Lecture Notes in Computer Science 6280

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 4728

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 7480

PROFESSIONAL EXPERIENCE Postdoc in Cryptography, Department of Computer Science, Sapienza University of Rome, Italy. Giuseppe Ateniese.

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 6663

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 4939

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 6597

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 5665

Daniele Venturi. Curriculum Vitae

Lecture Notes in Computer Science 5677

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 5443

Lecture Notes in Computer Science 4964

Krzysztof Pietrzak last updated April 22, 2016

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 6035

Research Reports ESPRIT

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 4117

Lecture Notes in Computer Science 4833

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 10644

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 4449

STUDIES IN ORGANIZED CRIME

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 6715

Lecture Notes in Computer Science 5487

April 15 19, 2012 Cambridge, UK

Lecture Notes in Artificial Intelligence 4327

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 7140

Emotional Engineering Volume 5

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 5580

Lecture Notes in Computer Science 7384

Lecture Notes in Computer Science 5581

German Yearbook on Business History 1986

Lecture Notes in Artificial Intelligence

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Curriculum Vitae Person Education Professional career

Krzysztof Pietrzak last updated November 22, 2018

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Curriculum Vitæ et Studiorum. Paolo D Arco

ISNI. International Society of Neuroimmunology PROFILE 2013

The Archaeology of Anxiety

Lecture Notes in Computer Science 6815

Fπ8, the 8 th International Symposium on Functional π-electron Systems

Lecture Notes in Computer Science 6647

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Curriculum Vitæ et Studiorum. Paolo D Arco

Lecture Notes in Computer Science

Lecture Notes in Computer Science 5284

Welcome to Workshop Designing Collaborative Interactive Spaces for e Creativity, e Science and e Learning AVI 2012, Capri, Italy, May 25 th.

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 6055

Early Modern Philosophers and the Renaissance Legacy

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 8031

Curriculum Vitae for Marlis Buchman

Lecture Notes in Computer Science 7189

Lecture Notes in Computer Science 7734

L.O. Hertzberger, University of Amsterdam, The Netherland, T. Kanade, CMU, Pittsburg, USA

Lecture Notes in Computer Science 6084

Lecture Notes in Computer Science 6705

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 3557

gpehihpcl'upn sdii-gei tim GE ng Fiae^'ban*' and pq>-er ujeibel with contributions by

Lecture Notes in Computer Science 6099

REPORT OF THE TELSIKS 2001 CONFERENCE

Intelligent Primary School Project in Italy

Transcription:

Lecture Notes in Computer Science 6280 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

Juan A. Garay Roberto De Prisco (Eds.) Security and Cryptography for Networks 7th International Conference, SCN 2010 Amalfi, Italy, September 13-15, 2010 Proceedings 13

Volume Editors Juan A. Garay AT&T Labs Research Florham Park, NJ 07932, USA E-mail: garay@research.att.com Roberto De Prisco Università di Salerno, Dipartimento di Informatica ed Applicazioni via Ponte don Melillo, 84084 Fisciano (SA), Italy E-mail: robdep@dia.unisa.it Library of Congress Control Number: 2010932603 CR Subject Classification (1998): E.3, K.6.5, D.4.6, C.2, J.1, G.2.1 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-15316-X Springer Berlin Heidelberg New York ISBN-13 978-3-642-15316-7 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180

Preface The 7th Conference on Security and Cryptography for Networks (SCN 2010) was held in Amalfi, Italy, during September 13-15, 2010. This biennial conference has traditionally been held in Amalfi, with the exception of the fifth edition which was held in nearby Maiori. This year the conference received the financial support of the Department of Informatica ed Applicazioni and of the Faculty of Science of the University of Salerno, Italy. The wide availability of computer networks, and in particular of the global Internet, offers the opportunity to perform electronically and in a distributed way a wide range of transactions. Hence, cryptography and security assume an increasingly important role in computer networks, both as critical enablers of new functionalities as well as warrantors of the mechanisms soundness and safety. The principal aim of SCN as a conference is to bring together researchers in the above fields, with the goal of fostering cooperation and exchange of ideas in the stunning Amalfi Coast setting. The conference received 94 submissions a record-high number for the SCN conference series in a broad range of cryptography and security areas, out of which 27 were accepted for publication in these proceedings on the basis of quality, originality, and relevance to the conference s scope. At least three Program Committee (PC) members out of 27 world-renowned experts in the conference s various areas of interest reviewed each submitted paper, while submissions coauthored by a PC member were subjected to the more stringent evaluation of five PC members. In addition to the PC members, many external reviewers joined the review process in their particular areas of expertise. We were fortunate to have this knowledgeable and energetic team of experts, and are deeply grateful to all of them for their hard and thorough work, which included a very active discussion phase almost as long as the initial individual reviewing period. The paper submission, review and discussion processes were effectively and efficiently made possible by the Web-Submission-and-Review software, written by Shai Halevi, and hosted by the International Association for Cryptologic Research (IACR). Many thanks to Shai for his assistance with the system s various features and constant availability. Given the perceived quality of the submissions, the PC decided this year to give a Best Paper Award, both to celebrate the science and as a general way to promote outstanding work in the fields of cryptography and security and keep encouraging high-quality submissions to SCN. Time-Specific Encryption, by Kenneth Paterson and Elizabeth Quaglia, was conferred such distinction. Recent years have witnessed a rapid and prolific development of latticeand learning with errors (LWE)-based cryptographic constructions, given the hardness and versatility of the underlying problems. The program was further

VI Preface enriched by the invited talk Heuristics and Rigor in Lattice-Based Cryptography by Chris Peikert (Georgia Institute of Technology), a world authority on the subject. We finally thank all the authors who submitted papers to this conference; the Organizing Committee members, colleagues and student helpers for their valuable time and effort; and all the conference attendees who made this event a truly intellectually stimulating one through their active participation. September 2010 Juan A. Garay Roberto De Prisco

SCN 2010 The 7th Conference on Security and Cryptography for Networks September 13-15, 2010, Amalfi, Italy Program Chair Juan A. Garay AT&T Labs Research, USA General Chair Roberto De Prisco Program Committee Xavier Boyen Christian Cachin Haowen Chan Jean-Sébastien Coron Yevgeniy Dodis Marc Fischlin Rosario Gennaro Martin Hirt Dennis Hofheinz Ari Juels Kaoru Kurosawa Tal Malkin John Mitchel David Naccache Antonio Nicolosi Jesper Nielsen Kobbi Nissim Krzysztof Pietrzak Christian Rechberger Vincent Rijmen Guy Rothblum Berry Schoenmakers Martijn Stam Vinod Vaikuntanathan University of Liege, Belgium IBM Research, Switzerland Carnegie Mellon University, USA University of Luxembourg, Luxembourg New York University, USA Darmstadt University of Technology, Germany IBM Research, USA ETH Zürich, Switzerland Karlsruhe Institute of Technology, Germany RSA Laboratories, USA Ibaraki University, Japan Columbia University, USA Stanford University, USA ENS Paris, France Stevens Institute of Technology, USA University of Aarhus, Denmark Microsoft ILDC and Ben-Gurion University, Israel CWI, The Netherlands K.U. Leuven, Belgium K.U. Leuven, Belgium and TU Graz, Austria Princeton University/IAS, USA TU Eindhoven, The Netherlands EPFL, Switzerland IBM Research, USA

VIII Organization Ivan Visconti Shabsi Walfish Hoeteck Wee Google Inc., USA Queens College, CUNY, USA Organizing Committee Aniello Castiglione Paolo D Arco Steering Committee Carlo Blundo Alfredo De Santis Ueli Maurer Rafail Ostrovsky Giuseppe Persiano Jacques Stern Douglas Stinson Gene Tsudik Moti Yung ETH Zürich, Switzerland University of California - Los Angeles, USA ENS Paris, France University of Waterloo, Canada University of California - Irvine, USA Google Inc. and Columbia University, USA External Reviewers Divesh Aggarwal Laila El Aimani Kfir Barhum Rikke Bendlin Allison Bishop Carl Bosley Kevin Bowers Christophe De Cannière Ashish Choudary Seung Geol Choi Sherman Chow Dana Dachman-Soled Özgür Dagdelen Pooya Farshim Nelly Fazio Matthias Fitzi David Freeman Eiichiro Fujisaki Robert Granger Matthew Green Jens Groth Mike Hamburg Kris Haralambiev Carmit Hazay Javier Herranz Sebastiaan Indesteege Yuval Ishai Charanjit Jutla Alexandre Karlov Jonathan Katz Shahram Khazaei Dmitry Khovratovich Kazukuni Kobara Chiu Yuen Koo Anja Lehmann Benoit Libert Adriana Lopez-Alt Christoph Lucas Philip Mackenzie Mark Manulis Breno de Medeiros Phong Nguyen Adam O Neil Cristina Onete Claudio Orlandi Onur Özen C. Pandu Rangan Le Trieu Phong Bartosz Przydatek Juraj Šarinay Alessandra Scafuro Joern-Marc Schmidt Michael Schneider Dominique Schröder Marc Stevens Björn Tackmann Aris Tentes Stefano Tessaro Tomas Toft Yevgeniy Vahlis Vincent Verneuil Enav Weinreb Daniel Wichs Vassilis Zikas

Table of Contents Encryption I Time-Specific Encryption... 1 Kenneth G. Paterson and Elizabeth A. Quaglia Public-Key Encryption with Efficient Amortized Updates... 17 Nishanth Chandran, Rafail Ostrovsky, and William E. Skeith III Generic Constructions of Parallel Key-Insulated Encryption... 36 Goichiro Hanaoka and Jian Weng Invited Talk Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)... 54 Chris Peikert Cryptanalysis Differential Fault Analysis of LEX... 55 Jianyong Huang, Willy Susilo, and Jennifer Seberry Generalized RC4 Key Collisions and Hash Collisions... 73 Jiageng Chen and Atsuko Miyaji Hash Functions On the Indifferentiability of the Grøstl Hash Function... 88 Elena Andreeva, Bart Mennink, and Bart Preneel Side Channel Attacks and Leakage Resilience Algorithmic Tamper-Proof Security under Probing Attacks... 106 Feng-Hao Liu and Anna Lysyanskaya Leakage-Resilient Storage... 121 Francesco Davì, Stefan Dziembowski, and Daniele Venturi Encryption II Searching Keywords with Wildcards on Encrypted Data... 138 Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter Hartel, and Willem Jonker

X Table of Contents Threshold Attribute-Based Signcryption... 154 Martin Gagné, Shivaramakrishnan Narayan, and Reihaneh Safavi-Naini Cryptographic Protocols I Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption... 172 Kaoru Kurosawa, Ryo Nojima, and Le Trieu Phong Improved Primitives for Secure Multiparty Integer Computation... 182 Octavian Catrina and Sebastiaan de Hoogh How to Pair with a Human... 200 Stefan Dziembowski Authentication and Key Agreement A New Security Model for Authenticated Key Agreement... 219 Augustin P. Sarr, Philippe Elbaz-Vincent, and Jean-Claude Bajard A Security Enhancement and Proof for Authentication and Key Agreement (AKA)... 235 Vladimir Kolesnikov Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model... 253 Stanis law Jarecki and Nitesh Saxena Cryptographic Primitives and Schemes Kleptography from Standard Assumptions and Applications... 271 Adam Young and Moti Yung Provably Secure Convertible Undeniable Signatures with Unambiguity... 291 Le Trieu Phong, Kaoru Kurosawa, and Wakaha Ogata History-Free Aggregate Message Authentication Codes... 309 Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, and Daniel Wagner Lattice-Based Cryptography Recursive Lattice Reduction... 329 Thomas Plantard and Willy Susilo

Table of Contents XI Adaptively Secure Identity-Based Identification from Lattices without Random Oracles... 345 Markus Rückert Groups Signatures and Authentication The Fiat Shamir Transform for Group and Ring Signature Schemes... 363 Ming Feng Lee, Nigel P. Smart, and Bogdan Warinschi Get Shorty via Group Signatures without Encryption... 381 Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, and Bogdan Warinschi Group Message Authentication... 399 Bartosz Przydatek and Douglas Wikström Cryptographic Protocols II Fast Secure Computation of Set Intersection... 418 Stanis law Jarecki and Xiaomin Liu Distributed Private-Key Generators for Identity-Based Cryptography... 436 Aniket Kate and Ian Goldberg Anonymity Solving Revocation with Efficient Update of Anonymous Credentials... 454 Jan Camenisch, Markulf Kohlweiss, and Claudio Soriente Author Index... 473