Alex Biryukov Vipul Goyal (Eds.) 2 6 4 Progress in Cryptology – 9 S C INDOCRYPT 2015 N L 16th International Conference on Cryptology in India Bangalore, India, December 6–9, 2015 Proceedings 123 Lecture Notes in Computer Science 9462 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Alex Biryukov Vipul Goyal (Eds.) (cid:129) – Progress in Cryptology INDOCRYPT 2015 16th International Conference on Cryptology in India – Bangalore, India, December 6 9, 2015 Proceedings 123 Editors AlexBiryukov VipulGoyal Université duLuxembourg Microsoft Research India Luxembourg Bangalore Luxembourg India ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-26616-9 ISBN978-3-319-26617-6 (eBook) DOI 10.1007/978-3-319-26617-6 LibraryofCongressControlNumber:2015954620 LNCSSublibrary:SL4–SecurityandCryptology SpringerChamHeidelbergNewYorkDordrechtLondon ©SpringerInternationalPublishingSwitzerland2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper SpringerInternationalPublishingAGSwitzerlandispartofSpringerScience+BusinessMedia (www.springer.com) Preface We are pleased to present the proceedings of INDOCRYPT 2015, held during December 6–9, 2015, in Bangalore, India. This was the 16th edition of the INDO- CRYPT series organized under the aegis of the Cryptology Research Society of India (CRSI). TheINDOCRYPTseriesofconferencesbeganin2000undertheleadershipofProf. Bimal Roy of Indian Statistical Institute. The submissions for INDOCRYPT 2015 were due on July 20, 2015. We received 60 submissions from which, after a careful review and discussion process, 19 were selected for the conference proceedings. Thereviewprocesswasconductedintwostages:Inthefirststage,mostpaperswere reviewed by at least three committee members. In the second phase, which lasted for about two weeks, online discussion took place in order to decide on the acceptance of the submissions. During the review process the Program Committee was helped by a team of 65 external reviewers. WewouldliketothanktheProgramCommitteemembersandtheexternalreviewers forsharingtheirexpertiseandgivingeverypaperafairassessment.Thereviewprocess was done with EasyChair, which greatly simplified the process. We were delighted that Itai Dinur, Sanjam Garg, Seny Kamara, Alon Rosen, and PalashSarkaragreedtodeliverinvitedtalksonseveralinterestingtopicsofrelevanceto INDOCRYPT. WewerealsopleasedtohaveYevgeniy DodisandManoj Prabhakarandelivertwo tutorials as part of the conference. WethanktheGeneralChairsSatyaLokamandSanjayBurmanaswellastheteams DRDO and the National Mathematics Initiative at the Indian Institute of Science, Bangalore,fortheirhardworkandtakingcareofallthelocalorganizationmatters for the conference. We are especially grateful to our sponsors for their generous support of the conference. WeacknowledgeSpringerfortheiractivecooperationandtimelyproductionofthe proceedings. Finally we thank all the authors who submitted papers to the INDO- CRYPT2015,andalltheattendees.Wehopeyouenjoytheproceedingsofthisyear’s INDOCRYPT conference. December 2015 Alex Biryukov Vipul Goyal Organization Program Committee Alex Biryukov University of Luxembourg (Program Co-chair), Luxembourg Vipul Goyal Microsoft Research India (Program Co-chair), India Adam O’Neill Georgetown University, USA Frederik Armknecht University of Mannheim, Germany Arpita Patra IISc Bangalore, India Rishiraj Bhattacharyya R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, India Bhavana Kanukurthi IISc Bangalore, India Céline Blondeau Aalto University, School of Science and Technology, Finland Anne Canteaut Inria, France Itai Dinur Ecole Normale Superieure, Paris, France Divya Gupta UCLA, USA Pierre-Alain Fouque Université de Rennes, France David Galindo Scytl Secure Electronic Voting, Spain Goutam Paul Cryptology and Security Research Unit, Indian Statistical Institute, Kolkata, India Hemanta Maji Purdue University, USA Charanjit Jutla IBM Research, USA Kannan Srinathan IIIT Hyderabad, India Gregor Leander Horst Gortz University for IT Security, Ruhr-Universität Bochum, Germany Gaëtan Leurent Inria, France Stefan Mangard IAIK, Graz University of Technology, Austria Willi Meier FHNW, Switzerland Michael Naehrig Microsoft Research Redmond, USA David Naccache Ecole Normale Superieure, Paris, France Ivica Nikolic Nanyang Technological University, Singapore Nishanth Chandran Microsoft Research, India Omkant Pandey University of California, Berkeley, USA Pandu Rangan IIT Madras, India Josef Pieprzyk Queensland University of Technology, Australia Pratyay Mukherjee Aarhus University, Denmark Emmanuel Prouff ANSSI, France Christian Rechberger Technical University of Denmark, Denmark Sanjit Chatterjee IISc Bangalore, India VIII Organization Palash Sarkar Applied Statistics Unit, Indian Statistical Institute, India Shweta Agrawal IIT Delhi, India Somitra Sanadhya IIIT Delhi, India Sourav Sen Gupta R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, India Francois-Xavier CTEAM/ELEN/Crypto Group, Université catholique de Standaert Louvain, Belgium Sushmita Ruj Cryptology and Security Research Unit, Indian Statistical Institute, Kolkata, India Ingrid Verbauwhede KU Leuven ESAT/COSIC and iMind, Belgium Hongjun Wu Nanyang Technological University, Singapore Additional Reviewers Agrawal, Shashank Koppula, Venkata Badrinarayanan, Saikrishna Maghrebi, Houssem Balasch, Josep Mendel, Florian Chakraborti, Avik Mikhalev, Vasily Chakraborty, Kaushik Mukherjee, Imon Chattopadhyay, Anupam Müller, Christian Chattopadhyay, Eshan Poussier, Romain Choudhury, Ashish Ramanna, Somindu C. De Santis, Fabrizio Rangan, C. Deshpande, Apoorvaa Regazzoni, Francesco Dobraunig, Christoph Roy, Arnab Dutta, Avijit Sarkar, Pinaki Feix, Benoit Sengupta, Binanda Fuhr, Thomas Sim, Siang Meng Fuller, Ben Sinha Roy, Sujoy Ghosh, Mohona Striecks, Christoph Gruss, Daniel Thillard, Adrian Jati, Arpan Tiessen, Tyge Journault, Anthony Varici, Kerem Järvinen, Kimmo Vasudevan, Prashant Karpman, Pierre Venelli, Alexandre Keelveedhi, Sriram Vivek, Sree Khalid, Ayesha Wentao, Zhang Khurana, Dakshita Zhang, Guoyan Koelbl, Stefan Abstracts of Invited Talks On Randomness, Codes and Extractors in Cryptography Yevgeniy Dodis1 Department ofComputer Science, NewYork University,USA [email protected] Abstract. We survey several recent advances in information-theoretic cryp- tography, such as cryptography with imperfect randomness, randomness extractors, leftover hashlemmaandnon-malleable extractors/codes.