Lecture Notes in Computer Science 6055 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
Daniel J. Bernstein Tanja Lange (Eds.) Progress in Cryptology AFRICACRYPT 2010 Third International Conference on Cryptology in Africa Stellenbosch, South Africa, May 3-6, 2010 Proceedings 13
Volume Editors Daniel J. Bernstein University of Illinois at Chicago Department of Computer Science Chicago, IL 60607 7045, USA E-mail: djb@cr.yp.to Tanja Lange Eindhoven University of Technology Department of Mathematics and Computer Science Den Dolech 2, 5612 AZ Eindhoven, The Netherlands E-mail: tanja@hyperelliptic.org Library of Congress Control Number: 2010924884 CR Subject Classification (1998): E.3, C.2, K.6.5, D.4.6, J.1, H.4 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-12677-4 Springer Berlin Heidelberg New York ISBN-13 978-3-642-12677-2 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180
Preface Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3 6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeply thankful that they agreed to host Africacrypt 2010 with only four months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors submitting papers were required to register titles and abstracts by the first deadline, January 5. A total of 121 submissions had been received by this deadline, although some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee members began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and began in-depth reviews of 82 submissions. Most of the reviews were completed by February 7, the beginning of the discussion phase. Program Committee members were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 additional comments. The submissions, reviews, and subsequent discussions were handled smoothly by ichair. On February 21 we sent out 2 notifications of conditional acceptance and 24 notifications of unconditional acceptance. The next day we sent out comments from the reviewers. One paper eventually met its acceptance conditions; the final program contained 25 contributed papers and 3 invited talks. The authors prepared final versions of the 25 contributed papers by February 28. It is our pleasure to thank the other 53 Program Committee members for lending their expertise to Africacrypt 2010 and for putting tremendous effort into detailed reviews and discussions. We would also like to thank Thomas Baignères and Matthieu Finiasz for writing the ichair software; Springer for agreeing to an accelerated schedule for printing the proceedings; 70 external referees who reviewed individual papers upon request from the Program Committee; and, most importantly, all authors for submitting interesting new research papers to Africacrypt 2010. May 2010 Daniel J. Bernstein and Tanja Lange Program Chairs, Africacrypt 2010
Organization General Chairs Riaal Domingues Christine Swart South African Communications and Security Agency University of Cape Town, South Africa Program Chairs Daniel J. Bernstein Tanja Lange University of Illinois at Chicago, USA Technische Universiteit Eindhoven, The Netherlands Program Committee Michel Abdalla Roberto Avanzi Hatem M. Bahig Paulo S.L.M. Barreto Lejla Batina Daniel J. Bernstein Ashraf M. Bhery Peter Birkner Colin Boyd Xavier Boyen Johannes Buchmann Christophe De Cannière Chen-Mou Cheng Carlos Cid Alexander W. Dent Yvo Desmedt Christophe Doche Orr Dunkelman Matthieu Finiasz Shay Gueron Tim Güneysu Helena Handschuh Ecole Normale Superieure, France Ruhr-University Bochum, Germany Ain Shams University, Egypt University of São Paulo, Brazil Radboud University Nijmegen, The Netherlands and Katholieke Universiteit Leuven, Belgium University of Illinois at Chicago, USA Ain Shams University, Egypt Université de Versailles Saint-Quentin-en- Yvelines, France Queensland University of Technology, Australia University of Liege, Belgium TU Darmstadt, Germany Katholieke Universiteit Leuven, Belgium National Taiwan University, Taiwan Royal Holloway, University of London, UK Royal Holloway, University of London, UK University College London, UK and RCIS, AIST, Japan Macquarie University, Australia Weizmann Institute, Israel ENSTA, France University of Haifa and Intel Corporation, Israel Ruhr-University Bochum, Germany Katholieke Universiteit Leuven, Belgium and Intrinsic-ID, USA
VIII Organization Antoine Joux DGA and University of Versailles Saint-Quentin-en-Yvelines, France Marc Joye Technicolor, France Tanja Lange Technische Universiteit Eindhoven, The Netherlands Keith Martin Royal Holloway, University of London, UK Mitsuru Matsui Mitsubishi Electric, Japan David McGrew Cisco, USA Alfred Menezes University of Waterloo, Canada Michele Mosca University of Waterloo, Canada Michael Naehrig Microsoft Research, USA Abderrahmane Nitaj Université de Caen, France Elisabeth Oswald University of Bristol, UK Christof Paar Ruhr-University Bochum, Germany Daniel Page University of Bristol, UK Josef Pieprzyk Macquarie University, Australia Bart Preneel Katholieke Universiteit Leuven, Belgium Christian Rechberger Katholieke Universiteit Leuven, Belgium Magdy Saeb Arab Academy for Science, Technology & Maritime Transport, Egypt Palash Sarkar Indian Statistical Institute, India Berry Schoenmakers Technische Universiteit Eindhoven, The Netherlands Michael Scott Dublin City University, Ireland Nicolas Sendrier INRIA, France Francesco Sica University of Calgary, Canada Martijn Stam EPFL, Switzerland François-Xavier Standaert Universite catholique de Louvain, Belgium Damien Stehlé CNRS, France; University of Sydney and Macquarie University, Australia Christine Swart University of Cape Town, South Africa Mike Szydlo Akamai, USA Brent Waters University of Texas at Austin, USA Michael J. Wiener Cryptographic Clarity, Canada Bo-Yin Yang Academia Sinica, Taiwan Amr M. Youssef Concordia University, Canada Paul Zimmermann INRIA Nancy - Grand Est, France Referees Martin Albrecht Daniel Augot Timo Bartkewitz Gaetan Bisson Carlo Blundo Andre Bogdanov Ignacio Cascudo Julien Cathalo Emanuele Cesena Kishan C. Gupta Rafik Chaabouni Pascale Charpin Melissa Chase Sanjit Chatterjee Sherman Chow
Organization IX Iwen Coisel Baudoin Collard Ronald Cramer Özgür Dagdelen Erik Dahmen Benne de Weger Sebastian Faust Georg Fuchsbauer David Galindo Juan A. Garay Flavio Garcia Matthew Green Jens Groth Darrel Hankerson Mathias Herrmann Dennis Hofheinz Vangelis Karatsiolis Eike Kiltz Alptekin Küpçü Yann Laigle-Chapuy Lucie Langer Gregor Leander Kerstin Lemke-Rust Benoît Libert Mark Manulis Gregory Neven Claudio Orlandi David Oswald Pascal Paillier Christiane Peters Christophe Petit Francesco Regazzoni Alfredo Rial Maike Ritzenhofen Bill Rosgen Markus Rückert Ulrich Ruhrmair Rei Safavi-Naini Dominique Schröder Peter Schwabe Jun Shao Marcos A. Simplício Jr Dave Singelee Douglas Stebila Douglas Stinson Enrico Thomae Michael Tunstall Pim Tuyls Berkant Ustaoglu Marion Videau Christian Wachsmann Bogdan Warinschi Christopher Wolf Qiushi Yang Hong-Sheng Zhou
Table of Contents Signatures A New RSA-Based Signature Scheme... 1 Sven Schäge and Jörg Schwenk Fair Blind Signatures without Random Oracles... 16 Georg Fuchsbauer and Damien Vergnaud Fair Partially Blind Signatures... 34 Markus Rückert and Dominique Schröder Attacks Parallel Shortest Lattice Vector Enumeration on Graphics Cards... 52 Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, and Bart Preneel Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F 2... 69 Johannes Buchmann, Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam Mohamed Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits... 82 Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta Protocols Proofs of Restricted Shuffles... 100 Björn Terelius and Douglas Wikström Batch Range Proof for Practical Small Ranges... 114 Kun Peng and Feng Bao Optimistic Fair Priced Oblivious Transfer... 131 Alfredo Rial and Bart Preneel Networks Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes... 148 Takenobu Seito, Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto
XII Table of Contents Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes... 166 Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-Naini Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience... 184 Arpita Patra, Ashish Choudhury, and C. Pandu Rangan Elliptic Curves Avoiding Full Extension Field Arithmetic in Pairing Computations... 203 Craig Costello, Colin Boyd, Juan Manuel González Nieto, and Kenneth Koon-Ho Wong ECC2K-130 on Cell CPUs... 225 Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe Side-Channel Attacks and Fault Attacks Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator... 243 M. Abdelaziz Elaabid and Sylvain Guilley Differential Fault Analysis of HC-128... 261 Aleksandar Kircanski and Amr M. Youssef Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices... 279 Marcel Medwed, François-Xavier Standaert, Johann Großschädl, and Francesco Regazzoni Public-Key Encryption Strong Cryptography from Weak Secrets: Building Efficient PKE and IBE from Distributed Passwords... 297 Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, and David Pointcheval Efficient Unidirectional Proxy Re-Encryption... 316 Sherman S.M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions... 333 David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder
Table of Contents XIII Keys and PUFs Flexible Group Key Exchange with On-demand Computation of Subgroup Keys... 351 Michel Abdalla, Céline Chevalier, Mark Manulis, and David Pointcheval Quantum Readout of Physical Unclonable Functions... 369 Boris Škorić Ciphers and Hash Functions Parallelizing the Camellia and SMS4 Block Ciphers... 387 Huihui Yap, Khoongming Khoo, and Axel Poschmann Improved Linear Differential Attacks on CubeHash... 407 Shahram Khazaei, Simon Knellwolf, Willi Meier, and Deian Stefan Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512... 419 Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, and Martin Schläffer Author Index... 437