Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Similar documents
Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4883

Curriculum Vitæ et Studiorum. Paolo D Arco

Research Reports ESPRIT

Curriculum Vitæ et Studiorum. Paolo D Arco

Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 3511

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 4409

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

STUDIES IN ORGANIZED CRIME

Lecture Notes in Computer Science 6280

German Yearbook on Business History 1986

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

gpehihpcl'upn sdii-gei tim GE ng Fiae^'ban*' and pq>-er ujeibel with contributions by

Syntax of Landscape The Landscape Architecture of Peter Latz and Partners

Progress in Mathematics Volume 95

Lecture Notes in Artificial Intelligence

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Emotional Engineering Volume 5

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

High-Rise Living in Asian Cities

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science

Lecture Notes in Computer Science 5671

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

The Archaeology of Anxiety

Lecture Notes in Computer Science 4728

CURRICULUM VITAE Michael (Michail) Th. Rassias

Studies in Epistemology, Logic, Methodology, and Philosophy of Science

CAMERON, RONDO E. Rondo E. Cameron papers,

This page intentionally left blank

Early Modern Philosophers and the Renaissance Legacy

Ethno-Indology. Heidelberg Studies in South Asian Rituals. General Editor Axel Michaels Volume 13. Harrassowitz Verlag. Wiesbaden

Lecture Notes in Computer Science 3376

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 1944 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

The Sociology of Norbert Elias

ROADMAP to ENGINEERING DESIGN

Served as civilian doing Operations Research at Headquarters, R.A.F. Bomber Command,

Thomas Schroepfer. Professor, Co-Director <SUTD-JTC I3 Centre> and Founding. Associate Head of Pillar <ASD> Research Interests. . Telephone.

THE RENAISSANCE OF EMPIRE IN EARLY MODERN EUROPE

Theorem Proving in Higher Order Logics

Lecture Notes in Computer Science 5474

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

American Literature. Narratives of Multiculturalism in Post-Imperial Turkey. Interamericana 10. Elena Furlanetto

Lecture Notes in Computer Science 4454

Higher Densities No Sprawl: Master Plan for the City of Ramat-Gan, Israel

Vincentia Schroeder, Margit Koemeda-Lutz (Eds.) Bioenergetic Analysis 2010 (20)

Bridging the Gap? Nomos. Opportunities and Constraints of the European Citizens Initiative. Maximilian Conrad Annette Knaut Katrin Böttger [eds.

Lecture Notes in Computer Science 2841 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 7480

RTS & HUMANITIES CITATION INDEX - ASIAN STUDIES JOURNAL LIST Total journals: ARTIBUS ASIAE

NEW THEORIES IN GROWTH AND DEVELOPMENT

INDUSTRIAL RELATIONS IN INTERNATIONAL PERSPECTIVE

Architecture Anthology II: Architectural Theory and History

Lecture Notes in Computer Science 1837 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen


Encyclopaedia Aethiopica. Volume 5 Y Z Addenda Index

Persoonlijke kopie van ()

REPORT OF THE TELSIKS 2001 CONFERENCE

PROFESSIONAL EXPERIENCE Postdoc in Cryptography, Department of Computer Science, Sapienza University of Rome, Italy. Giuseppe Ateniese.

Designers in Residence 2018 announced by Design Museum

Europass Curriculum Vitae

Lecture Notes in Computer Science 1670 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science

SERGIU KLAINERMAN CURRICULUM VITAE

The Architect, the Cook and Good Taste

The World Cup, between Europe and the Americas

Homepage: volpe. Curriculum Vitae

Welcome to ICIQ 2009 International Conference on Information Quality

Inventory of the James Addison Logan Papers

IDENTITY VALIDATION GUIDELINES

Public Speaking in the City

CREATIVITY DESIGN INNOVATION

James E. Gibson manuscript on Bodo Otto

Lecture Notes in Computer Science 8341

Europass Curriculum Vitae

The Founders of Index Theory

*Senior Editor Masayusa Ohtsu Kumamoto University, Graduate School of Science and Technology, Kumamoto, Japan

Algebraic and geometric combinatorics, polytope theory, Hopf algebras, and diagonal harmonics.

New Essays on the History of Autonomy

CURRICULUM VITAE. Jan Kmenta

Nonprofit and Civil Society Studies

Lecture Notes in Computer Science 9804

ELECTRONIC COMMERCE TRADING PARTNER AGREEMENT (Dated 10 November 2016)

Curriculum vitae of Tatyana Shaposhnikova

Big Data in Organizations and the Role of Human Resource Management

Davi Maximo Alexandrino Nogueira

Organizational Economics, Personnel Economics, Behavioral Economics

Atlas of Craniocervical Junction and Cervical Spine Surgery

Progress in Mathematics

Transcription:

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Tokyo

Stelvio Cimato Clemente Galdi Giuseppe Persiano (Eds.) Security in Communication Networks Third International Conference, SCN 2002 Amalfi, Italy, September 11-13, 2002 Revised Papers 13

Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Stelvio Cimato Giuseppe Persiano Università di Salerno Dipartimento di Informatica ed Applicazioni Via S. Allende, 84081 Baronissi (SA), Italy E-mail: {cimato/giuper}@dia.unisa.it Clemente Galdi Computer Technology Institute and University of Patras Dept. of Computer Engineering and Informatics 26500 Rio, Greece E-mail: clegal@ceid.upatras.gr Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http://dnb.ddb.de>. CR Subject Classification (1998): E.3, C.2, D.4.6, K.4.1, K.4.4, K.6.5, F.2 ISSN 0302-9743 ISBN 3-540-00420-3 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH http://www.springer.de Springer-Verlag Berlin Heidelberg 2003 Printed in Germany Typesetting: Camera-ready by author, data conversion by Olgun Computergrafik Printed on acid-free paper SPIN: 10872336 06/3142 543210

Preface The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amalfi, Italy, September 11 13, 2002. The conference takes place every three years (previous ones were held in 1996 and 1999 in Amalfi too) and aims to bring together researchers in the field of security in communication networks to foster cooperation and the exchange of ideas. The main topics included all technical aspects of data security including: anonymity implementation, authentication, key distribution, block ciphers, operating systems security, complexity-based cryptography, privacy, cryptanalysis, protocols, digital signatures, public key encryption, electronic money, public key infrastructure, hash functions, secret sharing, identification, surveys, and the state of the art. The program committee received 90 submissions in electronic format from 5 continents of which 24 were selected for presentation in 8 sessions. We had two invited talks, one by Eyal Kushilevitz from the Technion, Israel on Some Applications of Polynomials for the Design of Cryptographic Protocols, and the other by Ueli Maurer from ETH, Zurich, on Secure Multi-Party Computation Made Simple. Due to the high number of submissions, the reviewing phase was a very challenging process, and many good submissions had to be rejected. We are very grateful to all the program committee members, assisted by their colleagues, who devoted much effort and valuable time to read and select the papers. We want to thank the Municipality of Amalfi that agreed to host the conference in one of the most beautiful halls in Amalfi. Finally, we would like to thank all the authors who submitted their papers, the Program Committee members, and all the conference participants. September 2002 S. Cimato C. Galdi G. Persiano

Organization SCN 2002 was organized with the financial support of the Dipartimento di Informatica ed Applicazioni R.M. Capocelli and the Facoltà di Scienze Matematiche, Fisiche e Naturali of the Università di Salerno under the auspices of the Amalfi Municipality. Program Chair Giuseppe Persiano General Chair Carlo Blundo Program Committee Giuseppe Ateniese Carlo Blundo Christian Cachin Giovanni Di Crescenzo Alfredo De Santis Rafail Ostrovsky Giuseppe Persiano Jacques Stern Doug Stinson Gene Tsudik Moti Yung (Johns Hopkins University, USA) () (IBM Research, Switzerland) (Telcordia Technologies, USA) () (Telcordia Technologies, USA) () (École Normale Supérieure, France) (University of Waterloo, Canada) (University of California at Irvine, USA) (Columbia University, USA) Organizing Committee Stelvio Cimato Paolo D Arco Clemente Galdi Barbara Masucci Publicity Chairs Vincenzo Auletta Domenico Parente

Table of Contents Invited Talks Some Applications of Polynomials for the Design of Cryptographic Protocols... 1 Eyal Kushilevitz (Technion) Secure Multi-party Computation Made Simple... 14 Ueli Maurer (ETH) Forward Security Forward Secrecy in Password-Only Key Exchange Protocols... 29 Jonathan Katz (University of Maryland), Rafail Ostrovsky (Telcordia Technologies, Inc.), and Moti Yung (Columbia University) Weak Forward Security in Mediated RSA... 45 Gene Tsudik (University of California, Irvine) Foundations of Cryptography On the Power of Claw-Free Permutations... 55 Yevgeniy Dodis (New York University) and Leonid Reyzin (Boston University) Equivocable and Extractable Commitment Schemes... 74 Giovanni Di Crescenzo (Telcordia Technologies) An Improved Pseudorandom Generator Based on Hardness of Factoring.. 88 Nenad Dedić, Leonid Reyzin (Boston University), and Salil Vadhan (Harvard University) Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions...102 Gene Itkis (Boston University) Key Management Efficient Re-keying Protocols for Multicast Encryption...119 Giovanni Di Crescenzo (Telcordia Technologies) and Olga Kornievskaia (University of Michigan) On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure...133 Frank Niedermeyer and Werner Schindler (BSI)

VIII Table of Contents A Group Key Distribution Scheme with Decentralised User Join...146 Hartono Kurnio, Rei Safavi-Naini (University of Wollongong), and Huaxiong Wang (Macquarie University) Cryptanalysis On a Resynchronization Weakness in a Class of Combiners with Memory...164 Yuri Borissov (Bulgarian Academy of Sciences), Svetla Nikova, Bart Preneel, and Joos Vandewalle (Katholieke Universiteit Leuven) On Probability of Success in Linear and Differential Cryptanalysis...174 Ali Aydın Selçuk (Purdue University) and Ali Bıçak (University of Maryland Baltimore County) Differential Cryptanalysis of a Reduced-Round SEED...186 Hitoshi Yanami and Takeshi Shimoyama (Fujitsu Laboratories LTD) System Security Medical Information Privacy Assurance: Cryptographic and System Aspects...199 Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, and Darren Davis (The Johns Hopkins University) A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code...219 Luigi Catuogno and Ivan Visconti (Università di Salerno) Signature Schemes How to Repair ESIGN...234 Louis Granboulan (École Normale Supérieure) Forward-Secure Signatures with Fast Key Update...241 Anton Kozlov and Leonid Reyzin (Boston University) Constructing Elliptic Curves with Prescribed Embedding Degrees...257 Paulo S.L.M. Barreto (Universidade de São Paulo), Ben Lynn (Stanford University), and Michael Scott (Dublin City University) A Signature Scheme with Efficient Protocols...268 Jan Camenisch (IBM Research) and Anna Lysyanskaya (Brown University)

Table of Contents IX Zero Knowledge Efficient Zero-Knowledge Proofs for Some Practical Graph Problems...290 Yvo Desmedt (Florida State University and University of London) and Yongge Wang (University of North Carolina at Charlotte) Reduction Zero-Knowledge...303 Xiaotie Deng, C.H. Lee (City University of Hong Kong), Yunlei Zhao (City University of Hong Kong and Fudan University), and Hong Zhu (Fudan University) A New Notion of Soundness in Bare Public-Key Model...318 Shirley H.C. Cheung, Xiaotie Deng, C.H. Lee (City University of Hong Kong), and Yunlei Zhao (City University of Hong Kong and Fudan University) Information Theory and Secret Sharing Robust Information-Theoretic Private Information Retrieval...326 Amos Beimel and Yoav Stahl (Ben-Gurion University) Trading Players for Efficiency in Unconditional Multiparty Computation..342 B. Prabhu, K. Srinathan, and C. Pandu Rangan (Indian Institute of Technology) Secret Sharing Schemes on Access Structures with Intersection Number Equal to One...354 Jaume Martí-Farré and Carles Padró (Universitat Politècnica de Catalunya) Author Index...365