Lecture Notes in Computer Science 6055

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 4454

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 7480

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 6035

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5665

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4797

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 3376

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 3557

Research Reports ESPRIT

Lecture Notes in Computer Science 5580

Lecture Notes in Computer Science 7118

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 6737

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 4593

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6280

Lecture Notes in Computer Science

Lecture Notes in Computer Science 7149

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 5443

German Yearbook on Business History 1986

Lecture Notes in Computer Science 4964

Lecture Notes in Computer Science 7679

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 5438

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 9230

Welcome to Workshop Designing Collaborative Interactive Spaces for e Creativity, e Science and e Learning AVI 2012, Capri, Italy, May 25 th.

Process Maturity Profile

Lecture Notes in Computer Science 3925

Codes, Cryptology, and Information Security

Lecture Notes in Computer Science 5581

SERGIU KLAINERMAN CURRICULUM VITAE

Process Maturity Profile

Lecture Notes in Computer Science 6498

Member of ANR project High Performance Algebraic Computing (HPAC)

Lecture Notes in Artificial Intelligence

A Bibliography of Books about REDUCE

Higher Densities No Sprawl: Master Plan for the City of Ramat-Gan, Israel

CURRICULUM VITAE Michael (Michail) Th. Rassias

Lecture Notes in Computer Science 4547

E M U L O V BREPOLS

Lecture Notes in Computer Science 8031

Lecture Notes in Computer Science 5203

This page intentionally left blank

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Process Maturity Profile

CAMERON, RONDO E. Rondo E. Cameron papers,

5 th International Conference on Material Modelling

Lecture Notes in Computer Science 9596

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 7073

Curriculum Vitae. December 2, 2015

ISNI. International Society of Neuroimmunology PROFILE 2013

Proceedings & Companion WikiSym 07, ISMM 07, HPC-GECO/CompFrame 07, DLS 07

Lecture Notes in Computer Science 7189

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 6815

Lecture Notes in Computer Science 6084

Lecture Notes in Computer Science 4006

My Life with Eggs: Forty Years On

RTS & HUMANITIES CITATION INDEX - ASIAN STUDIES JOURNAL LIST Total journals: ARTIBUS ASIAE

Computers in Building: Proceedings of the CAADfutures'99 Conference

Transcription:

Lecture Notes in Computer Science 6055 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Daniel J. Bernstein Tanja Lange (Eds.) Progress in Cryptology AFRICACRYPT 2010 Third International Conference on Cryptology in Africa Stellenbosch, South Africa, May 3-6, 2010 Proceedings 13

Volume Editors Daniel J. Bernstein University of Illinois at Chicago Department of Computer Science Chicago, IL 60607 7045, USA E-mail: djb@cr.yp.to Tanja Lange Eindhoven University of Technology Department of Mathematics and Computer Science Den Dolech 2, 5612 AZ Eindhoven, The Netherlands E-mail: tanja@hyperelliptic.org Library of Congress Control Number: 2010924884 CR Subject Classification (1998): E.3, C.2, K.6.5, D.4.6, J.1, H.4 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-12677-4 Springer Berlin Heidelberg New York ISBN-13 978-3-642-12677-2 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180

Preface Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3 6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeply thankful that they agreed to host Africacrypt 2010 with only four months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors submitting papers were required to register titles and abstracts by the first deadline, January 5. A total of 121 submissions had been received by this deadline, although some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee members began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and began in-depth reviews of 82 submissions. Most of the reviews were completed by February 7, the beginning of the discussion phase. Program Committee members were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 additional comments. The submissions, reviews, and subsequent discussions were handled smoothly by ichair. On February 21 we sent out 2 notifications of conditional acceptance and 24 notifications of unconditional acceptance. The next day we sent out comments from the reviewers. One paper eventually met its acceptance conditions; the final program contained 25 contributed papers and 3 invited talks. The authors prepared final versions of the 25 contributed papers by February 28. It is our pleasure to thank the other 53 Program Committee members for lending their expertise to Africacrypt 2010 and for putting tremendous effort into detailed reviews and discussions. We would also like to thank Thomas Baignères and Matthieu Finiasz for writing the ichair software; Springer for agreeing to an accelerated schedule for printing the proceedings; 70 external referees who reviewed individual papers upon request from the Program Committee; and, most importantly, all authors for submitting interesting new research papers to Africacrypt 2010. May 2010 Daniel J. Bernstein and Tanja Lange Program Chairs, Africacrypt 2010

Organization General Chairs Riaal Domingues Christine Swart South African Communications and Security Agency University of Cape Town, South Africa Program Chairs Daniel J. Bernstein Tanja Lange University of Illinois at Chicago, USA Technische Universiteit Eindhoven, The Netherlands Program Committee Michel Abdalla Roberto Avanzi Hatem M. Bahig Paulo S.L.M. Barreto Lejla Batina Daniel J. Bernstein Ashraf M. Bhery Peter Birkner Colin Boyd Xavier Boyen Johannes Buchmann Christophe De Cannière Chen-Mou Cheng Carlos Cid Alexander W. Dent Yvo Desmedt Christophe Doche Orr Dunkelman Matthieu Finiasz Shay Gueron Tim Güneysu Helena Handschuh Ecole Normale Superieure, France Ruhr-University Bochum, Germany Ain Shams University, Egypt University of São Paulo, Brazil Radboud University Nijmegen, The Netherlands and Katholieke Universiteit Leuven, Belgium University of Illinois at Chicago, USA Ain Shams University, Egypt Université de Versailles Saint-Quentin-en- Yvelines, France Queensland University of Technology, Australia University of Liege, Belgium TU Darmstadt, Germany Katholieke Universiteit Leuven, Belgium National Taiwan University, Taiwan Royal Holloway, University of London, UK Royal Holloway, University of London, UK University College London, UK and RCIS, AIST, Japan Macquarie University, Australia Weizmann Institute, Israel ENSTA, France University of Haifa and Intel Corporation, Israel Ruhr-University Bochum, Germany Katholieke Universiteit Leuven, Belgium and Intrinsic-ID, USA

VIII Organization Antoine Joux DGA and University of Versailles Saint-Quentin-en-Yvelines, France Marc Joye Technicolor, France Tanja Lange Technische Universiteit Eindhoven, The Netherlands Keith Martin Royal Holloway, University of London, UK Mitsuru Matsui Mitsubishi Electric, Japan David McGrew Cisco, USA Alfred Menezes University of Waterloo, Canada Michele Mosca University of Waterloo, Canada Michael Naehrig Microsoft Research, USA Abderrahmane Nitaj Université de Caen, France Elisabeth Oswald University of Bristol, UK Christof Paar Ruhr-University Bochum, Germany Daniel Page University of Bristol, UK Josef Pieprzyk Macquarie University, Australia Bart Preneel Katholieke Universiteit Leuven, Belgium Christian Rechberger Katholieke Universiteit Leuven, Belgium Magdy Saeb Arab Academy for Science, Technology & Maritime Transport, Egypt Palash Sarkar Indian Statistical Institute, India Berry Schoenmakers Technische Universiteit Eindhoven, The Netherlands Michael Scott Dublin City University, Ireland Nicolas Sendrier INRIA, France Francesco Sica University of Calgary, Canada Martijn Stam EPFL, Switzerland François-Xavier Standaert Universite catholique de Louvain, Belgium Damien Stehlé CNRS, France; University of Sydney and Macquarie University, Australia Christine Swart University of Cape Town, South Africa Mike Szydlo Akamai, USA Brent Waters University of Texas at Austin, USA Michael J. Wiener Cryptographic Clarity, Canada Bo-Yin Yang Academia Sinica, Taiwan Amr M. Youssef Concordia University, Canada Paul Zimmermann INRIA Nancy - Grand Est, France Referees Martin Albrecht Daniel Augot Timo Bartkewitz Gaetan Bisson Carlo Blundo Andre Bogdanov Ignacio Cascudo Julien Cathalo Emanuele Cesena Kishan C. Gupta Rafik Chaabouni Pascale Charpin Melissa Chase Sanjit Chatterjee Sherman Chow

Organization IX Iwen Coisel Baudoin Collard Ronald Cramer Özgür Dagdelen Erik Dahmen Benne de Weger Sebastian Faust Georg Fuchsbauer David Galindo Juan A. Garay Flavio Garcia Matthew Green Jens Groth Darrel Hankerson Mathias Herrmann Dennis Hofheinz Vangelis Karatsiolis Eike Kiltz Alptekin Küpçü Yann Laigle-Chapuy Lucie Langer Gregor Leander Kerstin Lemke-Rust Benoît Libert Mark Manulis Gregory Neven Claudio Orlandi David Oswald Pascal Paillier Christiane Peters Christophe Petit Francesco Regazzoni Alfredo Rial Maike Ritzenhofen Bill Rosgen Markus Rückert Ulrich Ruhrmair Rei Safavi-Naini Dominique Schröder Peter Schwabe Jun Shao Marcos A. Simplício Jr Dave Singelee Douglas Stebila Douglas Stinson Enrico Thomae Michael Tunstall Pim Tuyls Berkant Ustaoglu Marion Videau Christian Wachsmann Bogdan Warinschi Christopher Wolf Qiushi Yang Hong-Sheng Zhou

Table of Contents Signatures A New RSA-Based Signature Scheme... 1 Sven Schäge and Jörg Schwenk Fair Blind Signatures without Random Oracles... 16 Georg Fuchsbauer and Damien Vergnaud Fair Partially Blind Signatures... 34 Markus Rückert and Dominique Schröder Attacks Parallel Shortest Lattice Vector Enumeration on Graphics Cards... 52 Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, and Bart Preneel Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F 2... 69 Johannes Buchmann, Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam Mohamed Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits... 82 Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta Protocols Proofs of Restricted Shuffles... 100 Björn Terelius and Douglas Wikström Batch Range Proof for Practical Small Ranges... 114 Kun Peng and Feng Bao Optimistic Fair Priced Oblivious Transfer... 131 Alfredo Rial and Bart Preneel Networks Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes... 148 Takenobu Seito, Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto

XII Table of Contents Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes... 166 Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-Naini Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience... 184 Arpita Patra, Ashish Choudhury, and C. Pandu Rangan Elliptic Curves Avoiding Full Extension Field Arithmetic in Pairing Computations... 203 Craig Costello, Colin Boyd, Juan Manuel González Nieto, and Kenneth Koon-Ho Wong ECC2K-130 on Cell CPUs... 225 Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe Side-Channel Attacks and Fault Attacks Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator... 243 M. Abdelaziz Elaabid and Sylvain Guilley Differential Fault Analysis of HC-128... 261 Aleksandar Kircanski and Amr M. Youssef Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices... 279 Marcel Medwed, François-Xavier Standaert, Johann Großschädl, and Francesco Regazzoni Public-Key Encryption Strong Cryptography from Weak Secrets: Building Efficient PKE and IBE from Distributed Passwords... 297 Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, and David Pointcheval Efficient Unidirectional Proxy Re-Encryption... 316 Sherman S.M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions... 333 David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder

Table of Contents XIII Keys and PUFs Flexible Group Key Exchange with On-demand Computation of Subgroup Keys... 351 Michel Abdalla, Céline Chevalier, Mark Manulis, and David Pointcheval Quantum Readout of Physical Unclonable Functions... 369 Boris Škorić Ciphers and Hash Functions Parallelizing the Camellia and SMS4 Block Ciphers... 387 Huihui Yap, Khoongming Khoo, and Axel Poschmann Improved Linear Differential Attacks on CubeHash... 407 Shahram Khazaei, Simon Knellwolf, Willi Meier, and Deian Stefan Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512... 419 Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, and Martin Schläffer Author Index... 437