ebook img

Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers PDF

449 Pages·2009·10.929 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

Lecture Notes in Computer Science 5487 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen UniversityofDortmund,Germany MadhuSudan MassachusettsInstituteofTechnology,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum Max-PlanckInstituteofComputerScience,Saarbruecken,Germany MotiYung Peng Liu Dongdai Lin (Eds.) Information Security and Cryptology 4th International Conference, Inscrypt 2008 Beijing, China, December 14-17, 2008 Revised Selected Papers 1 3 VolumeEditors MotiYung GoogleInc.andColumbiaUniversity ComputerScienceDepartment Room464,S.W.MuddBuilding,NewYork,NY10027,USA E-mail:[email protected] PengLiu PennsylvaniaStateUniversity CollegeofInformationSciencesandTechnology UniversityPark,PA16802,USA E-mail:[email protected] DongdaiLin SKLOIS,InstituteofSoftware,ChineseAcademyofSciences Beijing100080,China E-mail:[email protected] LibraryofCongressControlNumber:Appliedfor CRSubjectClassification(1998):E.3,D.4.6,F.2.1,C.2,J.1,C.3,K.4.4,K.6.5 LNCSSublibrary:SL4–SecurityandCryptology ISSN 0302-9743 ISBN-10 3-642-01439-9SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-01439-0SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2009 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SPIN:12653966 06/3180 543210 Preface The 4th China International Conference on Information Security and Cryptol- ogy(Inscrypt2008)wasco-organizedbytheChineseAssociationforCryptologic Researchand by the State Key Laboratoryof InformationSecurity.The confer- encewasheldinBeijing,China inmid-December,andwasfurther sponsoredby the Institute of Software, the Graduate University of the Chinese Academy of Sciences, and the National Natural Science Foundations of China. Givenitsfour-yearsuccess,Inscryptisnowatradition.Itis,infact,aleading annualinternationaleventinthe areaofcryptographyandinformationsecurity, taking place in China. We are pleased to report the continuous support of the entire community:authors,attendees,committee members,reviewers,sponsors, andorganizers.This state of affairsreflects the fact that the researchareascov- ered by Inscrypt are important to modern computing, where increased security, trust,safety,andreliabilityarerequired.Thisneedmakessurethatthe relevant research community, worldwide, continues producing important fundamental, experimental, and applied work in the wide areas of cryptographyand informa- tionsecurityresearch.Itis nota surprisethatthe scientific programofInscrypt 2008 coverednumerous fields of research within these general areas. The International Program Committee of Inscrypt 2008 received a total of 183 submissions from 23 countries and regions, with only 40 being selected for presentation: 28 submissions which are collected in this volume, were chosen for the regular papers track and 12 for the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks, and strict selection criteria the papers were chosen to the various tracks. The selection to both tracks was a highly competitive process. We note also that reviews of submissions by committee members were hiddenfromtheirauthorsthroughouttheentirereviewprocess.Wefurthernote that due to the conferenceformat,many goodpapers haveregrettablynotbeen accepted. Inscrypt 2008 was made possible by the joint efforts of numerous people and organizations worldwide. We take this opportunity to thank the Program Committeemembersandtheexternalexpertstheyemployedfortheirinvaluable help in producing the conference program. We further thank the conference OrganizingCommittee,thevarioussponsors,andtheconferenceattendees.Last but not least, we express our great gratitude to all the authors who submitted papers to the conference, the invited speakers, and the session Chairs. December 2008 Moti Yung ‘ Peng Liu Dongdai Lin Inscrypt 2008 4th China International Conference on Information Security and Cryptology Beijing, China December 15 - 17, 2008 Sponsored and organized by the Chinese Association for Cryptologic Research and State Key Laboratory of Information Security (Chinese Academy of Sciences) General Chairs Dengguo Feng SKLOIS, Chinese Academy of Sciences, China Program Co-chairs Moti Yung Google Inc. and Columbia University, USA Peng Liu Pennsylvania State University, USA Dongdai Lin SKLOIS, Institute of Software, Chinese Academy of Sciences, China Program Committee Vladimir S. Anashin Moscow University, Russia Vijay Atluri Rutgers University, USA Marina Blanton University of Notre Dame, USA Zhenfu Cao Shanghai Jiaotong University, China Claude Carlet INRIA,University Paris 8, France Jean-Sebastien Coron University of Luxembourg, Luxembourg Marc Dacier Symantec Research Labs Europe, France Cunsheng Ding Hong Kong University of Science and Technology, Hong Kong Jintai Ding University of Cincinnati, USA Stefan Dziembowski University of Rome “La Sapienza”, Italy Jean-Charles Faugere INRIA, France Guang Gong University of Waterloo, Canada Qijun Gu Texas State University, USA Martin Hell University of Lund, Sweden VIII Organization Xuxian Jiang North Carolina State University, USA Jiwu Jing Graduate University of CAS, China Brian King Indiana University-Purdue University, Indianapolis, USA Miroslaw Kutylowski Wroclaw University of Technology, Poland Chi-Sung Lai National Cheng Kung University, Taiwan DongHoon Lee Korea University, Korea Albert Levi Sabanci University, Turkey Jianhua Li Shanghai Jiaotong University, China Jie Li University of Tsukuba, Japan Ninghui Li Purdue University, USA Yingjiu Li Singapore Management University, Singapore Benoit Libert Universite Catholique de Louvain, Belgium Javier Lopez University of Malaga, Spain Xiapu Luo HongKongPolytechnicUniversity,HongKong Bodo Moeller Google Inc., Zurich, Switzerland Mridul Nandi NIST, USA Peng Ning North Carolina State University, USA Eiji Okamoto Tsukuba University, Japan Ludovic Perret LIP6/INRIA Paris-Rocquencourt,France Giuseppe Persiano University of Salerno, Italy Raphael C.-W. Phan LoughboroughUniversity, UK Bimal K. Roy Indian Statistical Institute, India Kouichi Sakurai Kyushu University, Japan Bhavani Thuraisingham University of Texas at Dallas, USA Carmela Troncoso K.U. Leuven, Belgium Shabsi Walfish Google Inc., USA Huaxiong Wang Nanyang TechnologicalUniversity, Singapore Xiaoyun Wang Shandong University, China Chuankun Wu Institute of Software, CAS, China Shouhuai Xu University of Texas at San Antonio, USA Meng Yu Western Illinois University, USA Erik Zenner Technical University of Denmark, Denmark Yuliang Zheng UniversityofNorthCarolinaatCharlotte,USA Jianying Zhou Institute for Infocomm Research, Singapore Sencun Zhu Pennsylvania State University, USA Organizing Committee Co-chairs Jiwu Jing SKLOIS, Graduate University of Chinese Academy of Sciences, China Zhijun Qiang Chinese Association for Cryptologic Research, China Organization IX Organizing Committee Chuankun Wu SKLOIS, Institute of Software of CAS, China Daren Zha SKLOIS, Graduate University of CAS, China Xiaoyang Wen SKLOIS, Graduate University of CAS, China Aihua Zhang SKLOIS, Graduate University of CAS, China Secretary and Treasurer Shi Zhang SKLOIS, Graduate University of CAS, China WEB/Registration Yicong Liu SKLOIS, Graduate University of CAS, China Jingjing Wu SKLOIS, Graduate University of CAS, China Table of Contents Invited Talks The State of Hash Functions and the NIST SHA-3 Competition (Extended Abstract) ............................................. 1 Bart Preneel Key Evolution Systems in Untrusted Update Environments ........... 12 Benoˆıt Libert, Jean-Jacques Quisquater, and Moti Yung Secure and Privacy-PreservingInformation Brokering................. 22 Peng Liu Digital Signature and Signcryption Schemes Provably Secure Convertible Nominative Signature Scheme .......... 23 Wei Zhao, Changlu Lin, and Dingfeng Ye Cryptanalysis of Two Ring Signcryption Schemes .................... 41 Huaqun Wang and Hong Yu Efficient Signcryption Key Encapsulation without Random Oracles..... 47 Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi Privacy and Anonymity Strong Anonymous Signatures ..................................... 60 Rui Zhang and Hideki Imai Publicly Verifiable Privacy-PreservingGroup Decryption.............. 72 Bo Qin, Qianhong Wu, Willy Susilo, and Yi Mu Privacy for Private Key in Signatures............................... 84 Qianhong Wu, Bo Qin, Yi Mu, and Willy Susilo Message Authentication Code and Hash Function Security of Truncated MACs ...................................... 96 Peng Wang, Dengguo Feng, Changlu Lin, and Wenling Wu Security Analysis of Multivariate Polynomials for Hashing............. 115 Luk Bettale, Jean-Charles Faug`ere, and Ludovic Perret XII Table of Contents Secure Protocols SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.................................................... 125 MengJun Li, Ti Zhou, and ZhouJun Li Batch ZK Proof and Verification of OR Logic........................ 141 Kun Peng and Feng Bao Symmetric Cryptography Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs........................................................... 157 Debra L. Cook, Moti Yung, and Angelos Keromytis Impossible Differential Analysis of Reduced Round CLEFIA........... 181 Wenying Zhang and Jing Han Reducible Polynomial over F Constructed by Trinomial σ−LFSR ..... 192 2 Guang Zeng, Yang Yang, Wenbao Han, and Shuqin Fan Certificateless Cryptography Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model ................................................. 201 Piyi Yang, Zhenfu Cao, and Xiaolei Dong Further Observations on Certificateless Public Key Encryption......... 217 Xu an Wang, Xinyi Huang, and Xiaoyuan Yang Hardware Implementation and Side Channel Attack Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing ............................................... 240 Mooseop Kim, Jaecheol Ryou, and Sungik Jun New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA............................................ 253 Duo Liu, Zhiyong Tan, and Yiqi Dai Wireless Network Security A Novel Marking Probability Distribution Using Probability Propagationin HierarchicalWSN .................................. 265 Bo-Chao Cheng, Huan Chen, and Guo-Tan Liao

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.