Lecture Notes in Computer Science 4939

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 7480

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4728

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 5978

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 5443

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 5474

Research Reports ESPRIT

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 9804

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6280

Lecture Notes in Computer Science 4833

Lecture Notes in Computer Science 6035

Detection of Intrusions and Malware, and Vulnerability Assessment

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 8341

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 2248 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 4964

CURRICULUM VITAE Michael (Michail) Th. Rassias

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 5587

Emotional Engineering Volume 5

Welcome to Workshop Designing Collaborative Interactive Spaces for e Creativity, e Science and e Learning AVI 2012, Capri, Italy, May 25 th.

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 5438

Lecture Notes in Artificial Intelligence 4327

Member of ANR project High Performance Algebraic Computing (HPAC)

Lecture Notes in Computer Science 6597

Curriculum vitae. Personal Data. Employement. Education. 8 May Date of Birth: Place of Birth: Address: Kayseri, Turkey

Lecture Notes in Computer Science 5580

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5677

9.0 SCOR-RELATED MEETINGS

German Yearbook on Business History 1986

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

5 th International Conference on Material Modelling

Lecture Notes in Computer Science 4464

Curriculum Vitae for Marlis Buchman

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 4117

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 8031

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science

Krzysztof Pietrzak last updated April 22, 2016

L.O. Hertzberger, University of Amsterdam, The Netherland, T. Kanade, CMU, Pittsburg, USA

SERGIU KLAINERMAN CURRICULUM VITAE

ISNI. International Society of Neuroimmunology PROFILE 2013

Lecture Notes in Computer Science 4935

STUDIES IN ORGANIZED CRIME

A Bibliography of Books about REDUCE

Studies in Epistemology, Logic, Methodology, and Philosophy of Science

Lecture Notes in Computer Science 5581

The Archaeology of Anxiety

Lecture Notes in Computer Science 7189

College of Business and Economics California State University, Fullerton present

Lecture Notes in Computer Science 7384

Served as civilian doing Operations Research at Headquarters, R.A.F. Bomber Command,

Progress in Mathematics Volume 95

Qualified Autonomy and Federalism versus Secession in the EU and its Member States

Lecture Notes in Computer Science 7137

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

PROFESSIONAL EXPERIENCE Postdoc in Cryptography, Department of Computer Science, Sapienza University of Rome, Italy. Giuseppe Ateniese.

Housing markets, wealth and the business cycle

CAMERON, RONDO E. Rondo E. Cameron papers,

Clara S. Chan. 100 Westchester Road Newton, MA (617) clara

Computers in Building: Proceedings of the CAADfutures'99 Conference

Yury I. Manin CURRICULUM VITAE (updated May 20, 2016)

Transcription:

Lecture Notes in Computer Science 4939 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Ronald Cramer (Ed.) Public Key Cryptography PKC 2008 11th International Workshop on Practice and Theory in Public Key Cryptography Barcelona, Spain, March 9-12, 2008 Proceedings 13

Volume Editor Ronald Cramer CWI Amsterdam and Leiden University The Netherlands E-mail: ronald.cramer@cwi.nl Library of Congress Control Number: 2008921494 CR Subject Classification (1998): E.3, F.2.1-2, C.2.0, K.4.4, K.6.5 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-540-78439-X Springer Berlin Heidelberg New York ISBN-13 978-3-540-78439-5 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com International Association for Cryptologic Research 2008 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12234431 06/3180 543210

Preface These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography PKC 2008. The workshop was held in Barcelona, Spain, March 9 12, 2008. It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the Research Group on Mathematics Applied to Cryptography at UPC, the Polytechnical University of Catalonia. The General Chair, Carles Padró, was responsible for chairing the Local Organization Committee, for handling publicity and for University attracting funding from sponsors. The PKC 2008 Program Committee (PC) consisted of 30 internationally renowned experts. Their names and affiliations are listed further on in these proceedings. By the September 7, 2007 submission deadline the PC had received 71 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, werecommittedtotheiacrwebreview System. These were taken as the starting point for the PC-wide Web-based discussion phase. During this phase, additional reports were provided as needed, and the PC eventually had some 258 reports at its disposal. In addition, the discussions generated more than 650 messages, all posted in the system. During the entire PC phase, which started on April 12, 2006 with the invitation by the PKC Steering Committee, and which continued until March 2008, more than 500 e-mail messages were communicated. Moreover, the PC received much appreciated assistance by a large body of external reviewers. Their names are also listed in these proceedings. The selection process for PKC 2008 was finalized by the end of November 2007. After notification of acceptance, the authors were provided with the review comments and were granted three weeks to prepare the final versions, which were due by December 14, 2007. These final versions were not subjected to further scrutiny by the PC and their authors bear full responsibility. The Program Committee worked hard to select a balanced, solid and interesting scientific program, and I thank them very much for their efforts. After consultation with the PC, I decided to grant the PKC 2008 Best Paper Award to Vadim Lyubashevsky (University of California at San Diego), for his paper Lattice-Based Identification Schemes Secure Under Active Attacks. Besides the above-mentioned 21 regular presentations, the PKC 2008 scientific program featured three invited speakers: David Naccache (ENS, Paris) on Cryptographic Test Correction, Jean-Jacques Quisquater (Université Catholique de Louvain) on How to Secretly Extract Hidden Secret Keys: A State of the Attacks, and Victor Shoup (New York University) on The Role of Discrete

VI Preface Logarithms in Designing Secure Crypto-Systems. David Naccache also contributed (unrefereed) notes for his lecture, which are also included in this volume. CWI 1 in Amsterdam and the Mathematical Institute at Leiden University, my employers, are gratefully acknowledged for their support. Also many thanks to Springer for their collaboration. Thanks to Shai Halevi for his IACR Web-handling system. Eike Kiltz from the CWI group, besides serving as a member of the PC, provided lots of general assistance to the Chair, particularly when setting up and running the Web system and when preparing this volume. I thank Carles Padró, PKC 2008 General Chair, for our smooth and very pleasant collaboration. Finally, we thank our sponsors the Spanish Ministery of Education and Science, and UPC. January 2008 Ronald Cramer 1 CWI is the National Research Institute for Mathematics and Computer Science in the Netherlands

PKC 2008 The 11th International Workshop on Practice and Theory in Public Key Cryptography Universitat Politècnica de Catalunya, Barcelona, Spain March 9 12, 2008 Sponsored by the International Association for Cryptologic Research (IACR) Organized in cooperation with the Research Group on Mathematics Applied to Cryptography at UPC General Chair Carles Padró, UPC, Spain Program Chair Ronald Cramer, CWI Amsterdam and Leiden University, The Netherlands Local Organizing Committee Javier López, Ignacio Gracia, Jaume Martí, Sebastià Martín, Carles Padró and Jorge L. Villar PKC Steering Committee Ronald Cramer Yvo Desmedt Hideki Imai David Naccache Tatsuaki Okamoto Jacques Stern Moti Yung Yuliang Zheng CWI and Leiden University, The Netherlands UCL, UK University of Tokyo, Japan ENS, France NTT, Japan ENS, France Columbia University and Google, USA University of North Carolina, USA

VIII Organization Program Committee Michel Abdalla Masayuki Abe Alexandra Boldyreva Jung Hee Cheon Ronald Cramer Matthias Fitzi Matthew Franklin Steven Galbraith Juan A. Garay Rosario Gennaro Craig Gentry Kristian Gjøsteen Maria I. González Vasco Jens Groth Yuval Ishai Eike Kiltz Kaoru Kurosawa Wenbo Mao Alexander May Jesper Buus Nielsen Berry Schoenmakers abhi shelat Victor Shoup Martijn Stam Rainer Steinwandt Tsuyoshi Takagi Edlyn Teske Ramarathnam Venkatesan Jorge Villar Santos Moti Yung ENS, France NTT, Japan Georgia Tech, USA Seoul National University, South Korea CWI and Leiden University, The Netherlands ETH, Switzerland UC Davis, USA Royal Holloway, UK Bell Labs, USA IBM Research, USA Stanford University, USA NTNU, Norway University Rey Juan Carlos, Spain UCL, UK Technion, Israel and UCLA, USA CWI, The Netherlands Ibaraki University, Japan HP Labs, China University of Bochum, Germany Aarhus University, Denmark TU Eindhoven, The Netherlands University of Virginia, USA New York University, USA EPFL, Switzerland Florida Atlantic University, USA Future University of Hakodate, Japan University Waterloo, Canada Microsoft, USA & India UPC, Spain Columbia University and Google, USA External Reviewers Toru Akishita Jean-Luc Beuchat Raghav Bhaskar Johannes Blömer David Cash Nishanth Chandran Carlos Cid Iwan Duursma Serge Fehr Marc Fischlin Pierre-Alain Fouque Jun Furukawa Phong Nguyen Nicolas Gama Willi Geiselmann Kenneth Giuliani Jason Gower Nishanth Chandran Vipul Goyal Matt Green Sang Geun Hahn Daewan Han Goichiro Hanaoka Darrel Hankerson Anwar Hasan Swee-Huay Heng Nick Howgrave-Graham David Jao Marc Joye Waldyr Benits Jr.

Organization IX Pascal Junod Charanjit Jutla Marcelo Kaihara Alexandre Karlov Kil-Chan Ha Noboru Kunihiro Tanja Lange Mun-Kyu Lee Arjen K. Lenstra Jun Li Alptekin Küpçü Anna Lysyanskaya Daniele Micciancio David Mireles Peter Montgomery Gregory Neven Dan Page Omkant Pandey Jehong Park Sylvain Pasini Kenny Paterson John Proos Mike Scott Masaaki Shirase Igor E. Shparlinski Martin Simka Soonhak Kwon Eberhard Stickel Douglas Stinson Isamu Teranishi Dominique Unruh José Villegas Camille Vuillaume Douglas Wikström Christopher Wolf Go Yamamoto

Table of Contents Session I: Algebraic and Number Theoretical Cryptanalysis (I) Total Break of the l-ic Signature Scheme... 1 Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, and Jacques Stern Recovering NTRU Secret Key from Inversion Oracles... 18 Petros Mol and Moti Yung Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?... 37 Alexander May and Maike Ritzenhofen Session II: Theory of Public Key Encryption Relations Among Notions of Plaintext Awareness... 47 James Birkett and Alexander W. Dent Completely Non-malleable Encryption Revisited... 65 Carmine Ventre and Ivan Visconti Invited Talk I Cryptographic Test Correction... 85 Eric Levieil and David Naccache Session III: Digital Signatures (I) Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results... 101 Dario Catalano, Mario Di Raimondo, Dario Fiore, and Rosario Gennaro Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures... 121 Siamak F. Shahandashti and Reihaneh Safavi-Naini Proxy Signatures Secure Against Proxy Key Exposure... 141 Jacob C.N. Schuldt, Kanta Matsuura, and Kenneth G. Paterson

XII Table of Contents Session IV: Identification, Broadcast and Key Agreement Lattice-Based Identification Schemes Secure Under Active Attacks... 162 Vadim Lyubashevsky Efficient Simultaneous Broadcast... 180 Sebastian Faust, Emilia Käsper, and Stefan Lucks SAS-Based Group Authentication and Key Agreement Protocols... 197 Sven Laur and Sylvain Pasini Session V: Implementation of Fast Arithmetic An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm... 214 Miaoqing Huang, Kris Gaj, Soonhak Kwon, and Tarek El-Ghazawi New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields... 229 Patrick Longa and Ali Miri Session VI: Digital Signatures (II) Online-Untransferable Signatures... 248 Moses Liskov and Silvio Micali Security of Digital Signature Schemes in Weakened Random Oracle Models... 268 Akira Numayama, Toshiyuki Isshiki, and Keisuke Tanaka A Digital Signature Scheme Based on CV P... 288 Thomas Plantard, Willy Susilo, and Khin Than Win Session VII: Algebraic and Number Theoretical Cryptanalysis (II) An Analysis of the Vector Decomposition Problem... 308 Steven D. Galbraith and Eric R. Verheul A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents... 328 Sungwook Kim and Jung Hee Cheon

Table of Contents XIII Session VIII: Public Key Encryption Certificateless Encryption Schemes Strongly Secure in the Standard Model... 344 Alexander W. Dent, Benoît Libert, and Kenneth G. Paterson Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption... 360 Benoît Libert and Damien Vergnaud Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time... 380 Yi-Ru Liu and Wen-Guey Tzeng Author Index... 397