ebook img

Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers PDF

375 Pages·2016·13.994 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers

Soonhak Kwon Aaram Yun (Eds.) Information Security 8 5 and Cryptology – 5 9 S C ICISC 2015 N L 18th International Conference Seoul, South Korea, November 25–27, 2015 Revised Selected Papers 123 Lecture Notes in Computer Science 9558 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Soonhak Kwon Aaram Yun (Eds.) (cid:129) Information Security – and Cryptology ICISC 2015 18th International Conference – Seoul, South Korea, November 25 27, 2015 Revised Selected Papers 123 Editors Soonhak Kwon Aaram Yun SungkyunkwanUniversity UNIST Suwon,Gyeonggi Ulsan Korea (Republicof) Korea (Republicof) ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-30839-5 ISBN978-3-319-30840-1 (eBook) DOI 10.1007/978-3-319-30840-1 LibraryofCongressControlNumber:2016932355 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerInternationalPublishingSwitzerland2016 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAGSwitzerland Preface ICISC 2015, the 18th International Conference on Information Security and Cryptol- ogy, was held in Seoul, Korea, during November 25–27, 2015. This year, the con- ferencewashostedbyKIISC(KoreaInstituteofInformationSecurityandCryptology) jointly with NSR (National Security Research Institute). Theaimofthisconferenceistoprovideaninternationalforumforthelatestresults of research, development, and applications in the field of information security and cryptology. This year we received 84 submissions, and were able to accept 23 papers from 13 countries, with the acceptance rate of 27.4 %. The review and selection processes were carried out by the Program Committee (PC) members, 56 prominent expertsworldwide,viatheIACRreviewsystem.First,eachpaperwasblindreviewed, by at least three PC members for most cases. Second, for resolving conflicts on the reviewers’ decisions, the individual review reports were open to all PC members, and detailed interactive discussions on each paper were followed. The conference featured two invited talks: “Discrete Logarithm-Based Zero- Knowledge Arguments” by Jens Groth, and “Multilinear Maps and Their Cryptanal- ysis”byJungHeeCheon.Wethanktheinvitedspeakersfortheirkindacceptanceand interesting presentations. We would like to thank all authors who submitted their papers to ICISC 2015 and all 56 PC members. It was a truly nice experience to work with such talented and hard-working researchers. We also appreciate the external reviewers for assisting the PC members in their particular areas of expertise. Finally, we would like to thank all attendees for their active participation and the Organizing Committee members who expertly managed this conference. We look forward to seeing you again at the next year’s ICISC. November 2015 Soonhak Kwon Aaram Yun Organization General Chairs Kwang Ho Kim National Security Research Institute, Korea ChoonSik Park Seoul Women’s University, Korea Organizing Committee Chair Heuisu Ryu Gyeongin National University of Education, Korea Committee Members Dooho Choi ETRI, Korea Junbeom Hur Korea University, Korea Howon Kim Pusan University, Korea Jongsung Kim Kookmin University, Korea Sang Choon Kim Kangwon National University, Korea Daesung Kwon National Security Research Institute, Korea Kihyo Nam Umlogics, Korea SangHwan Park KISA, Korea Okyeon Yi Kookmin University, Korea Program Committee Co-chairs Soonhak Kwon Sungkyunkwan University, Korea Aaram Yun UNIST, Korea Committee Members Yoo-Jin Baek Woosuk University, Korea Joonsang Baek Khalifa University of Science, Technology and Research (KUSTAR), UAE Lejla Batina Radboud University, The Netherlands Andrey Bogdanov Technical University of Denmark, Denmark Zhenfu Cao East China Normal University, China Donghoon Chang IIIT-Delhi, India Paolo D’Arco University of Salerno, Italy Rafael Dowsley Karlsruhe Institute of Technology, Germany Dong-Guk Han Kookmin University, Korea Swee-Huay Heng Multimedia University, Malaysia VIII Organization Seokhie Hong Korea University, Korea Jung Yeon Hwang ETRI, Korea David Jao University of Waterloo, Canada Howon Kim Pusan National University, Korea Huy Kang Kim Korea University, Korea Jihye Kim Kookmin University, Korea So Jeong Kim National Security Research Institute, Korea Jin Kwak Ajou University, Korea Taekyoung Kwon Yonsei University, Korea Changhoon Lee Seoul National University of Science and Technology, Korea Hyang-Sook Lee Ewha Womans University, Korea Hyung Tae Lee Nanyang Technological University, Singapore JongHyup Lee Gachon University, Korea Jooyoung Lee Sejong University, Korea Kwangsu Lee Korea University, Korea Moon Sung Lee Seoul National University, Korea Mun-Kyu Lee Inha University, Korea Pil Joong Lee POSTECH, Korea Jiqiang Lu Institute for Infocomm Research, Singapore Sjouke Mauw University of Luxembourg, Luxembourg Florian Mendel Graz University of Technology, Austria Atsuko Miyaji JAIST, Japan DaeHun Nyang Inha University, Korea Katsuyuki Okeya Hitachi Ltd., Japan Blazy Olivier XLim, Université de Limoges, France Rolf Oppliger eSECURITY Technologies, Switzerland Jong Hwan Park Sangmyung University, Korea Young-Ho Park Sejong Cyber University, Korea Souradyuti Paul Indian Institute of Technology, Gandhinagar, India Christian Rechberger DTU Compute, Denmark Bimal Roy Indian Statistical Institute, India Kouichi Sakurai Kyushu University, Japan Jae Hong Seo Myongji University, Korea Sang Uk Shin Pukyong National University, Korea Taeshik Shon Ajou University, Korea Rainer Steinwandt Florida Atlantic University, USA Hung-Min Sun National Tsing Hua University, Taiwan Willy Susilo University of Wollongong, Australia Tsuyoshi Takagi Kyushu University, Japan Marion Videau Quarkslab and Loria, France Yongzhuang Wei Guilin University of Electronic Technology, China Wenling Wu Institute of Software, Chinese Academy of Sciences, China Toshihiro Yamauchi Okayama University, Japan Wei-Chuen Yau Multimedia University, Malaysia Ching-Hung Yeh Far East University, Taiwan Dae Hyun Yum Myongji University, Korea Information Security and Cryptology — ICISC 2015 The 18th International Conference on Information Security and Cryptology R & D Center, Chung-Ang University, Seoul, Korea November 25–27, 2015 Hosted by Korea Institute of Information Security and Cryptology (KIISC) & National Security Research Institute (NSR) Sponsored by Electronics and Telecommunications Research Institute (ETRI) & LG Hitachi Contents Digital Signatures A General Framework for Redactable Signatures and New Constructions. . . . 3 David Derler, Henrich C. Pöhls, Kai Samelin, and Daniel Slamanig On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata Attribute-Based Two-Tier Signatures: Definition and Construction . . . . . . . . 36 Hiroaki Anada, Seiko Arita, and Kouichi Sakurai Public-Key Cryptography Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys . . . 53 Benjamin Wesolowski and Pascal Junod Learning with Errors in the Exponent . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Özgür Dagdelen, Sebastian Gajek, and Florian Göpfert Block Cipher Cryptanalysis Higher-Order Cryptanalysis of LowMC . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Integral Attack Against Bit-Oriented Block Ciphers. . . . . . . . . . . . . . . . . . . 102 Huiling Zhang, Wenling Wu, and Yanfeng Wang Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, and Somitra Kumar Sanadhya Improved Impossible Differential Attack on Reduced-Round LBlock. . . . . . . 136 Ning Wang, Xiaoyun Wang, and Keting Jia Elliptic Curve Cryptography Point Decomposition Problem in Binary Elliptic Curves. . . . . . . . . . . . . . . . 155 Koray Karabina

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.