ebook img

Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings PDF

528 Pages·2013·6.069 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings

Lecture Notes in Computer Science 7778 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Kaoru Kurosawa Goichiro Hanaoka (Eds.) Public-Key Cryptography – PKC 2013 16th International Conference on Practice andTheory in Public-Key Cryptography Nara, Japan, February 26 – March 1, 2013 Proceedings 1 3 VolumeEditors KaoruKurosawa IbarakiUniversity DepartmentofComputerandInformationSciences 4-12-1Nakanarusawa,Hitachi,Ibaraki316-8511,Japan E-mail:[email protected] GoichiroHanaoka NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST) ResearchInstituteforSecureSystems(RISEC) 1-1-1Umezono,Tsukuba,Ibaraki305-8568,Japan E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-36361-0 e-ISBN978-3-642-36362-7 DOI10.1007/978-3-642-36362-7 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2013930237 CRSubjectClassification(1998):E.3,K.6.5,E.4,K.4.4,C.2.0,D.4.6,J.1 LNCSSublibrary:SL4–SecurityandCryptology ©InternationalAssociationforCryptologicResearch2013 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface PKC 2013 was held at the Nara Prefectual New Public Hall in Nara, Japan, during February 26–March1, 2013.The conference was sponsoredby the Inter- national Association for Cryptologic Research (IACR). The conference received 97 submissions (from which one submission was withdrawn), and each submission was reviewed by at least three of the 30 Program Committee members. Submissions co-authored by the Program Com- mittee members were reviewed by at least five committee members. Committee members were allowed to submit at most one paper, or two if the second one was co-authored by a student. Duetothelargenumberofhigh-qualitysubmissions,thereviewprocesswasa challengingandhardtask.After 11 weeksof extensivediscussions,the Program Committee selected28 submissionsfor presentation.The programalsoincluded two invited talks: “Functional Encryption: Origins and Recent Developments” givenbyBrentWaters,and“TechniquesforEfficientSecureComputationBased on Yao’s Protocol” given by Yehuda Lindell. On behalf of the Program Com- mittee, I would like to thank Brent and Yehuda for accepting our invitation. Therearemanypeoplewhocontributedtothe successofPKC2013.Iwould like to thank many authors from all over the world for submitting their papers. I am deeply grateful to the Program Committee for their hard work to ensure that each paper received a thorough and fair review. I gratefully acknowledge the external reviewers listed on the following pages. The committee’s work was tremendously simplified by Shai Halevi’s submission/review software. Finally many thanks go to the General Chair, Goichiro Hanaoka, for organizing the conference. March 2013 Kaoru Kurosawa Organization General Chair Goichiro Hanaoka National Institute of Advanced Industrial Science and Technology (AIST), Japan Program Chair Kaoru Kurosawa Ibaraki University, Japan Local Organizing Co-chairs Takeshi Chikazawa Information-technology Promotion Agency (IPA), Japan Ryo Nojima National Institute of Information and CommunicationsTechnology(NICT),Japan Program Committee Nuttapong Attrapadung AIST, Japan David Cash Rutgers University, USA Jean-Sebastien Coron University of Luxembourg, Luxembourg Jintai Ding University of Cincinnati, USA Stefan Dziembowski Uniwersytet Warszawski, Poland and Universita` di Roma “La Sapienza”, Italy Marc Fischlin Technische Universita¨t Darmstadt, Germany Pierre-Alain Fouque E´cole Normale Sup´erieure, France Steven Galbraith Auckland University, New Zealand Rosario Gennaro City College of New York, USA Dov Gordon Applied Communication Sciences, USA Shai Halevi IBM Research, USA Carmit Hazay Bar-Ilan University, Israel Tibor Jager Ruhr-Universita¨t Bochum, Germany Antoine Joux DGA and Universit´e de Versailles Saint-Quentin-en-Yvelines, France Eike Kiltz Ruhr-Universita¨t Bochum, Germany Noboru Kunihiro The University of Tokyo, Japan Kaoru Kurosawa Ibaraki University, Japan Allison Lewko Microsoft Research, USA Benoit Libert Technicolor, France Alexander May Ruhr-Universita¨t Bochum, Germany VIII Organization David Naccache E´cole Normale Sup´erieure, France Tatsuaki Okamoto NTT Labs, Japan Claudio Orlandi Aarhus University, Denmark Chris Peikert Georgia Institute of Technology, USA Ludovic Perret UPMC/INRIA, France Nigel Smart University of Bristol, UK Tsuyoshi Takagi Kyushu University, Japan Katsuyuki Takashima Mitsubishi Electric, Japan Vinod Vaikuntanathan University of Toronto, Canada Hoeteck Wee George Washington University, USA Steering Committee Ronald Cramer CWI, The Netherlands Yvo Desmedt The University of Texas at Dallas, USA Hideki Imai Chuo University, Japan David Naccache E´cole Normale Sup´erieure, France Tatsuaki Okamoto NTT Labs, Japan David Pointcheval E´cole Normale Sup´erieure, France Moti Yung Google and Columbia University, USA Yuliang Zheng University of North Carolina, USA External Reviewers Masayuki Abe Craig Costello Akinori Kawachi Roberto Araujo Giovanni Di Crescenzo Yutaka Kawai Gilad Asharov Christophe Doche Marcel Keller John Baena L´eo Ducas Aggelos Kiayias Rana Barua Konrad Durnoga David Kohel Mihir Bellare Sebastian Faust Hugo Krawczyk David Bernhard Nelly Fazio Fabien Laguillaumie Nir Bitansky Dario Fiore Fagen Li Olivier Blazy Robert Fitzpatrick Joseph Liu Colin Boyd David Mandell Freeman Zhen Hua Liu Elette Boyle Georg Fuchsbauer Patrik Longa Zvika Brakerski Jun Furukawa Adriana Lopez-Alt Christina Brzuska Sanjam Garg Vadim Lyubashevsky Jan Camenisch Sergey Gorbunov Mark Manulis Angelo De Caro Jens Groth Ben Martin Sanjit Chatterjee Takuya Hayashi Takahiro Matsuda Jie Chen Gottfried Herold Payman Mohassel Ashish Choudhury Dennis Hofheinz Daisuke Moriyama Sherman Chow William Skeith III Ciaran Mullan Ran Cohen Sorina Ionica Ryo Nishimaki Organization IX Adam O’Neill Thomas Sirvent Zheng Yang Dan Page Ron Steinfeld Takanori Yasuda Jiaxin Pan Mario Strefler Arkady Yerukhimovich Valerio Pastro Koutarou Suzuki Kazuki Yoneyama Kenny Paterson Chendong Tao Reo Yoshida Arpita Patra Boaz Tsaban Ching-hua Yu Thomas Peters Alexander Ushakov Jean-Christophe Christophe Petit Daniele Venturi Zapalowicz Le Trieu Phong Frederik Vercauteren Hila Zarosim Krzysztof Pietrzak Damien Vergnaud Hui Zhang David Pointcheval Bogdan Warinschi Mingwu Zhang Mike Rosulek Daniel Wichs Rui Zhang Dominique Schroeder Douglas Wikstr¨om Youwen Zhu Jacob Schuldt David Wilson Angela Zottarel Jae Hong Seo Keita Xagawa Victor Shoup Shota Yamada Sponsors International Association for Cryptologic Research (IACR), National Institute of Advanced Industrial Science and Technology (AIST), Japan, Information-technologyPromotionAgency,Japan(IPA),andNationalInstitute of Information and Communications Technology (NICT), Japan Table of Contents Homomorphic Encryption PackedCiphertexts in LWE-Based Homomorphic Encryption.......... 1 Zvika Brakerski, Craig Gentry, and Shai Halevi Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption...................................................... 14 Jonathan Katz, Aishwarya Thiruvengadam, and Hong-Sheng Zhou Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption...................................................... 32 Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, and Shota Yamada Invited Talk (1) Functional Encryption: Origins and Recent Developments ............. 51 Brent Waters Primitives Vector Commitments and Their Applications ........................ 55 Dario Catalano and Dario Fiore Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS ........................................ 73 Seung Geol Choi, Jonathan Katz, Hoeteck Wee, and Hong-Sheng Zhou Cryptography Using Captcha Puzzles............................... 89 Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, and Akshay Wadia Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications................................................. 107 San Ling, Khoa Nguyen, Damien Stehl´e, and Huaxiong Wang Functional Encryption/Signatures Decentralized Attribute-Based Signatures ........................... 125 Tatsuaki Okamoto and Katsuyuki Takashima XII Table of Contents On the Semantic Security of Functional Encryption Schemes .......... 143 Manuel Barbosa and Pooya Farshim Attribute-Based Encryption with Fast Decryption.................... 162 Susan Hohenberger and Brent Waters On RSA Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors ...................................................... 180 Noboru Kunihiro, Naoyuki Shinohara, and Tetsuya Izu Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public? ......................................................... 198 Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud, Gu´ena¨el Renault, Soline Renner, and Rina Zeitoun IBE and IPE Revocable Identity-Based Encryption Revisited: Security Model and Construction ................................................ 216 Jae Hong Seo and Keita Emura Improved (Hierarchical) Inner-Product Encryption from Lattices....... 235 Keita Xagawa Invited Talk (2) Techniques for Efficient Secure Computation Based on Yao’s Protocol ........................................................ 253 Yehuda Lindell Key Exchange Non-Interactive Key Exchange..................................... 254 Eduarda S.V. Freire, Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages ...................................................... 272 Fabrice Ben Hamouda, Olivier Blazy, C´eline Chevalier, David Pointcheval, and Damien Vergnaud Table of Contents XIII Signature Schemes I Tighter Reductions for Forward-Secure Signature Schemes ............ 292 Michel Abdalla, Fabrice Ben Hamouda, and David Pointcheval Tagged One-Time Signatures: Tight Security and Optimal Tag Size .... 312 Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, and Miyako Ohkubo Encryption Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ....................................................... 332 Takahiro Matsuda and Goichiro Hanaoka Robust Encryption, Revisited ..................................... 352 Pooya Farshim, Benoˆıt Libert, Kenneth G. Paterson, and Elizabeth A. Quaglia Sender-Equivocable Encryption Schemes Secure against Chosen- Ciphertext Attacks Revisited ...................................... 369 Zhengan Huang, Shengli Liu, and Baodong Qin Signature Schemes II Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures ......................................... 386 Nuttapong Attrapadung, Benoˆıt Libert, and Thomas Peters Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES .... 405 Ryo Nishimaki and Keita Xagawa Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies............................... 423 Kwangsu Lee, Dong Hoon Lee, and Moti Yung New Constructions and Applications of Trapdoor DDH Groups ........ 443 Yannick Seurin Protocols Rate-Limited Secure Function Evaluation: Definitions and Constructions ............................................... 461 O¨zgu¨r Dagdelen, Payman Mohassel, and Daniele Venturi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.