[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]

Review Preferences for Zinedine Zidane

Please indicate your reviewing preferences. For each submisssion you can specify one of the following options:

     0 (0 submissions):  I have a conflict of interests with this submission
     1 (7 submissions):  I do not want to review this submission
     2 (6 submissions):  I prefer not to review this submission (but can do it if I have to)
     3 (31 submissions):  No preferences (default): I can review this submission if need be
     4 (8 submissions):  I would like to review this submission
     5 (2 submissions):  This submission is one of my favorites to review


pref 0 1 2 3 4 5 detail
2  abs On Obfuscating Point Functions
Hoeteck Wee
foundations/obfuscation, point functions

Abstract: We study the problem of obfuscation in the context of point functions
(also known as delta functions). A point function is a Boolean
function that assumes the value 1 at exactly one point. Our main
results are as follows:

- We provide a simple construction of efficient obfuscators for
point functions for a slightly relaxed notion of obfuscation - wherein
the size of the simulator has an inverse polynomial dependency on the
distinguishing probability - which is nonetheless impossible for
general circuits. This is the first known construction of obfuscators
for a non-trivial family of functions under general computational
assumptions. Our obfuscator is based on a probabilistic hash function
constructed from a very strong one-way permutation, and does
not require any set-up assumptions. Our construction also yields
an obfuscator for point functions with multi-bit output.

- We show that such a strong one-way permutation - wherein any
polynomial-sized circuit inverts [...]
1. On Obfuscating Point Functions
2  abs Logcrypt: Forward Security and Public Verification for Secure Audit Logs
Jason E. Holt and Kent E. Seamons
cryptographic protocols/forward secrecy, audit logs, public-key cryptography

Abstract: Logcrypt provides strong cryptographic assurances that data stored by
a logging facility before a system compromise cannot be modified after
the compromise without detection. We build on prior work by showing
how log creation can be separated from log verification, and
describing several additional performance and convenience features not
previously considered.
2. Logcrypt: Forward Security and Public Verification for Secure Audit Logs
3  abs Cryptanalysis of Hiji-bij-bij (HBB)
Vlastimil Klima
secret-key cryptography/cryptanalysis, Hiji-bij-bij, HBB, stream ciphers, synchronous cipher, asynchronous cipher, equivalent keys, known-plaintext attack

Abstract: In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher (in the B mode) or as an asynchronous stream cipher (in the SS mode). In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2^66 and 256-bit key with the complexity 2^67. In the case of B mode with 256-bit key, we show a known-plaintext attack recovering the whole plaintext with the complexity 2^140. All attacks need only a small part of the plaintext to be known.
3. Cryptanalysis of Hiji-bij-bij (HBB)
2  abs Benes and Butterfly schemes revisited
Jacques Patarin and Audrey Montreuil
None/Pseudo-random functions, unconditional security, information-theoretic primitive, design of keyed hash functions

Abstract: In~cite{AV96}, W. Aiello and R. Venkatesan have shown how to
construct pseudo-random functions of $2n$ bits $
ightarrow 2n$
bits from pseudo-random functions of $n$ bits $
ightarrow n$
bits. They claimed that their construction, called "Benes",
reaches the optimal bound ($mll 2^n$) of security against
adversaries with unlimited computing power but limited by $m$
queries in an adaptive chosen plaintext attack (CPA-2). However a
complete proof of this result is not given in~cite{AV96} since
one of the assertions of~cite{AV96} is wrong. Due to this, the
proof given in~cite{AV96} is valid for most attacks, but not for
all the possible chosen plaintext attacks. In this paper we will
in a way fix this problem since for all $varepsilon>0$, we will
prove CPA-2 security when $mll 2^{n(1-varepsilon)}$. However we
will also see that the probability to distinguish Benes functions
from random functions is sometime larger than the term in
$frac{m^2}{2^{2n}}$ given in~cite{AV96}. On [...]
4. Benes and Butterfly schemes revisited
3  abs A sufficient condition for key-privacy
Shai Halevi
public-key cryptography/Anonymity, key-privacy

Abstract: The notion of key privacy for encryption schemes was defined formally by Bellare, Boldyreva, Desai and Pointcheval in Asiacrypt 2001. This notion seems useful in settings where anonymity is important. In this short note we describe a (very simple) sufficient condition for key privacy. In a nutshell, a scheme that provides data privacy is guaranteed to provide also key privacy if the distribution of a *random encryption of a random message* is independent of the public key that is used for the encryption.
5. A sufficient condition for key-privacy
2  abs A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
Pradeep Kumar Mishra and Kishan Chand Gupta
foundations/

Abstract: Elliptic Curves over finite field have found application in many areas including cryptography. In the current article we define a metric on the set of elliptic curves defined over a prime field ${mathbf F}_p, p>3$.
6. A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.
3  abs The Misuse of RC4 in Microsoft Word and Excel
Hongjun Wu
applications/Microsoft Word, Excel, Encryption, RC4, Initialization Vector

Abstract: In this report, we point out a serious security flaw in Microsoft Word and Excel. The stream cipher RC4 with key length up to 128 bits is used in Microsoft Word and Excel to protect the documents. But when an encrypted document gets modified and saved, the initialization vector remains the same and thus the same keystream generated from RC4 is applied to encrypt the different versions of that document. The consequence is disastrous since a lot of information of the document could be recovered easily.
7. The Misuse of RC4 in Microsoft Word and Excel
2  abs Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
J. Wu and R. Wei
cryptographic protocols/Key management

Abstract: In IEEE INFOCOM 2004, Chan proposed a distributed key management
scheme for mobile ad hoc networks, and deduced the condition under
which the key sets distributed to the network nodes can form a
cover-free family (CFF), which is the precondition that the scheme
can work. In this paper, we indicate that the condition is falsely
deduced. Furthermore, we discuss whether CFF is capable for key
distributions in ad hoc networks.
8. Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
3  abs Mixing properties of triangular feedback shift registers
Bernd Schomburg
foundations/feedback shift registers, stream ciphers, Markov chains, rapid mixing

Abstract: The purpose of this note is to show that Markov chains induced by non-singular triangular feedback shift registers and non-degenerate sources are rapidly mixing. The results may directly be applied to the post-processing of random generators and to stream ciphers in CFB mode.
9. Mixing properties of triangular feedback shift registers
3  abs Update on SHA-1
Vincent Rijmen and Elisabeth Oswald
secret-key cryptography/hash functions

Abstract: We report on the experiments we performed in order to assess the
security of SHA-1 against the attack by Chabaud and Joux. We present some ideas for optimizations of the attack and some properties of the message expansion routine.
Finally, we show that for a reduced version of SHA-1, with 53
rounds instead of 80, it is possible to find collisions in less
than $2^{80}$ operations.
10. Update on SHA-1
3  abs An Improved Elegant Method to Re-initialize Hash Chains
Yuanchao Zhao and Daoben Li
foundations/hash chains

Abstract: Hash chains are widely used in various cryptographic systems such as electronic micropayments and one-time passwords etc. However, hash chains suffer from the limitation that they have a finite number of links which when used up requires the system to re-initialize new hash chains. So system design has to reduce the overhead when hash chains are re-initialized. Recently, Vipul Goyal proposed an elegant one-time-signature-based method to re-initialize hash chains, in this efficient method an infinite number of finite length hash chains can be tied together so that hash chains can be securely re-initialized in a non-repudiable manner. Vipul Goyal¡¯s method is improved in this paper to reach a little more efficient method, which, more importantly, is a natural extension of the concept of conventional hash chains.
11. An Improved Elegant Method to Re-initialize Hash Chains
1  abs Efficient Certificateless Public Key Encryption
Zhaohui Cheng and Richard Comley
public-key cryptography/

Abstract: In [3] Al-Riyami and Paterson introduced the notion of "Certificateless Public Key Cryptography" and presented an instantiation. In this paper, we revisit the formulation of certificateless public key encryption and construct a more efficient scheme and then extend it to an authenticated
encryption.
12. Efficient Certificateless Public Key Encryption
3  abs Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
Hung-Yu Chien
cryptographic protocols/elliptic curve cryptosystem, cryptanalysis, key escrow

Abstract: Recently, Cheng et al. proposed two tripartite key agreement protocols from pairings: one is certificate-based and the other is identity-based (ID-based). In this article, we show that the two schemes are vulnerable to the insider impersonation attack and the ID-based scheme even discloses the entities¡¦ private keys. Solutions to this problem are discussed.
13. Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols
4  abs A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
Ludovic Perret
public-key cryptography/cryptanalysis, Lyndon words

Abstract: In this paper, we present a chosen ciphertext attack against a
public key cryptosysten based on Lyndon words cite{sm}. We show
that, provided that an adversary has access to a decryption oracle,
a key equivalent to the secret key can be constructed efficiently,
i.e. in linear time.
14. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
3  abs Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh and Xavier Boyen and Eu-Jin Goh
public-key cryptography/Identity Based Encryption

Abstract: We present a Hierarchical Identity Based Encryption (HIBE) system
where the ciphertext consists of just three group elements and decryption
requires only two bilinear map computations,
independent of the hierarchy depth. Encryption is as efficient
as in other HIBE systems. We prove that the scheme is selective-ID secure
in the standard model and fully secure in the random oracle
model. Our system has a number of applications: it gives very
efficient forward secure public key and identity based cryptosystems (where ciph
ertexts are
short), it converts the NNL broadcast encryption system into an
efficient public key broadcast system, and it provides an efficient
mechanism for encrypting to the future. The system also supports
limited delegation where users can be given restricted private keys
that only allow delegation to certain descendants. Sublinear size private
keys can also be achieved at the expense of some ciphertext expansion.
15. Hierarchical Identity Based Encryption with Constant Size Ciphertext
3  abs Narrow T-functions
Magnus Daum
None/cryptanalysis, hash functions, solution graph, T-functions, $w$-narrow

Abstract: T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building blocks which can be used to construct efficient and secure schemes, for example block ciphers, stream ciphers or hash functions.
In the present paper, we define the narrowness of a T-function and study how this property affects the strength of a T-function as a cryptographic primitive.
We define a new data strucure, called a solution graph, that enables solving systems of equations given by T-functions. The efficiency of the algorithms which we propose for solution graphs depends significantly on the narrowness of the involved T-functions.
Thus the subclass of T-functions with small narrowness appears to be weak and should be avoided in cryptographic schemes.
Furthermore, we present some extensions to the methods of using solution graphs, which make it possible to apply these algorithms also to more ge [...]
16. Narrow T-functions
3  abs Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Roberto M. Avanzi
public-key cryptography/elliptic curve cryptosystem, hyperelliptic curve cryptosystem, side-channel attacks, countermeasures

Abstract: The present survey deals with the recent research in side channel
analysis and related attacks on implementations of cryptographic
primitives. The focus is on software contermeasures for primitives
built around algebraic groups. Many countermeasures are described,
together with their extent of applicability, and their weaknesses.
Some suggestions are made, conclusion are drawn, some directions for
future research are given. An extensive bibliography on recent
developments concludes the survey.
17. Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
3  abs Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Dan Boneh and Craig Gentry and Brent Waters
public-key cryptography/

Abstract: We describe two new public key broadcast encryption systems for
stateless receivers. Both systems are fully secure against any number
of colluders. In our first construction both ciphertexts and private
keys are of constant size (only two group elements), for any
subset of receivers. The public key size in this system is
linear in the total number of receivers. Our second system is a
generalization of the first that provides a tradeoff between
ciphertext size and public key size. For example, we achieve a
collusion resistant broadcast system for n users where both
ciphertexts and public keys are of size O(sqrt(n)) for any subset
of receivers. We discuss several applications of these systems.
18. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
3  abs The Full Abstraction of the UC Framework
Jes{\'u}s F. Almansa
foundations/foundations, formal cryptographic analysis

Abstract: We prove that security in the Universal Composability framework (UC) is equivalent to security in the probabilistic polynomial time calculus ppc. Security is defined under active and adaptive adversaries with synchronous and authenticated communication. In detail, we define an encoding from machines in UC to processes in ppc and show it is fully abstract with respect to UC-security and ppc-security, i.e., we show a protocol is UC-secure iff its encoding is ppc-secure. However, we restrict security in ppc to be quantified not over all possible contexts, but over those induced by UC-environments under encoding. This result is not overly-simplifying security in ppc, since the threat and communication models we assume are meaningful in both practice and theory.
19. The Full Abstraction of the UC Framework
3  abs (De)Compositions of Cryptographic Schemes and their Applications to Protocols
R. Janvier and Y. Lakhnech and L. Mazare
cryptographic protocols/Security, Cryptographic Protocols, Formal Encryption, Probabilistic Encryption, Dolev-Yao Model, Computational Model

Abstract: The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these cryptographic primitives.

A key step towards this result is a general definition of correction of cryptographic primitives, that unifies well known correctness criteria such as IND-CPA, IND-CCA, unforgeability etc.... and a theorem that allows to reduce the correctness of a composition of two cryptographic schemes to the correctness of each one.
20. (De)Compositions of Cryptographic Schemes and their Applications to Protocols
3  abs Partial Hiding in Public-Key Cryptography
Eabhnat N'{i} Fhloinn and Michael Purser
public-key cryptography/public-key cryptography, RSA, partial key exposure, partial hiding, iris, biometrics

Abstract: This paper explores the idea of partially exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers.
It is proposed to allow significant portions of the private key to be publicly available, reducing the amount of data which must be securely hidden.
The "secret" data could be XORed with an individual's biometric reading in order to maintain a high level of security, and we suggest using iris templates for this purpose.
Finally, we propose an implementation of this system for RSA, and consider the potential risks and advantages associated with such a scheme.
21. Partial Hiding in Public-Key Cryptography
3  abs An Improved and Efficient Countermeasure against Power Analysis Attacks
ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim
None/Side channel attack, DPA, RPA, ZPA, doubling attack, SPA, ECC, RSA

Abstract: Recently new types of differential power analysis attacks (DPA)
against elliptic curve cryptosystems (ECC) and RSA systems have been
introduced. Most existing countermeasures against classical DPA
attacks are vulnerable to these new DPA attacks which include
refined power analysis attacks (RPA), zero-value point attacks
(ZPA), and doubling attacks. The new attacks are different from
classical DPA in that RPA uses a special point with a zero-value
coordinate, while ZPA uses auxiliary registers to locate a zero
value. So, Mamiya et al proposed a new countermeasure against RPA,
ZPA, classical DPA and SPA attacks using a basic random initial
point. His countermeasure works well when applied to ECC, but it has
some disadvantages when applied to general exponentiation algorithms
(such as RSA and ElGamal) due to an inverse computation. This paper
presents an efficient and improved countermeasure against the above
new DPA attacks by using a random blinding concept on the messa [...]
22. An Improved and Efficient Countermeasure against Power Analysis Attacks
4  abs A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Masao Kasahara
public-key cryptography/algebraic coding, random coding, public-key cryptosystem Publication Info. SCIS 2005 (The 2005 Symposium on Cryptography and Information Security)

Abstract: In this paper, we present a new class of public-key cryptosystem (PKC) using algebraic coding on the basis of superimposition and randomness. The proposed PKC is featured by a generator matrix, in a characteristic form, where the generator matrix of an algebraic code is repeatedly used along with the generator matrix of a random code, as sub-matrices. This generator matrix, in the characteristic form, will be referred to as $K$-matrix. We show that the $K$-matrix yields the following advantages compared with the conventional schemes:
\begin{description}
\item [(i)] It realizes an abundant supply of PKCs, yielding more secure PKCs.
\item [(i\hspace{-.1em}i)] It realizes a fast encryption and decryption process.
end{description}
23. A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
2  abs On the Diffie-Hellman problem over $GL_{n}$
A. A. Kalele and V. R. Sule
public-key cryptography/Diffie Hellman problem , pairing based Diffie Hellman key exchange

Abstract: This paper considers the Diffie-Hellman problem (DHP) over the
matrix group $gln$ over finite fields and shows that for matrices
$A$ and exponents $k$, $l$ satisfying certain conditions called
the emph{modulus conditions}, the problem can be solved without
solving the discrete logarithm problem (DLP) involving only
polynomial number of operations in $n$. A specialization of this
result to DHP on $fpm^*$ shows that there exists a class of
session triples of a DH scheme for which the DHP can be solved in
time polynomial in $m$ by operations over $fp$ without solving
the DLP. The private keys of such triples are termed emph{weak}.
A sample of weak keys is computed and it is observed that their
number is not too insignificant to be ignored. Next a
specialization of the analysis is carried out for pairing based DH
schemes on supersingular elliptic curves and it is shown that for
an analogous class of session triples, the DHP can be solved
without solving the DLP in polynom [...]
24. On the Diffie-Hellman problem over $GL_{n}$
3  abs Analysis of Affinely Equivalent Boolean Functions
Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen
foundations/boolean functions,linearly equivalent, affine group

Abstract: By walsh
transform, autocorrelation function, decomposition, derivation and
modification of truth table, some new invariants are obtained.
Based on invariant theory, we get two results: first a general
algorithm which can be used to judge if two boolean functions are
affinely equivalent and to obtain the affine equivalence
relationship if they are equivalent. For example, all 8-variable
homogenous bent functions of degree 3 are classified into 2
classes", second, the classification of the Reed-Muller code
$R(4,6)/R(1,6),R(3,7)/R(1,7),$ which can be used to almost
enumeration of 8-variable bent functions.
25. Analysis of Affinely Equivalent Boolean Functions
3  abs Techniques for random maskin in hardware
Jovan Dj. Golic
implementation/power analysis, random masking, logic circuits

Abstract: A new technique for Boolean random masking of the logic AND operation in terms of NAND logic gates
is presented and its potential for masking arbitrary cryptographic functions is pointed out.
The new technique is much more efficient than a previously known technique, recently applied to AES.
It is also applied for masking the integer addition.
In addition, new techniques for the conversions from Boolean to arithmetic random masking and vice versa
are developed. They are hardware oriented and do not require additional random bits.
Unlike the previous, software-oriented techniques showing a substantial difference in the complexity
of the two conversions, they have a comparable complexity being about the same as that
of one integer addition only.
All the techniques proposed are in theory secure against the first-order differential
power analysis on the logic gate level.
They can be applied in hardware implementations of various cryptographic functions,
including AES, [...]
26. Techniques for random maskin in hardware
1  abs Tag-KEM/DEM: A New Framework for Hybrid Encryption
Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa
public-key cryptography/hybrid encryption

Abstract: This paper presents a novel framework for generic construction of hybrid encryption schemes which produces more efficient schemes than before. A known framework introduced by Shoup combines a key encapsulation mechanism (KEM) and a data encryption mechanism (DEM). While it is believed that both of the components must be secure against chosen ciphertext attacks, Kurosawa and Desmedt showed a particular example of KEM that might not be CCA but can be securely combined with CCA DEM yielding more efficient hybrid encryption scheme. There are also many efficient hybrid encryption schemes in various settings that do not fit to the framework. These facts serve as motivation to seek another framework that yields more efficient schemes.

In addition to the potential efficiency of the resulting schemes, our
framework will provide insightful explanation about existing schemes
that do not fit to the previous framework. This could result in finding improvements for some schemes. Moreove [...]
27. Tag-KEM/DEM: A New Framework for Hybrid Encryption
3  abs Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger
None/

Abstract: In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called
atomic proxy re-encryption, in which a semi-trusted proxy
converts a ciphertext for Alice into a ciphertext for Bob without
seeing the underlying plaintext. We predict that fast and
secure re-encryption will become increasingly popular as a method for
managing encrypted file systems. Although efficiently computable, the
wide-spread adoption of BBS re-encryption has been hindered by
considerable security risks. Following recent work of Ivan and Dodis,
we present new re-encryption schemes that realize a stronger notion of
security and we demonstrate the usefulness of proxy re-encryption as a
method of adding access control to the SFS read-only file system.
Performance measurements of our experimental file system demonstrate
that proxy re-encryption can work effectively in practice.
28. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
1  abs A model and architecture for pseudo-random generation with applications to /dev/random
Boaz Barak and Shai Halevi
None//dev/random, Entropy, Mixing functions,Pseudo-randomness, Smart-cards, True randomness.

Abstract: We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an
observer with partial knowledge/control of the generator's entropy source. Our model and architecture have the following properties:


1 Resilience: The generator's output looks random to an observer with no knowledge of the internal state. This holds even if that observer has complete control over data that is used to refresh the internal state.

2 Forward security: Past output of the generator looks random to an observer, even if the observer learns the internal state at a later time.

3 Backward security/Break-in recovery: Future output of the generator looks random, even to an observer with knowledge of the current state, provided that the generator is refreshed with data of sufficient entropy.


Architectures such as above were suggested before. This work differs
from previous attempts in that we present a formal model for robust
pseudo- [...]
29. A model and architecture for pseudo-random generation with applications to /dev/random
4  abs Weak keys of pairing based Diffie Hellman schemes on elliptic curves
A. A. Kalele and V. R. Sule
public-key cryptography/Bilinear Diffie-Hellman problem, Triparty key exchange

Abstract: This paper develops a cryptanalysis of the pairing based Diffie
Hellman (DH) key exchange schemes an instance of which is the
triparty single round key exchange proposed in cite{joux}. The
analysis of emph{weak sessions} of the standard DH scheme
proposed in cite{kasu} is applied to show existence of weak
sessions for such schemes over supersingular curves. It is shown
that for such sessions the associated Bilinear Diffie Hellman
Problem is solvable in polynomial time, without computing the
private keys i.e. without solving the discrete logarithms. Other
applications of the analysis to Decisional Diffie Hellman Problem
and the identitiy based DH scheme are also shown to hold. The
triparty key exchange scheme is analyzed for illustration and it
is shown that the number of weak keys increases in this scheme as
compared to the standard two party DH scheme. It is shown that the
random choice of private keys by the users independent of each
other's knowledge is insecure in [...]
30. Weak keys of pairing based Diffie Hellman schemes on elliptic curves
1  abs The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
Iwan Duursma and Negar Kiyavash
public-key cryptography/Elliptic curve cryptography, Curves of genus two

Abstract: The group of m-torsion points on an elliptic curve, for a prime
number m, forms a two-dimensional vector space. It was suggested
and proven by Yoshida that under certain conditions the vector
decomposition problem (VDP) on a two-dimensional vector space is
at least as hard as the computational Diffie-Hellman problem
(CDHP) on a one-dimensional subspace. In this work we show that
even though this assessment is true, it applies to the VDP for
m-torsion points on an elliptic curve only if the curve is
supersingular. But in that case the CDHP on the one-dimensional
subspace has a known sub-exponential solution. Furthermore, we
present a family of hyperelliptic curves of genus two that are
suitable for the VDP.
31. The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
3  abs On the Notion of Statistical Security in Simulatability Definitions
Dennis Hofheinz and Dominique Unruh
cryptographic protocols/Reactive simulatability, universal composability, statistical security, protocol composition

Abstract: We investigate the definition of statistical security (i.e.,
security against unbounded adversaries) in the framework of reactive
simulatability. This framework allows to formulate and analyze
multi-party protocols modularly by providing a composition theorem
for protocols. However, we show that the notion of statistical
security, as defined by Backes, Pfitzmann and Waidner for the
reactive simulatability framework, does not allow for secure
composition of protocols. This in particular invalidates the proof
of the composition theorem.

We give evidence that the reason for the non-composability of
statistical security is no artifact of the framework itself, but of
the particular formulation of statistical security. Therefore, we
give a modified notion of statistical security in the reactive
simulatability framework. We prove that this notion allows for
secure composition of protocols.

As to the best of our knowledge, no formal definit [...]
32. On the Notion of Statistical Security in Simulatability Definitions
3  abs A Flexible Framework for Secret Handshakes
Gene Tsudik and Shouhuai Xu
cryptographic protocols/secret handshakes, privacy-preservation, anonymity, credential systems, unobservability, unlinkability, key management

Abstract: In the society increasingly concerned with the erosion of privacy,
privacy-preserving techniques are becoming very important.
Secret handshakes offer anonymous and unobservable authentication
and serve as an important tool in the arsenal of privacy-preserving
techniques. Relevant prior research focused on 2-party secret
handshakes with one-time credentials, whereby two parties establish
a secure, anonymous and unobservable communication channel only if
they are members of the same group.

This paper breaks new ground on two accounts: (1) it shows how
to obtain secure and efficient secret handshakes with reusable
credentials, and (2) it provides the first treatment of multi-party
secret handshakes, whereby m>=2 parties establish a secure,
anonymous and unobservable communication channel only if they all
belong to the same group. An interesting new issue encountered
in multi-party secret handshakes is the need to ensure that all
parties are distinct. (This is [...]
33. A Flexible Framework for Secret Handshakes
4  abs An Efficient CDH-based Signature Scheme With a Tight Security Reduction
Benoit Chevallier-Mames
None/signature schemes, discrete logarithm problem, Diffie-Hellman problem, EDL

Abstract: At Eurocrypt 03, Goh and Jarecki showed that, contrary to other
signature schemes in the discrete-log setting, the EDL signature
scheme has a tight security reduction, namely to the
Computational Diffie-Hellman (CDH) problem, in the Random Oracle
(RO) model. They also remarked that EDL can be turned into an
off-line/on-line signature scheme using the technique of Shamir
and Tauman, based on chameleon hash functions.

In this paper, we propose a new signature scheme that also has a
tight security reduction to CDH but whose resulting signatures
are smaller than EDL signatures. Further, similarly to the
Schnorr signature scheme (but contrary to EDL), our signature is
naturally efficient on-line: no additional trick is needed for
the off-line phase and the verification process is unchanged.

For example, in elliptic curve groups, our scheme results in a
25% improvement on the state-of-the-art discrete-log based
schemes, with the same security level. This [...]
34. An Efficient CDH-based Signature Scheme With a Tight Security Reduction
3  abs Concurrent Composition of Secure Protocols in the Timing Model
Yael Kalai and Yehuda Lindell and Manoj Prabhakaran
cryptographic protocols/multiparty computation, concurrent general composition, timing model

Abstract: In the setting of secure multiparty computation, a set of mutually
distrustful parties wish to securely compute some joint function
of their inputs. In the stand-alone case, it has been shown that
{em every} efficient function can be securely computed.
However, in the setting of concurrent composition, broad
impossibility results have been proven for the case of no honest
majority and no trusted setup phase. These results hold both for
the case of general composition (where a secure protocol is run
many times concurrently with arbitrary other protocols) and self
composition (where a single secure protocol is run many times
concurrently).

In this paper, we investigate the feasibility of obtaining
security in the concurrent setting, assuming that each party has a
local clock and that these clocks proceed at approximately the
same rate. We show that under this mild timing assumption, it is
possible to securely compute {em any} multiparty functionality
under concurrent [...]
35. Concurrent Composition of Secure Protocols in the Timing Model
1  abs Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
Claude Castelluccia and Einar Mykletun and Gene Tsudik
public-key cryptography/SSL, RSA, Client-aided

Abstract: Much of today's distributed computing takes place in a client/server model.
Despite advances in fault tolerance -- in particular, replication and load
distribution -- server overload remains to be
a major problem. In the Web context, one of the main overload factors is the
direct consequence of expensive Public Key operations performed by servers
as part of each SSL handshake. Since most SSL-enabled servers use RSA,
the burden of performing many costly decryption operations can be
very detrimental to server performance. This paper examines a
promising technique for re-balancing RSA-based client/server
handshakes. This technique facilitates more favorable load distribution
by requiring clients to perform more work (as part of encryption) and
servers to perform commensurately less work, thus resulting in better
SSL throughput. Proposed techniques are based on careful adaptation of
variants of Server-Aided RSA originally constructed by
Matsumoto, et al. Experimental resu [...]
36. Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
5  abs Distinguishing Stream Ciphers with Convolutional Filters
Joan Daemen and Gilles Van Assche
secret-key cryptography/Stream ciphers, cryptanalysis

Abstract: This paper presents a new type of distinguisher for the shrinking generator and the alternating-step generator with known feedback polynomial and for the multiplexor generator. For the former the distinguisher is more efficient than existing ones and for the latter it results in a complete breakdown of security. The distinguisher is conceptually very simple and lends itself to theoretical analysis leading to reliable predictions of its probability of success.
37. Distinguishing Stream Ciphers with Convolutional Filters
3  abs Unfairness of a protocol for certified delivery
Juan M. Estevez-Tapiador and Almudena Alcaide
cryptographic protocols/fair exchange, non-repudiation, attacks

Abstract: Recently, Nenadi'c emph{et al.} (2004) proposed the RSA-CEGD
protocol for certified delivery of e-goods. This is a relatively
complex scheme based on verifiable and recoverable encrypted
signatures (VRES) to guarantee properties such as strong fairness
and non-repudiation, among others. In this paper, we demonstrate how
this protocol cannot achieve fairness by presenting a severe attack
and also pointing out some other weaknesses.
38. Unfairness of a protocol for certified delivery
3  abs On the Security of a Group Signature Scheme with Strong Separability
Lihua Liu and Zhengjun Cao
cryptographic protocols/Group signature, Untraceability,Universal forgeability.

Abstract: A group signature scheme allows a
group member of a given group to sign messages on behalf of
the group in an anonymous and unlinkable fashion. In case of
a dispute, however, a designated group manager can reveal
the signer of a valid group signature. Many applications of
group signatures require that the group manager can be split
into a membership manager and a revocation manager. Such a
group signature scheme with strong separability was proposed
in paper [1]. Unfortunately, the scheme is insecure which has been shown in [2][3][4]. In this paper
we show that the scheme is untraceable by a simple and direct attack. Besides, we show its universal forgeability by a
general attack which only needs to choose five random numbers.
We minutely explain the technique to shun the challenge in
the scheme.
39. On the Security of a Group Signature Scheme with Strong Separability
4  abs Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.
secret-key cryptography/boolean functions, cryptanalisis, discrete functions

Abstract: We are using the group-theory methods for justification of
algebraic method in cryptanalysis. The obtained results are using
for investigation of Boolean functions cryptographic properties.
40. Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
4  abs An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
Hsiao-Ying Lin and Wen-Guey Tzeng
None/secure computation, the greater than problem

Abstract: We proposed a two-round protocol for solving the
Millionaires Problem in the setting of semi-honest
parties.
Our protocol uses either multiplicative or additive
homomorphic encryptions.
Previously proposed protocols used additive or XOR
homomorphic encryption schemes only.
The computation and communication costs of our protocol
are in the same asymptotic order as those of
the other efficient protocols.
Nevertheless, since multiplicative homomorphic encryption
scheme is more efficient than an additive one practically,
our construction saves computation time and communication
bandwidth in practicality.
In comparison with the most efficient previous solution, our
protocol saves 89% computation time and 25% communication bits.
41. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption
1  abs On the affine classification of cubic bent functions
Sergey Agievich
secret-key cryptography/boolean functions, bent functions

Abstract: We consider cubic boolean bent functions, each cubic monomial of which contains the same variable. We investigate canonical forms of these functions under affine transformations of variables.
In particular, we refine the affine classification of cubic bent functions of 8 variables.
42. On the affine classification of cubic bent functions
3  abs Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Nick Howgrave-Graham and Joseph H. Silverman and William Whyte
public-key cryptography/encryption, ntru, lattice techniques

Abstract: We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.

Note: This is an expanded version of a paper presented at CT-RSA 2005.
43. Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
3  abs New Approaches for Deniable Authentication
Mario Di Raimondo and Rosario Gennaro
cryptographic protocols/Authentication, Deniability, Zero-Knowledge, Concurrency

Abstract: Deniable Authentication protocols allow a Sender to authenticate a
message for a Receiver, in a way that the Receiver cannot convince
a third party that such authentication (or any authentication) ever
took place.

We point out a subtle definitional issue for deniability. In particular
we propose the notion of {em forward deniability}, which requires that
the authentications remain deniable even if the {em Sender} wants to later
prove that she authenticated a message. We show that generic
results where deniability is obtained by reduction to a computational
zero-knowledge protocol for an NP-complete language
do not achieve forward deniability.

We then present two new approaches to the problem of deniable authentication.
On the theoretical side, the novelty of our schemes is that they
do not require the use of CCA-secure encryption (all previous known solutions
did), thus showing a different generic approach to the problem of
deniable authentication. On the practica [...]
44. New Approaches for Deniable Authentication
3  abs Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Qiang Tang and Chris J. Mitchell
cryptographic protocols/wireless authentication, key agreement

Abstract: In this paper we analyse an anonymous wireless authentication and
conference key distribution scheme which is also designed to
provide mobile participants with user identification privacy
during the conference call. The proposed scheme consists of three
sub-protocols: the Call Set-Up Authentication Protocol, the
Hand-Off Authentication Protocol, and the Anonymous Conference
Call Protocol. We show that the proposed scheme suffers from a
number of security vulnerabilities.
45. Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
4  abs Cryptanalysis of two identification schemes based on an ID-based cryptosystem
Qiang Tang and Chris J. Mitchell
cryptographic protocols/identification scheme Identity-based cryptosystem

Abstract: Two identification schemes based on the Maurer-Yacobi ID-based
cryptosystem are analysed and shown to suffer from serious
security problems.
46. Cryptanalysis of two identification schemes based on an ID-based cryptosystem
3  abs Adversarial Model for Radio Frequency Identification
Gildas Avoine
None/RFID, Adversarial Model, Privacy, Untraceability, Cryptanalysis

Abstract: Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. They consist of transponders inserted into objects, of readers, and usually of a database which contains information about the objects. The key point is that authorised readers must be able to identify tags without an adversary being able to trace them. Traceability is often underestimated by advocates of the technology and sometimes exaggerated by its detractors. Whatever the true picture, this problem is a reality when it blocks the deployment of this technology and some companies, faced with being boycotted, have already abandoned its use. Using cryptographic primitives to thwart the traceability issues is an approach which has been explored for several years. However, the research carried out up to now has not provided satisfactory results as no universal formalism has been defined.
In this paper, we propose an adversarial model suitable for RFID [...]
47. Adversarial Model for Radio Frequency Identification
3  abs David Chaum's Voter Verification using Encrypted Paper Receipts
Poorvi L. Vora
cryptographic protocols/election schemes

Abstract: In this document, we provide an exposition of David Chaum's voter
verification method that uses encrypted paper receipts. This
document provides simply an exposition of the protocol, and does
not address any of the proofs covered in Chaum's papers.
48. David Chaum's Voter Verification using Encrypted Paper Receipts
5  abs A Note on Shor's Quantum Algorithm for Prime Factorization
Zhengjun Cao
foundations/ Shor's quantum algorithm, RSA modulus.

Abstract: It's well known that Shor[1] proposed a
polynomial time algorithm for prime factorization by using quantum
computers. For a given number $n$, he gave an algorithm for
finding the order $r$ of an element $x$ (mod $n$) instead of giving an algorithm for factoring $n$ directly. The indirect
algorithm is feasible because factorization can be reduced to
finding the order of an element by using randomization[2]. But a
point should be stressed that the order of the number must be
even. Actually, the restriction can be removed in a particular
case. In this paper, we show that factoring RSA modulus (a product
of two primes) only needs to find the order of $2$, whether it is
even or not.
49. A Note on Shor's Quantum Algorithm for Prime Factorization
3  abs Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Ziv Kfir and Avishai Wool
applications/RFID

Abstract: A contactless smartcard is a smartcard that can communicate with other
devices without any physical connection, using Radio-Frequency
Identifier (RFID) technology. Contactless smartcards are becoming
increasingly popular, with applications like credit-cards,
national-ID, passports, physical access. The security of such
applications is clearly critical. A key feature of RFID-based systems
is their very short range: typical systems are designed to operate at
a range of ~10cm. In this study we show that contactless
smartcard technology is vulnerable to relay attacks: An attacker can
trick the reader into communicating with a victim smartcard that is
very far away. A "low-tech" attacker can build a pick-pocket system
that can remotely use a victim contactless smartcard, without the
victim's knowledge. The attack system consists of two devices, which
we call the "ghost" and the "leech". We discuss basic designs for
the attacker's equipment, and explore their possible operat [...]
50. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
3  abs An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
Hung-Min Sun and Mu-En Wu
public-key cryptography/

Abstract: Based on the Chinese Remainder Theorem (CRT), Quisquater and Couvreur proposed an RSA variant, RSA-CRT, to speedup RSA decryption. According to RSA-CRT, Wiener suggested another RSA variant, Rebalanced RSA-CRT, to further speedup RSA-CRT decryption by shifting decryption cost to encryption cost. However, such an approach will make RSA encryption very time-consuming because the public exponent e in Rebalanced RSA-CRT will be of the same order of magnitude as £p(N). In this paper we study the following problem: does there exist any secure variant of Rebalanced RSA-CRT, whose public exponent e is much shorter than £p(N)? We solve this problem by designing a variant of Rebalanced RSA-CRT with d_{p} and d_{q} of 198 bits. This variant has the public exponent e=2^511+1 such that its encryption is about 3 times faster than that of the original Rebalanced RSA-CRT.
51. An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
1  abs Untraceability of Two Group Signature Schemes
Zhengjun Cao
cryptographic protocols/Group signature, Untraceability.

Abstract: A group signature scheme allows a
group member of a given group to sign messages on behalf of
the group in an anonymous fashion. In case of
a dispute, however, a designated group manager can reveal
the signer of a valid group signature. In the paper, we
show the untraceability of two group signatures in [1, 5] by new and very simple attacks.
Although those flaws, such as, forgeability,
untraceability and linkability have been shown in [2, 7, 8, 9], we should point out that our attacks are more simple.
53. Untraceability of Two Group Signature Schemes
4  abs Key Derivation and Randomness Extraction
Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval
cryptographic protocols/Key exchange, Randomness extractors, Key derivation

Abstract: Key derivation refers to the process by which an agreed upon large
random number, often named master secret, is used to derive keys to
encrypt and authenticate data. Practitioners and standardization
bodies have usually used the random oracle model to get key material
from a Diffie-Hellman key exchange. However, proofs in the standard model
require randomness extractors to formally extract the entropy of the
random master secret into a seed prior to derive other keys.

This paper first deals with the protocol $Sigma_0$, in which the key
derivation phase is (deliberately) omitted, and security inaccuracies
in the analysis and design of the Internet Key Exchange
(IKE version 1) protocol, corrected in IKEv2.
They do not endanger the practical use of IKEv1, since the security
could be proved, at least, in the random oracle model.
However, in the standard model, there is not yet any formal global security
proof, but just separated analyses which do not fit together [...]
54. Key Derivation and Randomness Extraction
3  abs One More Cup of Coffee
Bob Dylan (???)
None/Cup, Coffee, Valley

Abstract: One more cup of coffee for the road,
One more cup of coffee 'fore i go
To the valley below.
101. One More Cup of Coffee


[Guidelines] [Review Home] [List submissions] [Preferences] [Change Password] [Documentation]