’an, China, the 4th workshop was held in Abu Dhabi, UAE, the 5th workshop was held in Incheon, Korea, the 6th workshop was held in Auckland, New Zealand, the 7th workshop was held in Taipei, Taiwan (Virtual Conference), the 8th workshop was held in Hong Kong, China (Virtual Conference), the 9th workshop was held in Nagasaki, Japan (Hybrid Conference), and the 10th workshop was held in Melbourne, Australia (Hybrid Conference). The 11th edition will be held in Singapore, in conjunction with ACM ASIACCS 2024.
As in the previous series, the proceedings of APKC 2024 will be published by ACM Press and appear in ACM digital library. This workshop may grant the Best Paper Award. For the sake of fairness, we will grant the award depending on an aggregate score, and it should get no rejection from its every reviewer. If no such paper exists, workshop organizers will reserve the right to present the award. Topics of interest to the workshop include, but are not limited to: - Applied public-key cryptography for solving emerging application problems - Provably secure public-key primitives and protocols - Key management for, and by, public-key cryptosystems - Privacy-preserving cryptographic computations - Cryptographic protocols for blockchains - Public-key cryptography for cryptocurrencies - Two-party and multi-party computations - Card-based cryptographic protocols - Homomorphic public-key cryptosystems - Attributed-based and functional public-key cryptography - Digital signatures with special properties - System security properties of public-key cryptography - Post-quantum public-key cryptography - Fast implementation of public-key cryptosystems We solicit systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Although Sok papers may not necessarily contain novel research contributions, such papers must provide a high value to our community. Submissions will be distinguished by the prefix “SoK:” in the title. |
|