ebook img

Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers PDF

402 Pages·2013·4.698 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

Mirosław Kutyłowski Moti Yung (Eds.) 3 6 Information Security 7 7 S C and Cryptology N L 8th International Conference, Inscrypt 2012 Beijing, China, November 2012 Revised Selected Papers 123 Lecture Notes in Computer Science 7763 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Mirosław Kutyłowski MotiYung (Eds.) Information Security and Cryptology 8th International Conference, Inscrypt 2012 Beijing, China, November 28-30, 2012 Revised Selected Papers 1 3 VolumeEditors MirosławKutyłowski WrocławUniversityofTechnology DepartmentofFundamentalProblemsofTechnology Wybrzez˙eWyspian´skiego27,50-370Wrocław,Poland E-mail:[email protected] MotiYung ColumbiaUniversityandGoogleInc. ComputerScienceDepartment AmsterdamAvenue1214,NewYork,NY10027,USA E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-38518-6 e-ISBN978-3-642-38519-3 DOI10.1007/978-3-642-38519-3 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2013938367 CRSubjectClassification(1998):K.6.5,E.3,E.4,F.2,D.4.6 LNCSSublibrary:SL4–SecurityandCryptology ©Springer-VerlagBerlinHeidelberg2013 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface These volume contains the proceedings of INSCRYPT 2012, the 8th China In- ternationalConferenceonInformationSecurityandCryptology,whichwasheld in Beijing, November 28–30,2012. INSCRYPT2012wascollaborativelyorganizedbytheStateKeyLaboratory of Information Security (SKLOIS) of the Chinese Academy of Sciences (CAS) and the Chinese Association for Cryptologic Research (CACR), in cooperation withtheInternationalAssociationofCryptologicResearch(IACR).Itwaspartly supportedbytheNaturalScienceFoundationofChina(NSFC)andtheInstitute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). The conference is a leading international meeting taking place in China de- voted to the current research in cryptography and information security. The program of the conference consisted of sessions devoted to: Side Channel At- tacks, Extractor and Secret Sharing, Public Key Cryptography, Block Ciphers, Stream Ciphers, New Constructions and Protocols. Besides contributed talks, the programcontainedinvited talks by Jung Hee Cheonand GoichiroHanaoka, as well as tutorials given by Mirosl(cid:2)aw Kutyl(cid:2)owski (Digital Electronic Identity Documents)andJunfengFan(CryptographicHardware:DesignforLowPower, Low Area and Security Against Physical Attacks). The international Program Committee of INSCRYPT 2012 evaluated 71 anonymous submissions from all over the world. Each submission was reviewed by at least four Program Committee members, who were supported by a num- ber of externalreviewers.After a strict evaluationprocess,23 papers from Aus- tralia, P.R. China, Finland, France, Germany, Hong Kong, India, Israel, Japan, Malaysia,Russia,SingaporeandSwitzerlandwereselectedforpresentationdur- ing the conference. We thank the authors of contributed papers, Program Committee mem- bers, external reviewers,and Organizing Committee (Dongdai, Lin, Rui Zhang, Zhijun Qiang, Yu Chen, Yao Lu, Fengjiao Yu) for their joint effort in making INSCRYPT 2012 happen. We further thank the EasyChair team for technical tools supporting the conference preparation and Kamil Kluczniak for technical assistance during preparation of this volume. Mirosl(cid:2)aw Kutyl(cid:2)owski Moti Yung Organization Program Committee Martin Albrecht UPMC Paris, France Zhenfu Cao SJTU, P.R. China Bogdan Carbunar Florida International University, USA Liqun Chen Hewlett-Packard Laboratories,UK Zhong Chen Peking University, P.R. China Sherman S.M. Chow University of Waterloo, Canada / CUHK, HK Tassos Dimitriou Athens Information Technology, Greece Cunsheng Ding Hong Kong University of Science and Technology, SAR China Shlomi Dolev Ben Gurion University of the Negev, Israel Lei Hu Chinese Academy of Sciences, P.R. China Charanjit Jutla IBM T.J. Watson Research Center, USA Angelos Keromytis Columbia University, USA Kwangjo Kim KAIST, Korea Matthias Krause Mannheim University, Germany Miroslaw Kutylowski Wroclaw University of Technology, Poland Xuejia Lai Shanghai Jiaotong University, P.R. China Hui Li Xidan University, P.R. China Yingjiu Li Singapore Management University, Singapore Joseph Liu Institute for Infocomm Research, Singapore Peng Liu The Pennsylvania State University, USA Javier Lopez University of Malaga, Spain Mark Manulis University of Surrey, UK Krystian Matusiewicz Intel Technology, Poland Florian Mendel KU Leuven, Belgium Atsuko Miyaji JAIST, Japan Payman Mohassel University of Calgary, Canada Amir Moradi Ruhr University Bochum, Germany Yi Mu University of Wollongong, Australia Kaisa Nyberg Aalto University, Finland Claudio Orlandi Aarhus University, Denmark Kenneth Paterson Royal Holloway, University of London, UK Giuseppe Persiano University of Salerno, Italy Mariana Raykova Columbia University, USA Kouichi Sakurai Kyushu University, Japan Jun Shao Zhejiang Gongshang University, P.R. China VIII Organization Ron Steinfeld Monash University, Australia Wen-Guey Tzeng National Chiao Tung University, Taiwan Yevgeniy Vahlis AT&T Labs, Security Research Center, USA Wenling Wu Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China Adam Young CryptovirologyLabs, USA Moti Yung Google & Columbia University, USA Fangguo Zhang Sun Yat-sen University, P.R. China Yuliang Zheng UNC Charlotte, USA Hong-Sheng Zhou University of Maryland, USA Additional Reviewers Armknecht, Frederik Huang, Heqing Asharov, Gilad Huang, Jialin Athanasopoulos, Elias Huang, Xinyi Au, Man Ho Hubacek, Pavel Blondeau, C´eline Hu¨lsing, Andreas Borghoff, Julia Iovino, Vincenzo Cai, Shaoying Jovanovic, Philipp Cao, Weiwei Ja¨rvinen, Kimmo Carlet, Claude Kavun, Elif Bilge Chakravarty, Kemerlis, Vasileios P. Sambuddho Kiyomoto, Shinsaku Chen, Jiageng Kontaxis, Georgios Chen, Yu Kopeetsky, Marina Cichon, Jacek Kourai, Kenichi Clark, Jeremy Kywe, Su Mon De Caro, Angelo Le, Dong De Prisco, Roberto Li, Jin Deng, Tang Li, Wei Ding, Yi Lu, Jiqiang Enos, Graham Lyubashevsky, Vadim Fandina, Nova Mikhalev, Vasily Fernandez, Carmen Mischke, Oliver Forte, Andrea Moyano, Francisco Galdi, Clemente Nad, Tomislav Gong, Junqing Nieto, Ana Gopal, Vinodh Nikova, Svetla Gorbunov, Sergey Nishide, Takashi Guo, Fuchun Omote, Kazumasa Hakala, Risto Pappas, Vasilis Hamann, Matthias Paul, Souradyuti Han, Jinguang Perret, Ludovic Organization IX Proctor, Gordon Wang, Guilin Rios, Ruben Wang, Jun Rnjom, Sondre Watson, Gaven Rosulek, Mike Wei, Puwen Sadeghian, Saeed Wichs, Daniel Scafuro, Alessandra Xiao, Gaoyao Schla¨ffer, Martin Xie, Qi Schmidt, Jo¨rn-Marc Ximing, Li Shirase, Masaaki Xu, Hong Suzuki, Koutarou Yan, Qiang Takahashi, Junko Yasuda, Takanori Tang, Qiang Yasunaga, Kenji Tischhauser, Elmar Table of Contents On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown ............................................ 1 Lidong Han, Wei Wei, and Mingjie Liu Differential Fault Analysis of Twofish............................... 10 Sk Subidh Ali and Debdeep Mukhopadhyay Improved Differential Cache Attacks on SMS4 ....................... 29 Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, and Huaxiong Wang An Extension of Fault Sensitivity Analysis Based on Clockwise Collision ........................................................ 46 Yang Li, Kazuo Ohta, and Kazuo Sakiyama A Robust Fuzzy Extractor without ECCs ........................... 60 Jintao Yao, Kangshun Li, Mingwu Zhang, and Min Zhou An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels ............. 69 Yang Yu and Zhanfei Zhou Visual Cryptography for Natural Images and Visual Voting ........... 90 Teng Guo, Feng Liu, and ChuanKun Wu RCCA Security for KEM+DEM Style Hybrid Encryptions ............ 102 Yuan Chen and Qingkuan Dong Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations....................................... 122 Jintai Ding, Ai Ren, and Chengdong Tao Verifiable Structured Encryption................................... 137 Moesfa Soeheila Mohamad and Geong Sen Poh Nested Merkle’s Puzzles against Sampling Attacks (Extended Abstract) ............................................. 157 Shlomi Dolev, Nova Fandina, and Ximing Li Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC...................................... 175 Michael Walter, Stanislav Bulygin, and Johannes Buchmann XII Table of Contents A General Model for MAC Generation Using Direct Injection.......... 198 Harry Bartlett, Mufeed AlMashrafi, Leonie Simpson, Ed Dawson, and Kenneth Koon-Ho Wong Collision Attacks on Variant of OCB Mode and Its Series ............. 216 Zhelei Sun, Peng Wang, and Liting Zhang The Security and Performance of “GCM” when Short Multiplications Are Used Instead ................................................ 225 Kazumaro Aoki and Kan Yasuda Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN......................................... 246 Risto M. Hakala, Atle Kivela¨, and Kaisa Nyberg Fast Evaluation of T-Functions via Time-Memory Trade-Offs.......... 263 Tao Shi, Vladimir Anashin, and Dongdai Lin Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks......................................................... 276 Tianze Wang, Meicheng Liu, and Dongdai Lin An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators......................... 294 Lin Jiao, Mingsheng Wang, Bin Zhang, and Yongqiang Li New Sequences of Period pn and pn+1 via Projective Linear Groups... 311 Lin Wang and Zhi Hu Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones .................................... 331 Yuxin Meng, Duncan S. Wong, Roman Schlegel, and Lam-for Kwok Secure Product Tracking in Supply Chain........................... 351 Mehdi Khalfaoui, Refik Molva, and Laurent Gomez The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks ................................................... 371 Aslı Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, and Serge Vaudenay Author Index.................................................. 393

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.