Lecture Notes in Computer Science 4833

Similar documents
Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4883

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 5665

Lecture Notes in Computer Science 4593

Lecture Notes in Computer Science 3557

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 5677

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 4728

April 15 19, 2012 Cambridge, UK

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 6280

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 5443

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 4964

Lecture Notes in Computer Science 4117

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6597

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 2248 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 5580

Lecture Notes in Computer Science 4284

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4586

Lecture Notes in Computer Science 7073

Research Reports ESPRIT

Lecture Notes in Computer Science 6055

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6035

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 4449

PROFESSIONAL EXPERIENCE Postdoc in Cryptography, Department of Computer Science, Sapienza University of Rome, Italy. Giuseppe Ateniese.

Lecture Notes in Computer Science 6037

Krzysztof Pietrzak last updated April 22, 2016

Lecture Notes in Computer Science 5587

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 4464

Lecture Notes in Computer Science 7384

Lecture Notes in Computer Science 3527

ACADEMIC QUALIFICATIONS:

Lecture Notes in Computer Science 6434

Lecture Notes in Computer Science

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 7118

gpehihpcl'upn sdii-gei tim GE ng Fiae^'ban*' and pq>-er ujeibel with contributions by

German Yearbook on Business History 1986

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 7140

Daniele Venturi. Curriculum Vitae

Lecture Notes in Computer Science 6715

Computers in Building: Proceedings of the CAADfutures'99 Conference

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 7679

Krzysztof Pietrzak last updated November 22, 2018

Member of ANR project High Performance Algebraic Computing (HPAC)

Lecture Notes in Computer Science 4935

CESAM Certified Members

High-Rise Living in Asian Cities

Lecture Notes in Computer Science 8031

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

The Archaeology of Anxiety

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

The Global Financial Crisis

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 4044

RTS & HUMANITIES CITATION INDEX - ASIAN STUDIES JOURNAL LIST Total journals: ARTIBUS ASIAE

Lecture Notes in Computer Science 9211

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 9249

Lecture Notes in Computer Science 6815

Emotional Engineering Volume 5

Lecture Notes in Computer Science 9230

Transcription:

Lecture Notes in Computer Science 4833 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Kaoru Kurosawa (Ed.) Advances in Cryptology ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security Kuching, Malaysia, December 2-6, 2007 Proceedings 13

Volume Editor Kaoru Kurosawa Ibaraki University Department of Computer and Information Sciences 4-12-1 Nakanarusawa Hitachi, Ibaraki 316-8511, Japan E-mail: kurosawa@mx.ibaraki.ac.jp Library of Congress Control Number: 2007939450 CR Subject Classification (1998): E.3, D.4.6, F.2.1-2, K.6.5, C.2, J.1, G.2 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-540-76899-8 Springer Berlin Heidelberg New York ISBN-13 978-3-540-76899-9 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com International Association for Cryptology Research 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12194407 06/3180 543210

Preface ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (isecures) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was financially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was withdrawn). Each paper was reviewed by at least three members of the Program Committee, while submissions co-authored by a Program Committee member were reviewed by at least five members. (Each PC member could submit at most one paper.) Many high-quality papers were submitted, but due to the relatively small number which could be accepted, many very good papers had to be rejected. After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged). The proceedings contain the revised versions of the accepted papers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents. The Committee selected the following two papers as the best papers: Cryptanalysis of Grindahl by Thomas Peyrin; and Faster Addition and Doubling on Elliptic Curves by Daniel J. Bernstein and Tanja Lange. The authors of these two papers were invited to submit the full version of their paper to the Journal of Cryptology. The author of the first paper, Thomas Peyrin, received the Best Paper Award. The conference featured invited lectures by Ran Canetti and Tatsuaki Okamoto. Ran Canetti s paper Treading the Impossible: A Tour of Set-Up Assumptions for Obtaining Universally Composable Security and Tatsuaki Okamoto s paper Authenticated Key Exchange and Key Encapsulation in the Standard Model have been included in this volume. There are many people who contributed to the success of ASIACRYPT 2007. I would like to thank many authors from around the world for submitting their papers. I am deeply grateful to the Program Committee for their hard work to ensure that each paper received a thorough and fair review. I gratefully acknowledge the external reviewers listed on the following pages. I am also grateful to Arjen Lenstra, Bart Preneel, and Andy Clark for their advice as the directors of IACR. Finally, I would like to thank the General Chair, Raphael Phan, for organizing the conference and Shai Halevi for developing and maintaining his very nice Web Submission and Review System. September 2007 Kaoru Kurosawa

Asiacrypt 2007 December 2 6, 2007, Kuching, Sarawak, Malaysia Sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Information Security Research (isecures) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI) and financially supported by the Sarawak Government General Chair Raphael C.-W. Phan, EPFL, Switzerland Program Chair Kaoru Kurosawa, Ibaraki University, Japan Program Commitee Masayuki Abe Alex Biryukov Alexandra Boldyreva Jung Hee Cheon Jean-Sebastien Coron Joan Daemen Serge Fehr Steven Galbraith Craig Gentry Henri Gilbert Shai Halevi Helena Handschuh Tetsu Iwata Thomas Johansson Marc Joye Jonathan Katz Lars R. Knudsen NTT, Japan University of Luxembourg, Luxembourg Georgia Institute of Technology, USA Seoul National University, Korea University of Luxembourg, Luxembourg STMicroelectronics, Belgium CWI, Netherlands Royal Holloway University of London, UK Stanford University, USA France Telecom, France IBM T.J. Watson Research Center, USA Spansion, France Nagoya University, Japan Lund University, Sweden Thomson R&D France, France University of Maryland, USA Technical University of Denmark, Denmark

VIII Organization Hugo Krawczyk Kaoru Kurosawa Xuejia Lai Arjen K. Lenstra Stefan Lucks Anna Lysyanskaya Alexander May Jesper Buus Nielsen Elisabeth Oswald Josef Pieprzyk Bart Preneel Pandu Rangan Palash Sarkar NigelSmart Tsuyoshi Takagi Serge Vaudenay Brent Waters Stefan Wolf IBM T.J. Watson Research Center, USA Ibaraki University, Japan Shanghai Jiaotong University, China EPFL IC LACAL, Switzerland Bauhaus University Weimar, Germany Brown University, USA Technische Universität Darmstadt, Germany University of Aarhus, Denmark University of Bristol, UK Macquarie University, Australia Katholieke Universiteit Leuven, Belgium Indian Institute of Technology, India Indian Statistical Institute, India BristolUniversity,UK Future University-Hakodate, Japan EPFL, Switzerland SRI International, USA ETH Zurich, Switzerland External Reviewers Jesus Almansa Frederik Armknecht Gilles Van Assche Georges Baatz Thomas Baignéres Boaz Barak Mira Belenkiy Waldyr Benits Kamel Bentahar Come Berbain Dan Bernstein Guido Bertoni Olivier Billet Andrey Bogdanov Arnaud Boscher Xavier Boyen Ran Canetti Christophe De Cannière Zhenfu Cao Chris Charnes Sanjit Chatterjee Scott Contini Yang Cui Alexander Dent Claus Diem Yevgeniy Dodis Orr Dunkelman Håkan Englund Pooya Farshim Martin Feldhofer Marc Fischlin Matthias Fitzi Ewan Fleischmann Eiichiro Fujisaki Jun Furukawa Philippe Gaborit Nicolas Gama Pierrick Gaudry Rosario Gennaro Ralf Gerkmann Zheng Gong Vipul Goyal Rob Granger Johann Großchädl Gaurav Gupta Frank Gurkaynak Kil-Chan Ha Robbert de Haan Stuart Haber Sang Geun Hahn Safuat Hamdy Daewan Han Wei Han Goichiro Hanaoka Martin Hell Dennis Hofheinz Xuan Hong Nick Howgrave-Graham Jim Hughes Sebastiaan Indesteeghe Tetsuya Izu Markus Jakobsson Stas Jarecki Ellen Jochemsz Pascal Junod Alexandre Karlov Ulrich Kühn Marcelo Kaihara Yael Kalai Alexandre Karlov Dmitry Khovratovich Eike Kiltz

Organization IX Vlastimal Klima Markulf Kohlweiss Yuichi Komano Chiu-Yuen Koo Ranjit Kumaresan Taekyoung Kwon Tanja Lange Jooyoung Lee Mun-Kyu Lee Frédéric Lefèbvre Hoon Wei Lim Yehuda Lindell Joseph Liu Yu Long Xianhui Lu Changshe Ma Subhamoy Maitra Keith Martin Krystian Matusiewicz Florian Mendel Daniele Micciancio Wil Michiels Lorenz Minder Andrew Moss Siguna Mueller Toru Nakanishi Arvind Narayanan Gregory Neven Phong Nguyen Svetla Nikova Ryo Nishimaki Adam O Neill Miyako Ohkubo Katsuyuki Okeya Dag Arne Osvik Khaled Ouafi Dan Page Pascal Paillier Sylvain Pasini Rafael Pass Vijayakrishnan Pasupathinathan Kenny Paterson Maura Paterson Thomas Peyrin Duong Hieu Phan Krzysztof Pietrzak Norbert Pramstaller Deike Priemuth-Schmid Prashant Punya Wenfeng Qi Tal Rabin Dominik Raub Christian Rechberger Tom Ristenpart Maike Ritzenhofen Matthieu Rivain Panagiotis Rizomiliotis Matthew Robshaw Kazuo Sakiyama Joern-Marc Schmidt Yannick Seurin Runting Shi Masaaki Shirase Igor Shparlinski Tom Shrimpton Ben Smith Martijn Stam Ron Steinfeld Marc Stevens Koutarou Suzuki Christophe Tartary Emin Islam Tatli Isamu Teranishi Soren Thomsen Stefan Tillich Frederik Vercauteren Martin Vuagnoux Camille Vuillaume Zhongmei Wan Huaxiong Wang Bogdan Warinschi Hoeteck Wee Benne de Weger Ralf-Philipp Weinmann Mi Wen William Whyte Christopher Wolf Duncan Wong Hongjun Wu Juerg Wullschleger Go Yamamoto Bo-Yin Yang Jin Yuan Aaram Yun Erik Zenner Xianmo Zhang Yunlei Zhao Jinmin Zhong

Table of Contents Number Theory and Elliptic Curve A Kilobit Special Number Field Sieve Factorization... 1 Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, ArjenK.Lenstra,andDagArneOsvik When e-th Roots Become Easier Than Factoring... 13 Antoine Joux, David Naccache, and Emmanuel Thomé Faster Addition and Doubling on Elliptic Curves... 29 Daniel J. Bernstein and Tanja Lange Protocol A Non-interactive Shuffle with Pairing Based Verifiability... 51 Jens Groth and Steve Lu On Privacy Models for RFID... 68 Serge Vaudenay Invited Talk I Obtaining Universally Compoable Security: Towards the Bare Bones of Trust... 88 Ran Canetti Hash Function Design A Simple Variant of the Merkle-Damgård Scheme with a Permutation... 113 Shoichi Hirose, Je Hong Park, and Aaram Yun Seven-Property-Preserving Iterated Hashing: ROX... 130 Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function... 147 Thomas Ristenpart and Thomas Shrimpton Group/Broadcast Cryptography Fully Anonymous Group Signatures Without Random Oracles... 164 Jens Groth

XII Table of Contents Group Encryption... 181 Aggelos Kiayias, Yiannis Tsiounis, and Moti Yung Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys... 200 Cécile Delerablée MAC and Implementation Boosting Merkle-Damgård Hashing for Message Authentication... 216 Kan Yasuda On Efficient Message Authentication Via Block Cipher Design Techniques... 232 G. Jakimoski and K.P. Subbalakshmi Symmetric Key Cryptography on Modern Graphics Hardware... 249 Jason Yang and James Goodman Multiparty Computation I Blind Identity-Based Encryption and Simulatable Oblivious Transfer... 265 Matthew Green and Susan Hohenberger Multi-party Indirect Indexing and Applications... 283 Matthew Franklin, Mark Gondree, and Payman Mohassel Two-Party Computing with Encrypted Data... 298 Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, and Moti Yung Block Ciphers Known-Key Distinguishers for Some Block Ciphers... 315 Lars R. Knudsen and Vincent Rijmen Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions... 325 Jacques Patarin, Valérie Nachef, and Côme Berbain On Tweaking Luby-Rackoff Blockciphers... 342 David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, and Hakan Seyalioglu Multiparty Computation II Secure Protocols with Asymmetric Trust... 357 Ivan Damgård, Yvo Desmedt, Matthias Fitzi, and Jesper Buus Nielsen

Table of Contents XIII Simple and Efficient Perfectly-Secure Asynchronous MPC... 376 Zuzana Beerliová-Trubíniová and Martin Hirt Efficient Byzantine Agreement with Faulty Minority... 393 Zuzana Beerliová-Trubíniová, Martin Hirt, and Micha Riser Information-Theoretic Security Without an Honest Majority... 410 Anne Broadbent and Alain Tapp Foundation Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations... 427 Ueli Maurer and Dominik Raub Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions... 444 Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, and Amit Sahai Anonymous Quantum Communication... 460 Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, and Alain Tapp Invited Talk II Authenticated Key Exchange and Key Encapsulation in the Standard Model... 474 Tatsuaki Okamoto Public Key Encryption Miniature CCA2 PK Encryption: Tight Security Without Redundancy... 485 Xavier Boyen Bounded CCA2-Secure Encryption... 502 Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, and Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption... 519 Rafael Pass, Abhi Shelat, and Vinod Vaikuntanathan Cryptanalysis Cryptanalysis of the Tiger Hash Function... 536 Florian Mendel and Vincent Rijmen Cryptanalysis of Grindahl... 551 Thomas Peyrin

XIV Table of Contents A Key Recovery Attack on Edon80... 568 Martin Hell and Thomas Johansson Author Index... 583