Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3659467acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
APKC '24: Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop
ACM2024 Proceeding
  • Editors:
  • Keisuke Hara,
  • Daiki Miyahara
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '24: ACM Asia Conference on Computer and Communications Security Singapore Singapore July 1 - 5, 2024
Published:
01 July 2024
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session1: Card-Based Cryptography and Formal Verification
research-article
Open Access
Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks

Card-based cryptography is an area involving cryptographic techniques that use a deck of physical cards to implement secure computation. In this paper, we study card-based cryptographic protocols for symmetric functions f: {0, 1}n → R, where R is an ...

research-article
Open Access
Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem

The 15-puzzle is a puzzle game played with 15 square tiles numbered from 1 to 15 on a 4 × 4 board. It has been popular for generations because of its simplicity and challenge. The (w × h)-puzzle is a generalization of the 15-puzzle, which is played with ...

research-article
Free
Formal Verification of Wireless Charging Standard Qi

Wireless charging standard Qi is widely used, especially for smartphones, thanks to the convenience of charging the device simply by placing it on the charger. However, wireless charging has several security concerns. There is a great risk of making ...

SESSION: Session 2: Public-Key Cryptographic Primitives
research-article
Open Access
Designated Verifier Signature with Repudiability

Designated Verifier Signature (DVS) is an extension of digital signature that allows the specification of the verifier. This feature is realized by granting the designated verifier the privilege of simulating a valid signature, thereby virtually ...

research-article
Free
Tightly Secure ID-based Authenticated Key Exchange

In CRYPTO 2021, Han et al. proposed a PKI-based authenticated key exchange (AKE) scheme that satisfies tight security in the standard model by using KEM and digital signature with multi-user security as building blocks. On the other hand, no tightly ...

research-article
Open Access
Revisiting the security analysis of SNOVA

SNOVA is a multivariate signature scheme submitted to the additional NIST PQC standardization project started in 2022. SNOVA is constructed by incorporating the structure of the matrix ring over a finite field into the UOV signature scheme, and the core ...

Contributors
  • The University of Electro-Communications

Recommendations

Acceptance Rates

Overall Acceptance Rate 36 of 103 submissions, 35%
YearSubmittedAcceptedRate
APKC '199333%
APKC '1820735%
APKC '1710550%
AsiaPKC '1624729%
ASIAPKC '1422627%
AsiaPKC '1318844%
Overall1033635%