Lecture Notes in Computer Science 4117

Similar documents
Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 6597

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 3557

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 4964

Lecture Notes in Computer Science 5677

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 4939

Lecture Notes in Computer Science 3819

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 5665

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 4593

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 6280

Krzysztof Pietrzak last updated April 22, 2016

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 5443

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 4833

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 2248 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 6571

Lecture Notes in Computer Science 7342

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Research Reports ESPRIT

Lecture Notes in Computer Science 6037

April 15 19, 2012 Cambridge, UK

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 6035

Lecture Notes in Computer Science 4284

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Krzysztof Pietrzak last updated November 22, 2018

Lecture Notes in Computer Science 6055

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 3507

PROFESSIONAL EXPERIENCE Postdoc in Cryptography, Department of Computer Science, Sapienza University of Rome, Italy. Giuseppe Ateniese.

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 5083

Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 3527

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science 7679

Lecture Notes in Computer Science

The Archaeology of Anxiety

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 5581

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 7118

German Yearbook on Business History 1986

Kai-Min Chung. Institute of Information Science, Academia Sinica #1716. Institute of Information Science, Academia Sinica, Taiwan

Lecture Notes in Computer Science 5580

Computers in Building: Proceedings of the CAADfutures'99 Conference

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 9211

Member of ANR project High Performance Algebraic Computing (HPAC)

Daniele Venturi. Curriculum Vitae

Lecture Notes in Computer Science 3061

Lecture Notes in Computer Science 7384

Lecture Notes in Artificial Intelligence

Emotional Engineering Volume 5

Lecture Notes in Computer Science 3925

ADCS Proceedings of the Ninth Australasian Document Computing Symposium, December 13, 2004

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

This page intentionally left blank

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

A Bibliography of Books about REDUCE

Lecture Notes in Computer Science 5203

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 6815

High-Rise Living in Asian Cities

The Founders of Index Theory

Lecture Notes in Computer Science 7896

Served as civilian doing Operations Research at Headquarters, R.A.F. Bomber Command,

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 7734

Lecture Notes in Computer Science 5487

CAMERON, RONDO E. Rondo E. Cameron papers,

Transcription:

Lecture Notes in Computer Science 4117 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Cynthia Dwork (Ed.) Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference Santa Barbara, California, USA, August 20-24, 2006 Proceedings 13

Volume Editor Cynthia Dwork Microsoft Research 1065 La Avenida, Mountain View, CA 94043, USA E-mail: dwork@microsoft.com Library of Congress Control Number: 2006930607 CR Subject Classification (1998): E.3, G.2.1, F.2.1-2, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-540-37432-9 Springer Berlin Heidelberg New York ISBN-13 978-3-540-37432-9 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11818175 06/3142 543210

Preface These are the proceedings of Crypto 2006, the 26th Annual International Cryptology Conference. The conference was sponsored by the International Association of Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. The conference was held in Santa Barbara, California, August 20 24, 2006. The conference received 220 submissions, out of which the Program Committee selected 34 for presentation. Submission and selection of papers was done using the IChair sofware, developed at the École Polytechnique Fédérale de Lausanne (EPFL) by Thomas Baignères and Matthieu Finiasz. Aided in part by comments from the committee and external reviewers, the authors of accepted papers had roughly six weeks in which to prepare final versions for these proceedings. These were not subject to editorial review. The committee chose On the Power of the Randomized Iterate, by Iftach Haitner, Danny Harnik, and Omer Reingold, to receive the Best Paper award. The committee also invited Oded Regev and David Wagner to speak on topics of their choice. Their talks were entitled, respectively, Lattice-Based Cryptography and Cryptographic Protocols for Electronic Voting. We continued the tradition of a Rump Session of very brief presentations. The cryptology community provides a collaborative and supportive environment for exciting research, and the success of previous Crypto conferences fosters enthusiasm for participation in subsequent ones. I am deeply grateful to all the authors who submitted papers, not only for their contribution to this conference but also for maintaining this tradition. I thank Thomas Baignères and Matthieu Finiasz for kindly hosting the server and for writing IChair in the first place. David Fuchs provided invaluable assistance in assembling the final papers into this volume. Josh Benaloh was everything one could possibly hope for in a General Chair. I thank him for his good judgement and gracious assistance at all times. In a departure from recent tradition, submissions were not anonymous. I am grateful to Andy Clark and Kevin McCurley for their counsel regarding this course of action, and to the Program Committee for being open to change. I also warmly thank the members of the Program Committee for their energy, intelligence, wisdom, and the maturity with which they approached their task. Finally, I thank Moni Naor, who for the past nineteen years has taught me cryptography. June 2006 Cynthia Dwork Program Chair

CRYPTO 2006 August 20 24, 2006, Santa Barbara, California, USA Sponsored by the International Association for Cryptologic Research (IACR) in cooperation with IEEE Computer Society Technical Committee on Security and Privacy, Computer Science Department, University of California, Santa Barbara General Chair Josh Benaloh, Microsoft, USA Program Chair Cynthia Dwork, Microsoft, USA Program Committee Boaz Barak... Princeton University, USA Eli Biham... Technion, Israel Ivan Damgård... University of Aarhus, Denmark Yuval Ishai... Technion, Israel Jonathan Katz... University of Maryland, USA Arjen Lenstra... EPFL, Switzerland Yehuda Lindell... Bar-Ilan University, Israel Tal Malkin... Columbia University, USA Mitsuru Matsui... Mitsubishi Electric, Japan Daniele Micciancio... University of California, San Diego, USA Moni Naor... Weizmann Institute of Science, Israel Phong Nguyen... CNRS/École Normale Supérieure, France Kobbi Nissim... Ben-Gurion University, Israel Bart Preneel... Katholieke Universiteit Leuven, Belgium Hovav Shacham... Weizmann Institute of Science, Israel Vitaly Shmatikov... University of Texas, Austin, USA Edlyn Teske... University of Waterloo, Canada Salil Vadhan... Harvard University, USA Yiqun Lisa Yin... Independent Consultant, USA Advisory Members Victor Shoup (Crypto 2005 Program Chair)...... New York University, USA Alfred Menezes (Crypto 2007 Program Chair) University of Waterloo, Canada

VIII Organization External Reviewers Michel Abdalla Masayuki Abe Adi Akavia Elena Andreeva Spyridon Antonakopoulos Kazumaro Aoki Frederik Armknecht Joonsang Baek Elad Barkan Lejla Batina Peter Beelen Amos Beimel Mihir Bellare Josh Benaloh Daniel Bernstein Alex Biryukov Daniel Bleichenbacher Xavier Boyen An Braeken Emmanuel Bresson Justin Brickell Jan Camenisch Ran Canetti Christophe De Cannière Dario Catalano Melissa Chase Lily Chen Rafi Chen Yongxi Cheng Seung Geol Choi Scott Contini Ronald Cramer Anupam Datta Cécile Delerablée Anand Desai Claus Diem Jingtai Ding Yan Zhong Ding Yevgenyi Dodis Orr Dunkelman Phil Eisen Ariel Elbaz Serge Fehr Matthias Fitzi Lance Fortnow Pierre-Alain Fouque Soichi Furuya Steven Galbraith Juan Garay Rosario Gennaro Henri Gilbert Eu-Jin Goh Ronen Gradwohl Louis Granboulan Prateek Gupta Iftach Haitner Shai Halevi Renen Hallak Safuat Hamdy Helena Handschuh Danny Harnik Anwar Hasan Carmit Hazay Alex Healy Javier Herranz Jonathan Herzog Jason Hinek Dennis Hofheinz Nick Howgrave-Graham Tetsu Iwata Stas Jarecki Ellen Jochemsz Antoine Joux Pascal Junod Charanjit Jutla Marcelo Kaihara Yael Tauman Kalai Alexander Kholosha Joe Kilian Eike Kiltz Jongsung Kim Vlastimil Klima Vlad Kolesnikov Chiu-Yuen Koo Simon Kramer Steve Kremer Sebastien Kunz-Jacques Eyal Kushilevitz Tanja Lange Joseph Lano Kristin Lauter Homin Lee Stephane Lemieux Matt Lepinski Gatan Leurent Benoit Libert Stefan Lucks Christoph Ludwig Anna Lysyanskaya Vadim Lyubashevsky Phil MacKenzie Mohammad Mahmoody John Malone-Lee Mark Manasse Alexander May Frank McSherry Willi Meier Daniele Micciancio John Mitchell Anton Mityagin Peter Montgomery Tal Moran Ruggero Morselli Siguna Müller Sean Murphy David Naccache Arvind Narayanan Andrew Neff Gregory Neven Jesper Buus Nielsen Tatsuaki Okamoto Michael Østergaard Rafi Ostrovsky Saurabh Panjwani Souradyuti Paul Raphael C.-W. Phan Krzysztof Pietrzak Benny Pinkas

Organization IX David Pointcheval Tal Rabin Oded Regev Omer Reingold Leo Reyzin Tom Ristenpart Phil Rogaway Alon Rosen Amit Sahai Yasuyuki Sakai Louis Salvail Christian Schaffner Claus Schnorr Berry Schoenmakers Gil Segev Jean-Pierre Seifert Ronen Shaltiel Taizo Shirai Victor Shoup Igor Shparlinski Tom Shrimpton Andrey Sidorenko Alice Silverberg Robert Silverman Adam Smith Martijn Stam François-Xavier Standaert Ron Steinfeld Daisuke Suzuki Mike Szydlo Katsuyuki Takashima Tamir Tassa Tomas Toft Eran Tromer Toyohiro Tsurumaru Andrew Wan Shuhong Wang Dai Watanabe Brent Waters John Watrous Benne de Weger Stephanie Wehner Enav Weinreb Susanne Wetzel Udi Wieder Douglas Wikström Christopher Wolf Duncan Wong David Woodruff David Xiao Guomin Yang Kan Yasuda Feng Zhu

Table of Contents Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs Elad Barkan, Eli Biham, Adi Shamir... 1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold... 22 Strengthening Digital Signatures Via Randomized Hashing Shai Halevi, Hugo Krawczyk... 41 Round-Optimal Composable Blind Signatures in the Common Reference String Model Marc Fischlin... 60 On Signatures of Knowledge Melissa Chase, Anna Lysyanskaya... 78 Non-interactive Zaps and New Techniques for NIZK Jens Groth, Rafail Ostrovsky, Amit Sahai... 97 Rankin s Constant and Blockwise Lattice Reduction Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen... 112 Lattice-Based Cryptography Oded Regev... 131 A Method for Making Password-Based Key Exchange Resilient to Server Compromise Craig Gentry, Philip MacKenzie, Zulfikar Ramzan... 142 Mitigating Dictionary Attacks on Password-Protected Local Storage Ran Canetti, Shai Halevi, Michael Steiner... 160 Rationality and Adversarial Behavior in Multi-party Computation Anna Lysyanskaya, Nikos Triandopoulos... 180 When Random Sampling Preserves Privacy Kamalika Chaudhuri, Nina Mishra... 198

XII Table of Contents Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models Moni Naor, Gil Segev, Adam Smith... 214 Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith... 232 On Forward-Secure Storage Stefan Dziembowski... 251 Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One Rafael Pass, abhi shelat, Vinod Vaikuntanathan... 271 Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Xavier Boyen, Brent Waters... 290 Fast Algorithms for the Free Riders Problem in Broadcast Encryption Zulfikar Ramzan, David P. Woodruff... 308 The Number Field Sieve in the Medium Prime Case Antoine Joux, Reynald Lercier, Nigel Smart, Frederik Vercauteren... 326 Inverting HFE Is Quasipolynomial Louis Granboulan, Antoine Joux, Jacques Stern... 345 Cryptanalysis of 2R Schemes Jean-Charles Faugère, Ludovic Perret... 357 Receipt-Free Universally-Verifiable Voting with Everlasting Privacy Tal Moran, Moni Naor... 373 Cryptographic Protocols for Electronic Voting David Wagner... 393 Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Saurabh Agarwal, Ronald Cramer, Robbert de Haan... 394 Random Selection with an Adversarial Majority Ronen Gradwohl, Salil Vadhan, David Zuckerman... 409 Oblivious Transfer and Linear Functions Ivan B. Damgård, Serge Fehr, Louis Salvail, Christian Schaffner... 427

Table of Contents XIII On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz, Chiu-Yuen Koo... 445 Robust Multiparty Computation with Linear Communication Complexity Martin Hirt, Jesper Buus Nielsen... 463 On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank... 483 Scalable Secure Multiparty Computation Ivan Damgård, Yuval Ishai... 501 Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields Hao Chen, Ronald Cramer... 521 Automated Security Proofs with Sequences of Games Bruno Blanchet, David Pointcheval... 537 On Robust Combiners for Private Information Retrieval and Other Primitives Remo Meier, Bartosz Przydatek... 555 On the Impossibility of Efficiently Combining Collision Resistant Hash Functions Dan Boneh, Xavier Boyen... 570 On the Higher Order Nonlinearities of Algebraic Immune Functions Claude Carlet... 584 New Proofs for NMAC and HMAC: Security without Collision-Resistance Mihir Bellare... 602 Author Index... 621