Lecture Notes in Computer Science 5671

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 5004

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 4214

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 6035

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 8341

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 10644

Research Reports ESPRIT

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 5443

Lecture Notes in Computer Science 5083

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 4449

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 7384

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 6647

German Yearbook on Business History 1986

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Emotional Engineering Volume 5

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

SERGIU KLAINERMAN CURRICULUM VITAE

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 6280

The Archaeology of Anxiety

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 7734

Lecture Notes in Computer Science 6815

Lecture Notes in Computer Science 7679

College of Business and Economics California State University, Fullerton present

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 4006

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 6705

CURRICULUM VITAE Michael (Michail) Th. Rassias

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 9596

Lecture Notes in Computer Science 8031

Lecture Notes in Computer Science 6092

Lecture Notes in Computer Science 7137

Lecture Notes in Artificial Intelligence

Lecture Notes in Computer Science 9211

Proceedings & Companion WikiSym 07, ISMM 07, HPC-GECO/CompFrame 07, DLS 07

Lecture Notes in Computer Science 4355

RTS & HUMANITIES CITATION INDEX - ASIAN STUDIES JOURNAL LIST Total journals: ARTIBUS ASIAE

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 3061

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 7744

Lecture Notes in Computer Science 7189

Lecture Notes in Computer Science 6527

Served as civilian doing Operations Research at Headquarters, R.A.F. Bomber Command,

A Bibliography of Books about REDUCE

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

Lecture Notes in Computer Science 10852

Lecture Notes in Computer Science 6204

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 6055

Lecture Notes in Computer Science 4935

Lecture Notes in Computer Science 6084

STUDIES IN ORGANIZED CRIME

Lecture Notes in Computer Science 9249

Lecture Notes in Computer Science 7309

The Founders of Index Theory

Computers in Building: Proceedings of the CAADfutures'99 Conference

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

This page intentionally left blank

Curriculum Vitae for Marlis Buchman

Transcription:

Lecture Notes in Computer Science 5671 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Hovav Shacham Brent Waters (Eds.) Pairing-Based Cryptography Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings 13

Volume Editors Hovav Shacham University of California at San Diego Department of Computer Science and Engineering 9500 Gilman Drive, MC 0404 La Jolla, CA 92093-0404, USA E-mail: hovav@cs.ucsd.edu Brent Waters University of Texas at Austin Department of Computer Science 1 University Station C0500, Taylor Hall 2.124 Austin, TX 78712-1188, USA E-mail: bwaters@cs.utexas.edu Library of Congress Control Number: 2009930958 CR Subject Classification (1998): E.3, D.4.6, F.2.2, G.2, K.6.5 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-03297-4 Springer Berlin Heidelberg New York ISBN-13 978-3-642-03297-4 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2009 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12723874 06/3180 543210

Preface Pairing 2009, the Third International Conference on Pairing-Based Cryptography, was held at Stanford University in Palo Alto during August 12 14, 2009. The conference was sponsored by Voltage Security and Microsoft Corporation. Terence Spies served as General Chair of the Conference and we had the privilege of serving as Program Co-chairs. The conference received 38 submissions. These were reviewed by a committee of 23 members. The committee had a three-week individual review phase followed by three weeks of discussion. After careful deliberation, the committee chose 16 papers for the Pairing 2009 conference. Detailed reviews were given to the authors, and the authors were given three weeks to submit the final version. These final versions were not subject to external review and the authors bear full responsibility for their contents. We are delighted to have had three invited speakers for Pairing 2009. Victor Miller spoke on the origins of pairing-based cryptography. His talk was complemented by Tanja Lange s, who covered the evolution of the mathematics behind pairings and shared recent results. Finally, Amit Sahai spoke on his work (with Jens Groth and Rafi Ostrovksy) realizing non-interactive zero knowledge proofs from pairings. This work has been highly influential and multiple papers accepted at this conference built upon it. In addition, there was a Hot Topics session at this conference where we asked several researchers to give 10-minute presentations of recent results. We would like to thank everyone who contributed to the conference. First, thanks to the members of our Program Committee for their excellent reviews, the difficult decisions they made in a short time, and their conscientious, thorough shepherding. Second, thanks to the Pairing Conference Steering Committee and the Chairs of previous Pairing conferences and workshops. We would like to extend a particular thanks to Steven Galbraith and Kenny Paterson, Program Chairs of Pairing 2008, whose experience and advice were invaluable to us in our planning of this conference. Third, we would like to thank Shai Halevi, whose wonderful Web Submission and Review Software we used and who hosted and administered the submission and review site for us on the IACR s servers. Fourth, we are grateful for Voltage Security and Microsoft for their generous support. Finally, we are especially indebted to Terence Spies for his service as General Chair. Without him the conference would not have been possible. August 2009 Hovav Shacham Brent Waters

Pairing 2009 The Third International Conference on Pairing-Based Cryptography Stanford, California August 12 14, 2009 Sponsored by Voltage Security and Microsoft General Chair Terence Spies Voltage Security Program Chairs Hovav Shacham Brent Waters UC San Diego, USA UT Austin, USA Program Committee Michel Abdalla Paulo Barreto Xavier Boyen Melissa Chase David Mandell Freeman Steven Galbraith Pierrick Gaudry Matthew Green Jens Groth Florian Hess Tanja Lange Kristin Lauter Gregory Neven Tatsuaki Okamoto Dan Page Kenny Paterson Michael Scott Hovav Shacham Elaine Shi Nigel Smart Tsuyoshi Takagi Fré Vercauteren Brent Waters École Normale Supérieure, France University of São Paulo, Brazil Stanford, USA Microsoft Research, USA CWI; Universiteit Leiden, The Netherlands Royal Holloway, University of London, UK CNRS, INRIA, Nancy Université, France Johns Hopkins, USA University College London, UK TU Berlin, Germany TU Eindhoven, The Netherlands Microsoft Research, USA IBM Zurich Research Laboratory, Switzerland NTT, Japan University of Bristol, UK Royal Holloway, University of London, UK Dublin City University, Ireland UC San Diego, USA PARC, USA University of Bristol, UK Future University Hakodate, Japan KU Leuven, Belgium UT Austin, USA

VIII Organization External Reviewers John Bethencourt Sébastien Canard Scott E. Coull Yuto Kawahara Benoît Libert Mark Manulis Atsuko Miyaji Peter Montgomery Yasuyuki Nogami Pascal Paillier Emily Shen Masaaki Shirase Katsuyuki Takashima Damien Vergnaud Ali Zandi

Table of Contents Signature Security Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem... 1 David Jao and Kayo Yoshida Security of Verifiably Encrypted Signatures and a Construction without Random Oracles... 17 Markus Rückert and Dominique Schröder Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model... 35 Duc-Phong Le, Alexis Bonnecaze, and Alban Gabillon Curves On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields... 52 Naomi Benger, Manuel Charlemagne, and David Mandell Freeman Generating Pairing-Friendly Curves with the CM Equation of Degree 1... 66 Hyang-Sook Lee and Cheol-Min Park Pairing Computation On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves... 78 Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa Faster Pairings on Special Weierstrass Curves... 89 Craig Costello, Huseyin Hisil, Colin Boyd, Juan Gonzalez Nieto, and Kenneth Koon-Ho Wong Fast Hashing to G 2 on Pairing-Friendly Curves... 102 Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa NIZKs and Applications Compact E-Cash and Simulatable VRFs Revisited... 114 Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya

X Table of Contents Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures... 132 Georg Fuchsbauer and David Pointcheval Group Signatures Identity Based Group Signatures from Hierarchical Identity-Based Encryption... 150 Nigel P. Smart and Bogdan Warinschi Forward-Secure Group Signatures from Pairings... 171 Toru Nakanishi, Yuta Hira, and Nobuo Funabiki Efficient Traceable Signatures in the Standard Model... 187 Benoît Libert and Moti Yung Protocols Strongly Secure Certificateless Key Agreement... 206 Georg Lippold, Colin Boyd, and Juan Gonzalez Nieto Universally Composable Adaptive Priced Oblivious Transfer... 231 Alfredo Rial, Markulf Kohlweiss, and Bart Preneel Conjunctive Broadcast and Attribute-Based Encryption... 248 Nuttapong Attrapadung and Hideki Imai Author Index... 267