ebook img

Advances in Cryptology — EUROCRYPT ’99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2–6, 1999 Proceedings PDF

487 Pages·1999·5.56 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advances in Cryptology — EUROCRYPT ’99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2–6, 1999 Proceedings

Lecture Notes in Computer Science 1592 Editedby G.Goos,J. Hartmanisand J.van Leeuwen 3 Berlin Heidelberg NewYork Barcelona HongKong London Milan Paris Singapore Tokyo Jacques Stern (Ed.) Advances in Cryptology – EUROCRYPT ’99 International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings 1 3 SeriesEditors GerhardGoos,KarlsruheUniversity,Germany JurisHartmanis,CornellUniversity,NY,USA JanvanLeeuwen,UtrechtUniversity,TheNetherlands VolumeEditor JacquesStern EcoleNormaleSupe´rieure 45,rued’Ulm,F-75230Paris05,France E-mail:[email protected] Cataloging-in-Publicationdataappliedfor DieDeutscheBibliothek-CIP-Einheitsaufnahme Advancesincryptology:proceedings/EUROCRYPT’99,InternationalConference ontheTheoryandApplicationofCryptographicTechniques,Prague,Czech Republic,May2-6,1999.JacquesStern(ed.).-Berlin;Heidelberg;New York;Barcelona;HongKong;London;Milan;Paris;Singapore;Tokyo: Springer,1999 (Lecturenotesincomputerscience;Vol.1592) ISBN3-540-65889-0 CRSubjectClassification(1998):E.3,G.2.1,D.4.6,K.6.5,F.2.1-2,C.2,J.1 ISSN0302-9743 ISBN3-540-65889-0Springer-VerlagBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer-Verlag.Violationsare liableforprosecutionundertheGermanCopyrightLaw. (cid:1)c Springer-VerlagBerlinHeidelberg1999 PrintedinGermany Typesetting:Camera-readybyauthor SPIN10704664 06/3142–543210 Printedonacid-freepaper Preface EUROCRYPT ’99, the seventeenth annual Eurocrypt Conference, was spon- soredbytheInternationalAssociationforCryptologicResearch(IACR),incoop- erationwiththeGroupofCryptologywithintheUnionofCzechMathematicians andPhysicists.TheGeneralChair,JaroslavHruby,wasresponsiblefortheover- allorganizationoftheconferenceinthebeautifulcityofPrague.Letmemention that it was a pleasure to work together:although we were in di(cid:11)erent locations, we managed to stay in close contact and maintain a smooth organizationof the conference. The Program Committee, consisting of 21 members, considered 120 papers and selected 32 for presentation. In addition, Ross Anderson kindly agreed to chairthetraditionalrumpsessionforinformalshortpresentationsofnewresults. These proceedings include the revisedversionsof the 32 papers accepted by the Program Committee. These papers were selected on the basis of originality, quality, and relevance to cryptography. As a result, they should give a proper picture of how the (cid:12)eld is evolving. Revisions were not checkedand the authors bear full responsibility for the contents of their papers. Theselectionofpaperswasadi(cid:14)cultandchallengingtask.Eachsubmission was refereed by at least three reviewers and most had four reports or more. I wish to thank the program committee members, who did an excellent job. In addition, I gratefully acknowledge the help of a large number of colleagues who reviewedsubmissionsintheirareasofexpertise.Theyare:MichelAbdalla,Josh Benaloh,CharlesBennett,SimonBlackburn,MattBlaze,ChristianCachin,Jan Camenisch, Ran Canetti, Benny Chor, Galdi Clemente, Jean-S(cid:19)ebastien Coron, Paolo D’Arco, Anand Desai, Uri Feige, Marc Fischlin, Roger Fischlin, Matt Franklin, Steven Galbraith, Rosario Gennaro, Pierre Girard, Dieter Gollmann, Shai Halevi, Helena Handschuh, Yuval Ishai, Markus Jakobsson, Mike Just, Ted Krovetz, Kaoru Kurosawa, Eyal Kushilevitz, Keith Martin, Barbara Ma- succi, Johannes Merkle, Daniele Micciancio, Victor S. Miller, Fauzan Mirza, Serge Mister, Peter L. Montgomery, Tal Mor, David M’Ra¨(cid:16)hi, Luke O’Connor, Andrew Odlyzko, Wakaha Ogata, Koji Okada, Pascal Paillier, Pino Persiano, DavidPointcheval,BartPreneel,TalRabin,Omer Reingold,PhilRogaway,Lu- dovic Rousseau, Berry Schoenmakers, Peter Shor, Jean-Pierre Seifert, Othmar Sta(cid:11)elbach,UgoVaccaro,SergeVaudenay,RuizhongWei,MikeWiener,Rebecca Wright,Xian-MoZhang,andRobertZuccherato.Iapologizeforanyinadvertent omission. I also wish to thank my PhD students Phong Nguyen, Thomas Pornin, and Guillaume Poupard, who helped me a great deal at various steps of the whole process. Their computer skills and the time and e(cid:11)ort they invested were a crucial ingredient of my ability to run the programcommittee. Thomas ran the electronic submission phase and was able to print all postscript (cid:12)les, including those produced by non-standard word processors. Guillaume opened a private VI Preface FTP server and Web site for PC members, and Phong did the editing work, both in paper and in electronic form. I hope I did not distract them too much from their research,but they were kind enough to tell me they had learnt a lot. Thanks also to Joelle Isnard and Nadine Riou, who organized the PC meeting in Paris. Following the example of CRYPTO ’98, EUROCRYPT ’99 was the (cid:12)rst of the Eurocrypt series with electronic submissions. The electronic submission optionwasaclearchoiceforalmostallauthors,withonly5%ofthe paperssub- mitted by regular mail. I believe that the time has come to make e-submission mandatory,but it will be the choice of future Crypto and EurocryptPC chairs. I wishtothank JoeKilian,whoforwardedus the electronicsubmissionsoftware used for CRYPTO ’98 and helped us run it. This software was originally de- veloped by ACM’s SIGACT group and I thank the ACM for allowing us to use their system. Finally,Iwishtothanktheallauthorswhosubmittedpapersformakingthis conferencepossiblebycreatingthescienti(cid:12)cmaterial,andespeciallytheauthors ofacceptedpapers.Iwouldalsoliketothankthe publisher,Springer-Verlag,for working within a tight schedule in order to produce these proceedings in due time. February 1999 Jacques Stern ProgramChair EUROCRYPT ’99 EUROCRYPT ’99 May 2 { 6, 1999, Prague, Czech Republic Sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Group of Cryptology within the Union of Czech Mathematicians and Physicists General Chair Jaroslav Hruby, UCMP, Czech Republic Program Chair Jacques Stern, E(cid:19)cole Normale Sup(cid:19)erieure, France Program Committee Eli Biham ....................................................Technion, Israel Mihir Bellare ........................University of California, San Diego, USA Carlo Blundo .....................................Universita(cid:18) di Salerno, Italy Dan Boneh .........................................Stanford University, USA Stefan Brands ..............................Brands Technologies,Netherlands Mike Burmester .................................Royal Holloway, London, UK Don Coppersmith ........................................IBM Research, USA Claude Cr(cid:19)epeau ...................................McGill University, Canada Cynthia Dwork .........................IBM Almaden Research Center, USA Joan Feigenbaum ...............................AT&T Labs - Research, USA Lars Knudsen ..................................University of Bergen, Norway Tsutomu Matsumoto ...................Yokohama National University, Japan Willi Meier ..............................Fachhochschule Aargau, Switzerland David Naccache .............................................Gemplus, France Jean-Jacques Quisquater ......................Universit(cid:19)e de Louvain, Belgium Bruce Schneier ...................................Counterpane Systems, USA Claus Schnorr ................................Universita¨t Frankfurt, Germany Victor Shoup ..........................IBM Zurich Research Lab, Switzerland Paul Van Oorschot .............................Entrust Technologies, Canada Yuliang Zheng ..................................Monash University, Australia Table of Contents Cryptanalysis I Cryptanalysis of RSA with Private Key d Less than N0.292.............. 1 Dan Boneh and Glenn Durfee (Stanford University) Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials ....................................................... 12 Eli Biham, Alex Biryukov (Technion), and Adi Shamir (Weizmann Institute of Science) Hash Functions Software Performance of Universal Hash Functions ..................... 24 Wim Nevelsteen and Bart Preneel (Katholieke Universiteit Leuven) Foundations I Lower Bounds for Oblivious Transfer Reductions....................... 42 Yevgeniy Dodis and Silvio Micali (MIT) On the (Im)possibility ofBasing Oblivious Transferand Bit Commitment on Weakened Security Assumptions .................................. 56 Ivan Damg˚ard (University of ˚Arhus), Joe Kilian (NEC Research Institute), and Louis Salvail (University of ˚Arhus) Conditional Oblivious Transfer and Timed-Release Encryption........... 74 Giovanni Di Crescenzo (University of California San Diego), Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan (Bellcore) Public Key AnEfficientThresholdPublicKeyCryptosystemSecureAgainstAdaptive Chosen Ciphertext Attack........................................... 90 Ran Canetti (IBM T.J. Watson) and Shafi Goldwasser (MIT) Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes ........................................................... 107 Jan Camenisch (University of Aarhus) and Markus Michels (Entrust Technologies Europe) Secure Hash-and-Sign Signatures Without the Random Oracle........... 123 Rosario Gennaro, Shai Halevi, and Tal Rabin (IBM T.J.Watson) X Table of Contents Watermarking and Fingerprinting A Note on the Limits of Collusion-Resistant Watermarks................ 140 FundaErgun(BellLaboratories),JoeKilian (NECResearchInstitute), and Ravi Kumar (IBM Almaden) Coin-Based Anonymous Fingerprinting ............................... 150 Birgit Pfitzmann and Ahmad-Reza Sadeghi (Universit¨at des Saarlandes) Elliptic Curves On the Performance of Hyperelliptic Cryptosystems .................... 165 Nigel P. Smart (Hewlett-Packard Laboratories) Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic........................... 176 Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, and Fumitaka Hoshino (NTT Laboratories) Comparing the MOV and FR Reductions in Elliptic Curve Cryptography 190 Ryuichi Harasawa, Junji Shikata, Joe Suzuki (Osaka University), and Hideki Imai (University of Tokyo) New Schemes Unbalanced Oil and Vinegar Signature Schemes........................ 206 Aviad Kipnis (NDS Technologies), Jacques Patarin, and Louis Goubin (Bull SmartCards and Terminals) Public-Key Cryptosystems Based on Composite Degree Residuosity Classes ........................................................... 223 Pascal Paillier (Gemplus and ENST) New Public Key Cryptosystems Based on the Dependent–RSA Problems. 239 David Pointcheval (E´cole Normale Sup´erieure) Block Ciphers Resistance Against General Iterated Attacks........................... 255 Serge Vaudenay (E´cole Normale Sup´erieure) XOR and Non-XOR Differential Probabilities.......................... 272 Philip Hawkes (Qualcomm International) and Luke O’Connor (IBM Zu¨rich)

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.