ebook img

Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings PDF

749 Pages·2013·7.673 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings

Thomas Johansson Phong Q. Nguyen (Eds.) 1 8 8 Advances in Cryptology – 7 S C EUROCRYPT 2013 N L 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Athens, Greece, May 2013, Proceedings 123 Lecture Notes in Computer Science 7881 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Thomas Johansson Phong Q. Nguyen (Eds.) Advances in Cryptology – EUROCRYPT 2013 32ndAnnual International Conference on the Theory andApplications of Cryptographic Techniques Athens, Greece, May 26-30, 2013 Proceedings 1 3 VolumeEditors ThomasJohansson LundUniversity Dept.ofElectricalandInformationTechnology P.O.Box118,22100Lund,Sweden E-mail:[email protected] PhongQ.Nguyen Ecolenormalesupérieure Dépt.d’informatique 45,rued’Ulm,75230ParisCedex05,France E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-38347-2 e-ISBN978-3-642-38348-9 DOI10.1007/978-3-642-38348-9 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2013937954 CRSubjectClassification(1998):E.3,F.2,D.4.6,K.6.5,G.2,C.2,J.1 LNCSSublibrary:SL4–SecurityandCryptology ©InternationalAssociationforCryptologicResearch2013 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface These arethe proceedingsofEurocrypt2013,the 32ndannualIACR Eurocrypt conferenceonthetheoryandapplicationsofcryptographictechniques.Thecon- ference was held May 26–30, 2013, in Athens, Greece, and sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Aggelos Kiayias, from the University of Athens. The Eurocrypt 2013 Pro- gramCommittee (PC)consistedof33members.Therewere202paperssubmit- ted to the conference, of which one was eventually withdrawn. Each paper was assigned to at least three PC members, while submissions co-authored by PC members were reviewed by at least five other PC members. Papers were refer- eedanonymously.Therewereindeedalargenumberofhigh-qualitysubmissions and the review process was a challenge. The PC was helped by reports from more than 250 external reviewers, producing a total of more than 670 reviews in all.After the reviewswere submitted, the PC discussedthe reviewsfor many weeks,before making a finaldecision. All of our deliberationswere aided by the WebSubmissionandReviewSoftwarewrittenbyShaiHaleviandtheserverwas hosted by IACR. We would like to thank Shai for setting up the service on the server and helping us whenever needed. The PC eventually selected 41 submissions for presentation during the con- ference and these are the articles that are included in this volume. Two of the accepted papers came from merging two pairs of submitted papers. Note that these proceedings contain the revised versions of the selected papers. Since the revisions were not checked again before publication, the authors (and not the committee) bear full responsibility for the contents of their papers. The PC de- cided to give the Best Paper Award to Sanjam Garg, Craig Gentry, and Shai Halevi for their paper “Candidate Multilinear Maps from Ideal Lattices.” We were greatlyhonoredthatthe conferenceprogramincluded the 2013IACR Dis- tinguished Lecture talk by Eli Biham, entitled“How to Make a Difference: 25 Years of Differential Cryptanalysis,”as well as an invited lecture by the design- ers of Keccak (Guido Bertoni, Joan Daemen, Micha¨el Peeters, and Gilles Van Assche). We would like to thank them all for accepting our invitation and for their contribution to the programof Eurocrypt2013. We wish to thank all the authors who submitted their papers. The hard task of reading, commenting, debating, and eventually selecting the papers to be accepted for the conference fell on the PC members. We are very grateful to all the committee members and all external reviewers for their hard and conscientious work. It has been a great honor to chair the PC for Eurocrypt 2013. May 2013 Thomas Johansson Phong Q. Nguyen Eurocrypt 2013 General Chair Aggelos Kiayias University of Athens, Greece Program Chairs Thomas Johansson Lund University, Sweden Phong Nguyen INRIA, France and Tsinghua University, China Program Committee Frederik Armknecht Universit¨at Mannheim, Germany Andrey Bogdanov KU Leuven, Belgium Melissa Chase Microsoft Research, USA Jung Hee Cheon Seoul National University, Korea Steven Galbraith University of Auckland, New Zealand Rosario Gennaro City College of New York, USA Louis Goubin Universit´e Versailles Saint-Quentin, France Vipul Goyal Microsoft Research, India Jens Groth University College London, UK Martin Hirt ETH Zurich, Switzerland Jonathan Katz University of Maryland, USA Nathan Keller Bar Ilan University, Israel Dmitry Khovratovich Microsoft Research, USA Eike Kiltz Ruhr University Bochum, Germany Xuejia Lai Shanghai Jiao Tong University, China Gregor Leander Technical University of Denmark Arjen K. Lenstra EPFL, Switzerland Ga¨etan Leurent Universit´e du Luxembourg Vadim Lyubashevsky INRIA and ENS, France Subhamoy Maitra Indian Statistical Institute Daniele Micciancio UCSD, USA Jesper Buus Nielsen Aarhus University, Denmark Miyako Ohkubo NICT, Japan Kenny Paterson Royal Holloway,University of London, UK Giuseppe Persiano Universita` di Salerno, Italy Leonid Reyzin Boston University, USA Matt Robshaw Orange Labs, France VIII Eurocrypt 2013 Phil Rogaway UC Davis, USA Yu Sasaki NTT, Japan Yannick Seurin ANSSI, France Abhi Shelat University of Virginia, USA Nigel P. Smart University of Bristol, UK John P. Steinberger Tsinghua University, China Additional Reviewers Michel Abdalla Sherman Chow Phillip Gibbons Masayuki Abe Sherman S. M. Chow Benedikt Gierlichs Martin Albrecht Hee Won Chung Zheng Gong Jo¨el Alwen Sandro Coretti Sergey Gorbunov Prabhanjan Ananth Cas Cremers Matthew Green Elena Andreeva Boureanu Ioana Cristina Divya Gupta Gilad Asharov Edouard Cuvelier Shai Halevi Gille van Assche Dana Dachman-Soled Fabrice Ben Hamouda Jean-Philippe Aumasson O¨zgu¨r Dagdelen Gerhard Hancke Gildas Avoine Morten Dahl Kristiyan Haralambiev Abhishek Banerjee Ivan Damg˚ard Avinatan Hassidim Subhadeep Banik M. Prem Laxman Das Jens Hermans Rana Barua Gregory Demay Jason Hinek Lejla Batina Ning Ding Viet Tung Hoang Aurelie Bauer Itai Dinur Dennis Hofheinz Stephanie Bayer Maria Dubovitskaya Hyunsook Hong Anja Becker Leo Ducas Jialin Huang Mihir Bellare Orr Dunkelman Yun Huang David Bernhard Alex Escala Jialin Huang Rishiraj Bhattacharyya Pooya Farshim Pavel Hubacek Gaetan Bisson Sebastian Faust Jim Hughes Olivier Blazy Nelly Fazio Jung Yeon Hwang Julia Borghoff Serge Fehr William E. Skeith III Joppe Bos Dario Fiore Vincenzo Iovino Ioana Boureanu Marc Fischlin Tetsu Iwata Elette Boyle Tore Kasper Frederiksen Tibor Jager Christina Brzuska Georg Fuchsbauer Abhishek Jain Sebastien Canard Eiichiro Fujisaki Thomas P. Jakobsen Angelo De Caro Benjamin Fuller Stanislaw Jarecki David Cash Philippe Gaborit Dimitar Jetchev Pyrros Chaidos Tommaso Gagliardoni Min Young Jun Andre Chailloux Sebastian Gajek Charanjit Jutla Anupam Chattopadhyay Nicolas Gama Aniket Kate Shan Chen Pierrick Gaudry Aggelos Kiayias Yuanmi Chen Craig Gentry Jihye Kim Ashish Choudhury Essam Ghadafi Jinsu Kim Eurocrypt 2013 IX Sungwook Kim Tatsuaki Okamoto Christian Schaffner Taechan Kim Cristina Onete Dominique Schroeder Ilya Kizhvatov Claudio Orlandi Jacob Schuldt Thorsten Kleinjung David Oswald Sven Sch¨age Simon Knellwolf Dan Page Gil Segev Lars R. Knudsen Pascal Paillier Jae Hong Seo Markulf Kohlweiss Omkant Pandey Anna Shcherbakova Matthias Krause Tapas Pandit Vladimir Shpilrain Soonhak Kwon Omer Paneth Tom Shrimpton Martin Lauridsen Charalampos Jamie Sikora Hyung Tae Lee Papamanthou Alice Silverberg Jooyoung Lee PeriklisPapkonstantinou Benjamin Smith Moon Sung Lee Goutam Paul Francois-Xavier Mun-Kyu Lee Chris Peikert Standaert Allison Lewko Olivier Pereira Pantelimon Stanica Wei Li Milinda Perera Douglas Stebila Benoit Libert Edoardo Persichetti Damien Stehle Rachel Lin Andreas Peter John Steinberger Tingting Lin Christiane Peters Ron Steinfeld Helger Lipmaa Duong Hieu Phan Marc Stevens Feng-Hao Liu Krzysztof Pietrzak Koutarou Suzuki Jacob Loftus Benny Pinkas Bj¨orn Tackmann Yu Long Stefano Piranio Katsuyuki Takashima Adriana Lopez-Alt Bertram Poettering Keisuke Tanaka Stefan Lucks Joop van de Pol Aris Tentes Hans L¨ohr Emmanuel Prouff Stefano Tessaro Changshe Ma Baodong Qin Enrico Thomae Arpita Maitra Ananth Raghunathan Susan Thomson Lior Malka Vanishree H. Rao Mehdi Tibouchi Damian Markham Pavel Raykov Elmar Tischhauser Takahiro Matsuda Mariana Raykova Joana Treger Christian Matt Christian Rechberger Daniel Tschudi Sophie Mawet Yanli Ren Vinod Vaikuntanathan Alex May Renato Renner Serge Vaudenay Sarah Meiklejohn Alfredo Rial Daniele Venturi Florian Mendel Bill Rosgen Frederik Vercauteren Xianrui Meng Yannis Rouselakis Vincent Verneuil Bart Mennink Hansol Ryu Ivan Visconti Andrea Miele Carla Ra`fols Lei Wang Amir Moradi Rei Safavi-Naini Bogdan Warinschi PratyayMukherjee Amit Sahai Brent Waters Yusuke Naito Louis Salvail Carolyn Whitnall Ivica Nikoli´c Santanu Sarkar Daniel Wichs Ryo Nishimaki Takakazu Satoh Michael Wiener Adam O’Neill Alessandra Scafuro Peter Winkler X Eurocrypt 2013 Christopher Wolf Lisa Yin Zongyang Zhang Keita Xagawa Kazuki Yoneyama Yunlei Zhao Hong Xu Aaram Yun Vassilis Zikas Weijia Xu Mark Zhandry Angela Zottarel Kan Yasuda Liangfeng Zhang Table of Contents Candidate Multilinear Maps from Ideal Lattices ..................... 1 Sanjam Garg, Craig Gentry, and Shai Halevi Lossy Codes and a New Variant of the Learning-With-Errors Problem ........................................................ 18 Nico D¨ottling and J¨orn Mu¨ller-Quade A Toolkit for Ring-LWE Cryptography ............................. 35 Vadim Lyubashevsky, Chris Peikert, and Oded Regev Regularity of Lossy RSA on Subdomains and Its Applications ......... 55 Mark Lewko, Adam O’Neill, and Adam Smith Efficient Cryptosystems from 2k-th Power Residue Symbols ........... 76 Marc Joye and Benoˆıt Libert Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions .................................................... 93 Ananth Raghunathan, Gil Segev, and Salil Vadhan How to Watermark Cryptographic Functions ........................ 111 Ryo Nishimaki Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount? .......................... 126 Nicolas Veyrat-Charvillon, Benoˆıt G´erard, and Franc¸ois-Xavier Standaert Masking against Side-Channel Attacks: A Formal Security Proof ....... 142 Emmanuel Prouff and Matthieu Rivain Leakage-ResilientCryptography from Minimal Assumptions ........... 160 Carmit Hazay, Adriana L´opez-Alt, Hoeteck Wee, and Daniel Wichs Faster Index Calculus for the Medium Prime Case Application to 1175-bitand 1425-bitFinite Fields ................................. 177 Antoine Joux Fast Cryptography in Genus 2 ..................................... 194 Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.