Lecture Notes in Computer Science 4883

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 5004

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Detection of Intrusions and Malware, and Vulnerability Assessment

Research Reports ESPRIT

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 6035

Emotional Engineering Volume 5

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 9804

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 8036

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 8031

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 3897

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 5284

Lecture Notes in Artificial Intelligence 4327

German Yearbook on Business History 1986

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 7149

The Archaeology of Anxiety

Lecture Notes in Computer Science 6705

Lecture Notes in Computer Science 6647

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 10852

Lecture Notes in Computer Science 7744

STUDIES IN ORGANIZED CRIME

Higher Densities No Sprawl: Master Plan for the City of Ramat-Gan, Israel

Curriculum Vitæ et Studiorum. Paolo D Arco

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 4006

Lecture Notes in Computer Science

CURRICULUM VITAE Michael (Michail) Th. Rassias

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 6280

Curriculum Vitæ et Studiorum. Paolo D Arco

Lecture Notes in Computer Science 7734

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 9249

Lecture Notes in Computer Science 6084

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 9596

Lecture Notes in Computer Science 3061

The Analytic Hierarchy Process. M. En C. Eduardo Bustos Farías

ISNI. International Society of Neuroimmunology PROFILE 2013

Lecture Notes in Computer Science 7679

This page intentionally left blank

Lecture Notes in Computer Science 7309

Lecture Notes in Computer Science 4935

Lecture Notes in Computer Science 6092

REPORT OF THE TELSIKS 2001 CONFERENCE

Lecture Notes in Computer Science 5978

SERGIU KLAINERMAN CURRICULUM VITAE

Lecture Notes in Artificial Intelligence

Early Modern Philosophers and the Renaissance Legacy

Lecture Notes in Computer Science 3925

Advances in Cryptology EUROCRYPT 2001

CONTEMPORARY MATHEMATICS

Lecture Notes in Computer Science 6527

Lecture Notes in Computer Science 7137

Lecture Notes in Computer Science 6815

L.O. Hertzberger, University of Amsterdam, The Netherland, T. Kanade, CMU, Pittsburg, USA

Lecture Notes in Computer Science 7384

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

Housing markets, wealth and the business cycle

Lecture Notes in Computer Science 7189

Ulrik M. Nyman - Curriculum Vitæ

Lecture Notes in Computer Science

The Founders of Index Theory

Studies in Epistemology, Logic, Methodology, and Philosophy of Science

Curriculum Vitae for Marlis Buchman

Transcription:

Lecture Notes in Computer Science 4883 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Yvo Desmedt (Ed.) Information Theoretic Security Second International Conference, ICITS 2007 Madrid, Spain, May 25-29, 2007 Revised Selected Papers 13

Volume Editor Yvo Desmedt Department of Computer Science University College London Gower Street, London WC1E 6BT, UK E-mail: y.desmedt@cs.ucl.ac.uk Library of Congress Control Number: 2009938103 CR Subject Classification (1998): E.3, D.4.6, F.2.1, C.2, K.4.4, K.6.5 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-10229-8 Springer Berlin Heidelberg New York ISBN-13 978-3-642-10229-5 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2009 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12787302 06/3180 543210

Preface ICITS 2007, the Second International Conference on Information Theoretic Security, was held in Madrid, Spain, May 25-29, 2007. The first one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005, Japan). The General Chair of ICITS 2007, Javier Lopez, and the Organizing Committee were responsible for local organization, registration, etc. Modern unclassified research on cryptography started with Shannon s work on cryptography using information theory. Since then we have seen several research topics studied, requiring information theoretical security, also called unconditional security. Examples are anonymity, authenticity, reliable and private networks, secure multi-party computation, traitor tracing, etc. Moreover, we have also seen that coding as well as other aspects of information theory have been used in the design of cryptographic schemes. In the last few years there have been plenty of conferences and workshops on specialized topics in cryptography. Examples are CHES, FSE, PKC and TCC. In view of the multitude of topics in cryptography requiring information theoretical security or using information theory, it is time to have a regular conference on this topic. This was first realized by Prof. Imai (then at University of Tokyo, Japan), who organized the first event in October 2005. The goal is to continue this event on a regular basis. There were 26 papers submitted to ICITS 2007, of which one was withdrawn. Of the remaining ones, 13 were accepted. Ueli Maurer was the invited keynote speaker on Random Systems: Theory and Applications. The other invited speakers were Amos Beimel, on On Linear, Non-linear and Weakly-Private Secret Sharing Scheme, Iordanis Kerenidis on An Introduction to Quantum Information Theory, Eyal Kushilevitz on Zero-Knowledge from Secure Multiparty Computation, Renato Renner on Can We Justify the i.i.d. Assumption?, Junji Shikata on Construction Methodology of Unconditionally Secure Signature Schemes, Alain Tapp on Anonymous Quantum Message Transmission, and Raymond Yeung on Network Coding and Information Security. The proceedings contain the slightly revised versions of the accepted papers and summaries of the keynote address and some invited papers. Each submitted paper was sent to at least three members of the Program Committee for comments. Revisions were not checked for correctness on their scientific aspects and the authors bear full responsibility for the contents of their papers. The invited talks were not refereed. I am very grateful to the members of the Program Committee for their hard work and the difficult task of selecting roughly 1 out of 2 of the submitted papers. Submissions to ICITS 2007 were required to be anonymous. Papers submitted

VI Preface by members of the Program Committee were sent to at least five referees (and, of course, no Program Committee member reviewed his or her own paper). The following external referees helped the Program Committee in reaching their decisions: Masucci Barbara, Anne Broadbent, Ingemar Cox, José Manuel Fernandez, Robbert de Haan, Goichiro Hanaoka, Tetsu Iwata, Kazukuni Kobara, Hiroki Koga, Thomas Martin, David Mireles-Morales, Maura Paterson, Krzysztof Pietrzak, Dominik Raub, Junji Shikata, Kazuhiro Suzuki, Alain Tapp, Yongge Wang, Takashi Satoh, Alain Tapp, Juerg Wullschleger, Frédéric Dupuis. (I apologize for any possible omission.) The Program Committee appreciates their effort. Thanks to the Organizing Committee, for maintaining the website of the conference, the registration, and the services corresponding to a conference. Neil Marjoram is thanked for setting up ichair and the e-mail address for submissionrelated issues for ICITS. Several people helped the General Chair with sending out the call for papers, registration, etc. I would also like to thank the General Chair for all his advice. Also, special thanks to Gilles Brassard for helping to format the preproceedings. Finally, I would like to thank everyone who submitted to ICITS 2007. September 2009 Yvo Desmedt

ICITS 2007 Second International Conference on Information Theoretic Security May 25-29, 2007 General Chair Javier Lopez University of Malaga, Spain Conference Chair Arturo Ribagorda Garnacho Local Co-chairs Julio César Hernández Castro Maria Isabel González Vasco Universidad Rey Juan Carlos, Spain Program Chair Yvo Desmedt University College London, UK Program Committee Carlo Blundo Gilles Brassard Ronald Cramer Matthias Fitzi Hideki Imai Kaoru Kurosawa Keith Martin Rei Safavi-Naini Doug Stinson Stefan Wolf Moti Yung Yuliang Zheng University of Salerno, Italy University of Montreal, Canada CWI, The Netherlands Århus University, Denmark National Institute of Advanced Industrial Science and Technology, Japan Ibaraki University, Japan Royal Holloway, UK University of Calgary, Canada University of Waterloo, Canada ETH, Switzerland RSA & Columbia University, USA University of North Carolina, USA

VIII Organization Steering Committee Carlo Blundo Gilles Brassard Ronald Cramer Yvo Desmedt, Chair Hideki Imai Kaoru Kurosawa Ueli Maurer Rei Safavi-Naini Doug Stinson Moti Yung Yuliang Zheng University of Salerno, Italy University of Montreal, Canada CWI, The Netherlands University College London, UK National Institute of Advanced Industrial Science and Technology, Japan Ibaraki University, Japan ETH, Switzerland University of Calgary, Canada University of Waterloo, Canada RSA & Columbia University, USA University of North Carolina, USA Organizing Committee Julio César Hernández Castro Maria Isabel González Vasco Ana Isabel González-Tablas Javier Lopez Arturo Ribagorda Garnacho Universidad Rey Juan Carlos, Spain University of Malaga, Spain Universidad Carlos III de Madrid Spain

Table of Contents Authentication I Commitment and Authentication Systems... 1 Alexandre Pinto, André Souto, Armando Matos, and Luís Antunes Unconditionally Secure Blind Signatures... 23 Yuki Hara, Takenobu Seito, Junji Shikata, and Tsutomu Matsumoto Keynote Lecture Random Systems: Theory and Applications... 44 Ueli Maurer Group Cryptography Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation... 46 Paolo D Arco and Alfredo De Santis Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement... 65 Renato Renner, Stefan Wolf, and Jürg Wullschleger Improvement of Collusion Secure Convolutional Fingerprinting Information Codes... 76 Joan Tomàs-Buliart, Marcel Fernandez, and Miguel Soriano Private and Reliable Message Transmission On Exponential Lower Bound for Protocols for Reliable Communication in Networks... 89 K. Srinathan, C. Pandu Rangan, and R. Kumaresan Almost Secure (1-Round, n-channel) Message Transmission Scheme... 99 Kaoru Kurosawa and Kazuhiro Suzuki Invited Talk Construction Methodology of Unconditionally Secure Signature Schemes... 113 Junji Shikata

X Table of Contents Authentication II New Results on Unconditionally Secure Multi-receiver Manual Authentication... 115 Shuhong Wang and Reihaneh Safavi-Naini Unconditionally Secure Chaffing-and-Winnowing for Multiple Use... 133 Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, and Hideki Imai Invited Talk Introduction to Quantum Information Theory... 146 Iordanis Kerenidis Secret Sharing Strongly Multiplicative Hierarchical Threshold Secret Sharing... 148 Emilia Käsper, Ventzislav Nikov, and Svetla Nikova Secret Sharing Comparison by Transformation and Rotation... 169 Tord Ingolf Reistad and Tomas Toft Invited Talk Anonymous Quantum Communication (Extended Abstract)... 181 Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, and Alain Tapp Applications of Information Theory Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation... 183 Hideki Imai, Kirill Morozov, and Anderson C.A. Nascimento Cryptographic Security of Individual Instances... 195 L. Antunes, S. Laplante, A. Pinto, and L. Salvador Author Index... 211