| pref | 0 | 1 | 2 | 3 | 4 | 5 | detail | 
|---|
| 2 |  |  |  |  |  |  |  On Obfuscating Point Functions Hoeteck Wee
 foundations/obfuscation, point functions
 
 Abstract: We study the problem of obfuscation in the context of point functions
 (also known as delta functions). A point function is a Boolean
 function that assumes the value 1 at exactly one point. Our main
 results are as follows:
 
 - We provide a simple construction of efficient obfuscators for
 point functions for a slightly relaxed notion of obfuscation - wherein
 the size of the simulator has an inverse polynomial dependency on the
 distinguishing probability - which is nonetheless impossible for
 general circuits. This is the first known construction of obfuscators
 for a non-trivial family of functions under general computational
 assumptions. Our obfuscator is based on a probabilistic hash function
 constructed from a very strong one-way permutation, and does
 not require any set-up assumptions. Our construction also yields
 an obfuscator for point functions with multi-bit output.
 
 - We show that such a strong one-way permutation - wherein any
 polynomial-sized circuit inverts  [...]
 | 1. | On Obfuscating Point Functions | 
| 2 |  |  |  |  |  |  |  Logcrypt: Forward Security and Public Verification for Secure Audit Logs Jason E. Holt and Kent E. Seamons
 cryptographic protocols/forward secrecy, audit logs, public-key cryptography
 
 Abstract: Logcrypt provides strong cryptographic assurances that data stored by
 a logging facility before a system compromise cannot be modified after
 the compromise without detection.  We build on prior work by showing
 how log creation can be separated from log verification, and
 describing several additional performance and convenience features not
 previously considered.
 | 2. | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | 
| 3 |  |  |  |  |  |  |  Cryptanalysis of Hiji-bij-bij (HBB) Vlastimil Klima
 secret-key cryptography/cryptanalysis, Hiji-bij-bij, HBB, stream ciphers, synchronous cipher, asynchronous cipher,  equivalent keys, known-plaintext attack
 
 Abstract: In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher (in the B mode) or as an asynchronous stream cipher (in the SS mode). In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2^66 and 256-bit key with the complexity 2^67. In the case of B mode with 256-bit key, we show a known-plaintext attack recovering the whole plaintext with the complexity 2^140. All attacks need only a small part of the plaintext to be known.
 | 3. | Cryptanalysis of Hiji-bij-bij (HBB) | 
| 2 |  |  |  |  |  |  |  Benes and Butterfly schemes revisited Jacques Patarin and Audrey Montreuil
 None/Pseudo-random functions, unconditional security, information-theoretic primitive, design of keyed hash functions
 
 Abstract: In~cite{AV96}, W. Aiello and R. Venkatesan have shown how to
 construct pseudo-random functions of $2n$ bits $
 ightarrow 2n$
 bits from pseudo-random functions of $n$ bits $
 ightarrow n$
 bits. They claimed that their construction, called "Benes",
 reaches the optimal bound ($mll 2^n$) of security against
 adversaries with unlimited computing power but limited by $m$
 queries in an adaptive chosen plaintext attack (CPA-2). However a
 complete proof of this result is not given in~cite{AV96} since
 one of the assertions of~cite{AV96} is wrong. Due to this, the
 proof given in~cite{AV96} is valid for most attacks, but not for
 all the possible chosen plaintext attacks. In this paper we will
 in a way fix this problem since for all $varepsilon>0$, we will
 prove CPA-2 security when $mll 2^{n(1-varepsilon)}$. However we
 will also see that the probability to distinguish Benes functions
 from random functions is sometime larger than the term in
 $frac{m^2}{2^{2n}}$ given in~cite{AV96}. On [...]
 | 4. | Benes and Butterfly schemes revisited | 
| 3 |  |  |  |  |  |  |  A sufficient condition for key-privacy Shai Halevi
 public-key cryptography/Anonymity, key-privacy
 
 Abstract: The notion of key privacy for encryption schemes was defined formally by Bellare, Boldyreva, Desai and Pointcheval in Asiacrypt 2001. This notion seems useful in settings where anonymity is important. In this short note we describe a (very simple) sufficient condition for key privacy. In a nutshell, a scheme that provides data privacy is guaranteed to provide also key privacy if the distribution of a *random encryption of a random message* is independent of the public key that is used for the encryption.
 | 5. | A sufficient condition for key-privacy | 
| 2 |  |  |  |  |  |  |  A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. Pradeep Kumar Mishra and Kishan Chand Gupta
 foundations/
 
 Abstract: Elliptic Curves over finite field have found application in many areas including cryptography. In the current article we define a metric on the set of elliptic curves defined over a prime field ${mathbf F}_p, p>3$.
 
 | 6. | A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. | 
| 3 |  |  |  |  |  |  |  The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu
 applications/Microsoft Word, Excel, Encryption, RC4, Initialization Vector
 
 Abstract: In this report, we point out a serious security flaw in Microsoft Word and Excel. The stream cipher RC4 with key length up to 128 bits is used in Microsoft Word and Excel to protect the documents. But when an encrypted document gets modified and saved, the initialization vector remains the same and thus the same keystream generated from RC4 is applied to encrypt the different versions of that document. The consequence is disastrous since a lot of information of the document could be recovered easily.
 
 | 7. | The Misuse of RC4 in Microsoft Word and Excel | 
| 2 |  |  |  |  |  |  |  Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 J. Wu and R. Wei
 cryptographic protocols/Key management
 
 Abstract: In IEEE INFOCOM 2004, Chan proposed a distributed key management
 scheme for mobile ad hoc networks, and deduced the condition under
 which the key sets distributed to the network nodes can form a
 cover-free family (CFF), which is the precondition that the scheme
 can work. In this paper, we indicate that the condition is falsely
 deduced. Furthermore, we discuss whether CFF is capable for key
 distributions in ad hoc networks.
 | 8. | Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | 
| 3 |  |  |  |  |  |  |  Mixing properties of triangular feedback shift registers Bernd Schomburg
 foundations/feedback shift registers, stream ciphers, Markov chains, rapid mixing
 
 Abstract: The purpose of this note is to show that Markov chains induced by non-singular triangular feedback shift registers and non-degenerate sources are rapidly mixing. The results may directly be applied to the post-processing of random generators and to stream ciphers in CFB mode.
 | 9. | Mixing properties of triangular feedback shift registers | 
| 3 |  |  |  |  |  |  |  Update on SHA-1 Vincent Rijmen and Elisabeth Oswald
 secret-key cryptography/hash functions
 
 Abstract: We report on the experiments we performed in order to assess the
 security of SHA-1 against the attack by Chabaud and Joux. We present some ideas for optimizations of the attack and some properties of the message expansion routine.
 Finally, we show that for a reduced version of SHA-1, with 53
 rounds instead of 80, it is possible to find collisions in less
 than $2^{80}$ operations.
 | 10. | Update on SHA-1 | 
| 3 |  |  |  |  |  |  |  An Improved Elegant Method to Re-initialize Hash Chains Yuanchao Zhao and Daoben Li
 foundations/hash chains
 
 Abstract: Hash chains are widely used in various cryptographic systems such as electronic micropayments and one-time passwords etc. However, hash chains suffer from the limitation that they have a finite number of links which when used up requires the system to re-initialize new hash chains. So system design has to reduce the overhead when hash chains are re-initialized. Recently, Vipul Goyal proposed an elegant one-time-signature-based method to re-initialize hash chains, in this efficient method an infinite number of finite length hash chains can be tied together so that hash chains can be securely re-initialized in a non-repudiable manner. Vipul Goyal¡¯s method is improved in this paper to reach a little more efficient method, which, more importantly, is a natural extension of the concept of conventional hash chains.
 | 11. | An Improved Elegant Method to Re-initialize Hash Chains | 
| 1 |  |  |  |  |  |  |  Efficient Certificateless Public Key Encryption Zhaohui Cheng and Richard Comley
 public-key cryptography/
 
 Abstract: In [3] Al-Riyami and Paterson introduced the notion of "Certificateless Public Key Cryptography" and presented an instantiation. In this paper, we revisit the formulation of certificateless public key encryption and construct a more efficient scheme and then extend it to an authenticated
 encryption.
 | 12. | Efficient Certificateless Public Key Encryption | 
| 3 |  |  |  |  |  |  |  Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols Hung-Yu Chien
 cryptographic protocols/elliptic curve cryptosystem, cryptanalysis, key escrow
 
 Abstract: Recently, Cheng et al. proposed two tripartite key agreement protocols from pairings: one is certificate-based and the other is identity-based (ID-based). In this article, we show that the two schemes are vulnerable to the insider impersonation attack and the ID-based scheme even discloses the entities¡¦ private keys. Solutions to this problem are discussed.
 | 13. | Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols | 
| 4 |  |  |  |  |  |  |  A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words Ludovic Perret
 public-key cryptography/cryptanalysis, Lyndon words
 
 Abstract: In this paper, we present a chosen ciphertext attack against a
 public key cryptosysten based on Lyndon words cite{sm}. We show
 that, provided that an adversary has access to a decryption oracle,
 a key equivalent to the secret key can be constructed efficiently,
 i.e. in linear time.
 | 14. | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | 
| 3 |  |  |  |  |  |  |  Hierarchical Identity Based Encryption with Constant Size Ciphertext Dan Boneh and Xavier Boyen and Eu-Jin Goh
 public-key cryptography/Identity Based Encryption
 
 Abstract: We present a Hierarchical Identity Based Encryption (HIBE) system
 where the ciphertext consists of just three group elements and decryption
 requires only two bilinear map computations,
 independent of the hierarchy depth.  Encryption is as efficient
 as in other HIBE systems. We prove that the scheme is selective-ID secure
 in the standard model and fully secure in the random oracle
 model.  Our system has a number of applications: it gives very
 efficient forward secure public key and identity based cryptosystems (where ciph
 ertexts are
 short), it converts the NNL broadcast encryption system into an
 efficient public key broadcast system, and it provides an efficient
 mechanism for encrypting to the future.  The system also supports
 limited delegation where users can be given restricted private keys
 that only allow delegation to certain descendants.  Sublinear size private
 keys can also be achieved at the expense of some ciphertext expansion.
 
 | 15. | Hierarchical Identity Based Encryption with Constant Size Ciphertext | 
| 3 |  |  |  |  |  |  |  Narrow T-functions Magnus Daum
 None/cryptanalysis, hash functions, solution graph, T-functions, $w$-narrow
 
 Abstract: T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building blocks which can be used to construct efficient and secure schemes, for example block ciphers, stream ciphers or hash functions.
 In the present paper, we define the narrowness of a T-function and study how this property affects the strength of a T-function as a cryptographic primitive.
 We define a new data strucure, called a solution graph, that enables solving systems of equations given by T-functions. The efficiency of the algorithms which we propose for solution graphs depends significantly on the narrowness of the involved T-functions.
 Thus the subclass of T-functions with small narrowness appears to be weak and should be avoided in cryptographic schemes.
 Furthermore, we present some extensions to the methods of using solution graphs, which make it possible to apply these algorithms also to more ge [...]
 | 16. | Narrow T-functions | 
| 3 |  |  |  |  |  |  |  Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives Roberto M. Avanzi
 public-key cryptography/elliptic curve cryptosystem, hyperelliptic curve cryptosystem, side-channel attacks, countermeasures
 
 Abstract: The present survey deals with the recent research in side channel
 analysis and related attacks on implementations of cryptographic
 primitives.  The focus is on software contermeasures for primitives
 built around algebraic groups.  Many countermeasures are described,
 together with their extent of applicability, and their weaknesses.
 Some suggestions are made, conclusion are drawn, some directions for
 future research are given.  An extensive bibliography on recent
 developments concludes the survey.
 
 | 17. | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | 
| 3 |  |  |  |  |  |  |  Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh and Craig Gentry  and Brent Waters
 public-key cryptography/
 
 Abstract: We describe two new public key broadcast encryption systems for
 stateless receivers.  Both systems are fully secure against any number
 of colluders. In our first construction both ciphertexts and private
 keys are of constant size (only two group elements), for any
 subset of receivers.  The public key size in this system is
 linear in the total number of receivers.  Our second system is a
 generalization of the first that provides a tradeoff between
 ciphertext size and public key size.  For example, we achieve a
 collusion resistant broadcast system for n users where both
 ciphertexts and public keys are of size O(sqrt(n)) for any subset
 of receivers.  We discuss several applications of these systems.
 
 | 18. | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | 
| 3 |  |  |  |  |  |  |  The Full Abstraction of the UC Framework Jes{\'u}s F. Almansa
 foundations/foundations, formal cryptographic analysis
 
 Abstract: We prove that security in the Universal Composability framework (UC) is equivalent to security in the probabilistic polynomial time calculus ppc. Security is defined under active and adaptive adversaries with synchronous and authenticated communication. In detail, we define an encoding from machines in UC to processes in ppc and show it is fully abstract with respect to UC-security and ppc-security, i.e., we show a protocol is UC-secure iff its encoding is ppc-secure. However, we restrict security in ppc to be quantified not over all possible contexts, but over those induced by UC-environments under encoding. This result is not overly-simplifying security in ppc, since the threat and communication models we assume are meaningful in both practice and theory.
 | 19. | The Full Abstraction of the UC Framework | 
| 3 |  |  |  |  |  |  |  (De)Compositions of Cryptographic Schemes and their Applications to Protocols R. Janvier and Y. Lakhnech and L. Mazare
 cryptographic protocols/Security, Cryptographic Protocols, Formal Encryption, Probabilistic Encryption, Dolev-Yao Model, Computational Model
 
 Abstract: The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these cryptographic primitives.
 
 A key step towards this result is a general definition of correction of cryptographic primitives, that unifies well known correctness criteria such as IND-CPA, IND-CCA, unforgeability etc.... and a theorem that allows to reduce the correctness of a composition of two cryptographic schemes to the correctness of each one.
 | 20. | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | 
| 3 |  |  |  |  |  |  |  Partial Hiding in Public-Key Cryptography Eabhnat N'{i} Fhloinn and Michael Purser
 public-key cryptography/public-key cryptography, RSA, partial key exposure, partial hiding, iris, biometrics
 
 Abstract: This paper explores the idea of partially exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers.
 It is proposed to allow significant portions of the private key to be publicly available, reducing the amount of data which must be securely hidden.
 The "secret" data could be XORed with an individual's biometric reading in order to maintain a high level of security, and we suggest using iris templates for this purpose.
 Finally, we propose an implementation of this system for RSA, and consider the potential risks and advantages associated with such a scheme.
 | 21. | Partial Hiding in Public-Key Cryptography | 
| 3 |  |  |  |  |  |  |  An Improved and Efficient Countermeasure against Power Analysis Attacks ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and  Sung-Hyun Kim
 None/Side channel attack, DPA, RPA, ZPA, doubling attack, SPA, ECC, RSA
 
 Abstract: Recently new types of differential power analysis attacks (DPA)
 against elliptic curve cryptosystems (ECC) and RSA systems have been
 introduced. Most existing countermeasures against classical DPA
 attacks are vulnerable to these new DPA attacks which include
 refined power analysis attacks (RPA), zero-value point attacks
 (ZPA), and doubling attacks. The new attacks are different from
 classical DPA in that RPA uses a special point with a zero-value
 coordinate, while ZPA uses auxiliary registers to locate a zero
 value. So, Mamiya et al proposed a new countermeasure against RPA,
 ZPA, classical DPA and SPA attacks using a basic random initial
 point. His countermeasure works well when applied to ECC, but it has
 some disadvantages when applied to general exponentiation algorithms
 (such as RSA and ElGamal) due to an inverse computation. This paper
 presents an efficient and improved countermeasure against the above
 new DPA attacks by using a random blinding concept on the messa [...]
 | 22. | An Improved and Efficient Countermeasure against Power Analysis Attacks | 
| 4 |  |  |  |  |  |  |  A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness Masao Kasahara
 public-key cryptography/algebraic coding, random coding, public-key cryptosystem
Publication Info. SCIS 2005 (The 2005 Symposium on Cryptography and Information Security)
 
 Abstract: In this paper, we present a new class of public-key cryptosystem (PKC) using algebraic coding on the basis of superimposition and randomness. The proposed PKC is featured by a generator matrix, in a characteristic form, where the generator matrix of an algebraic code is repeatedly used along with the generator matrix of a random code, as sub-matrices. This generator matrix, in the characteristic form, will be referred to as $K$-matrix. We show that the $K$-matrix yields the following advantages compared with the conventional schemes:
 \begin{description}
 \item [(i)] It realizes an abundant supply of PKCs, yielding more secure PKCs.
 \item [(i\hspace{-.1em}i)] It realizes a fast encryption and decryption process.
 end{description}
 | 23. | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | 
| 2 |  |  |  |  |  |  |  On the Diffie-Hellman problem over $GL_{n}$ A. A. Kalele and V. R. Sule
 public-key cryptography/Diffie Hellman problem , pairing based Diffie Hellman key exchange
 
 Abstract: This paper considers the Diffie-Hellman problem (DHP) over the
 matrix group $gln$ over finite fields and shows that for matrices
 $A$ and exponents $k$, $l$ satisfying certain conditions called
 the emph{modulus conditions}, the problem can be solved without
 solving the discrete logarithm problem (DLP) involving only
 polynomial number of operations in $n$. A specialization of this
 result to DHP on $fpm^*$ shows that there exists a class of
 session triples of a DH scheme for which the DHP can be solved in
 time polynomial in $m$ by operations over $fp$ without solving
 the DLP. The private keys of such triples are termed emph{weak}.
 A sample of weak keys is computed and it is observed that their
 number is not too insignificant to be ignored. Next a
 specialization of the analysis is carried out for pairing based DH
 schemes on supersingular elliptic curves and it is shown that for
 an analogous class of session triples, the DHP can be solved
 without solving the DLP in polynom [...]
 | 24. | On the Diffie-Hellman problem over $GL_{n}$ | 
| 3 |  |  |  |  |  |  |  Analysis of Affinely Equivalent Boolean Functions Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen
 foundations/boolean functions,linearly equivalent, affine group
 
 Abstract: By walsh
 transform, autocorrelation function, decomposition, derivation and
 modification of truth table, some new invariants are obtained.
 Based on invariant theory, we get two results: first a general
 algorithm which can be used to judge if two boolean functions are
 affinely equivalent and to obtain the affine equivalence
 relationship if they are equivalent. For example, all 8-variable
 homogenous bent functions of degree 3 are classified into 2
 classes", second, the classification of the Reed-Muller code
 $R(4,6)/R(1,6),R(3,7)/R(1,7),$ which can be used to almost
 enumeration of 8-variable bent functions.
 | 25. | Analysis of Affinely Equivalent Boolean Functions | 
| 3 |  |  |  |  |  |  |  Techniques for random maskin in hardware Jovan Dj. Golic
 implementation/power analysis, random masking, logic circuits
 
 Abstract: A new technique for Boolean random masking of the logic AND operation in terms of NAND logic gates
 is presented and its potential for masking arbitrary cryptographic functions is pointed out.
 The new technique is much more efficient than a previously known technique, recently applied to AES.
 It is also applied for masking the integer addition.
 In addition, new techniques for the conversions from Boolean to arithmetic random masking and vice versa
 are developed. They are hardware oriented and do not require additional random bits.
 Unlike the previous, software-oriented techniques showing a substantial difference in the complexity
 of the two conversions, they have a comparable complexity being about the same as that
 of one integer addition only.
 All the techniques proposed are in theory secure against the first-order differential
 power analysis on the logic gate level.
 They can be applied in hardware implementations of various cryptographic functions,
 including AES,  [...]
 | 26. | Techniques for random maskin in hardware | 
| 1 |  |  |  |  |  |  |  Tag-KEM/DEM: A New Framework for Hybrid Encryption Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa
 public-key cryptography/hybrid encryption
 
 Abstract: This paper presents a novel framework for generic construction of hybrid encryption schemes which produces more efficient schemes than before.  A known framework introduced by Shoup combines a key encapsulation mechanism (KEM) and a data encryption mechanism (DEM). While it is believed that both of the components must be secure against chosen ciphertext attacks, Kurosawa and Desmedt showed a particular example of KEM that might not be CCA but can be securely combined with CCA DEM yielding more efficient hybrid encryption scheme.  There are also many efficient hybrid encryption schemes in various settings that do not fit to the framework.  These facts serve as motivation to seek another framework that yields more efficient schemes.
 
 In addition to the potential efficiency of the resulting schemes, our
 framework will provide insightful explanation about existing schemes
 that do not fit to the previous framework.  This could result in finding improvements for some schemes.  Moreove [...]
 | 27. | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 
| 3 |  |  |  |  |  |  |  Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger
 None/
 
 Abstract: In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called
 atomic proxy re-encryption, in which a semi-trusted proxy
 converts a ciphertext for Alice into a ciphertext for Bob without
 seeing the underlying plaintext.  We predict that fast and
 secure re-encryption will become increasingly popular as a method for
 managing encrypted file systems.  Although efficiently computable, the
 wide-spread adoption of BBS re-encryption has been hindered by
 considerable security risks.  Following recent work of Ivan and Dodis,
 we present new re-encryption schemes that realize a stronger notion of
 security and we demonstrate the usefulness of proxy re-encryption as a
 method of adding access control to the SFS read-only file system.
 Performance measurements of our experimental file system demonstrate
 that proxy re-encryption can work effectively in practice.
 | 28. | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | 
| 1 |  |  |  |  |  |  |  A model and architecture for pseudo-random generation with applications to /dev/random Boaz Barak and Shai Halevi
 None//dev/random, Entropy, Mixing functions,Pseudo-randomness, Smart-cards, True randomness.
 
 Abstract: We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an
 observer with partial knowledge/control of the generator's entropy source. Our model and architecture have the following properties:
 
 
 1 Resilience:  The generator's output looks random to an observer with no knowledge of the internal state. This holds even if that observer has complete control over data that is used to refresh the internal state.
 
 2 Forward security: Past output of the generator looks random to an observer, even if the observer learns the internal state at a later time.
 
 3 Backward security/Break-in recovery: Future output of the generator looks random, even to an observer with knowledge of the current state, provided that the generator is refreshed with data of sufficient entropy.
 
 
 Architectures such as above were suggested before. This work differs
 from previous attempts in that we present a formal model for robust
 pseudo- [...]
 | 29. | A model and architecture for pseudo-random generation with applications to /dev/random | 
| 4 |  |  |  |  |  |  |  Weak keys of pairing based Diffie Hellman schemes on elliptic curves A. A. Kalele and V. R. Sule
 public-key cryptography/Bilinear Diffie-Hellman problem, Triparty key exchange
 
 Abstract: This paper develops a cryptanalysis of the pairing based Diffie
 Hellman (DH) key exchange schemes an instance of which is the
 triparty single round key exchange proposed in cite{joux}. The
 analysis of emph{weak sessions} of the standard DH scheme
 proposed in cite{kasu} is applied to show existence of weak
 sessions for such schemes over supersingular curves. It is shown
 that for such sessions the associated Bilinear Diffie Hellman
 Problem is solvable in polynomial time, without computing the
 private keys i.e. without solving the discrete logarithms. Other
 applications of the analysis to Decisional Diffie Hellman Problem
 and the identitiy based DH scheme are also shown to hold. The
 triparty key exchange scheme is analyzed for illustration and it
 is shown that the number of weak keys increases in this scheme as
 compared to the standard two party DH scheme. It is shown that the
 random choice of private keys by the users independent of each
 other's knowledge is insecure in [...]
 | 30. | Weak keys of pairing based Diffie Hellman schemes on elliptic curves | 
| 1 |  |  |  |  |  |  |  The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves Iwan Duursma and Negar Kiyavash
 public-key cryptography/Elliptic curve cryptography, Curves of genus two
 
 Abstract: The group of m-torsion points on an elliptic curve, for a prime
 number m, forms a two-dimensional vector space. It was suggested
 and proven by Yoshida that under certain conditions the vector
 decomposition problem (VDP) on a two-dimensional vector space is
 at least as hard as the computational Diffie-Hellman problem
 (CDHP) on a one-dimensional subspace. In this work we show that
 even though this assessment is true, it applies to the VDP for
 m-torsion points on an elliptic curve only if the curve is
 supersingular. But in that case the CDHP on the one-dimensional
 subspace has a known sub-exponential solution. Furthermore, we
 present a family of hyperelliptic curves of genus two that are
 suitable for the VDP.
 | 31. | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | 
| 3 |  |  |  |  |  |  |  On the Notion of Statistical Security in Simulatability Definitions Dennis Hofheinz and Dominique Unruh
 cryptographic protocols/Reactive simulatability, universal composability, statistical security, protocol composition
 
 Abstract:   We investigate the definition of statistical security (i.e.,
 security against unbounded adversaries) in the framework of reactive
 simulatability. This framework allows to formulate and analyze
 multi-party protocols modularly by providing a composition theorem
 for protocols. However, we show that the notion of statistical
 security, as defined by Backes, Pfitzmann and Waidner for the
 reactive simulatability framework, does not allow for secure
 composition of protocols. This in particular invalidates the proof
 of the composition theorem.
 
 We give evidence that the reason for the non-composability of
 statistical security is no artifact of the framework itself, but of
 the particular formulation of statistical security. Therefore, we
 give a modified notion of statistical security in the reactive
 simulatability framework. We prove that this notion allows for
 secure composition of protocols.
 
 As to the best of our knowledge, no formal definit [...]
 | 32. | On the Notion of Statistical Security in Simulatability Definitions | 
| 3 |  |  |  |  |  |  |  A Flexible Framework for Secret Handshakes Gene Tsudik and Shouhuai Xu
 cryptographic protocols/secret handshakes, privacy-preservation, anonymity, credential systems, unobservability, unlinkability, key management
 
 Abstract: In the society increasingly concerned with the erosion of privacy,
 privacy-preserving techniques are becoming very important.
 Secret handshakes offer anonymous and unobservable authentication
 and serve as an important tool in the arsenal of privacy-preserving
 techniques. Relevant prior research focused on 2-party secret
 handshakes with one-time credentials, whereby two parties establish
 a secure, anonymous and unobservable communication channel only if
 they are members of the same group.
 
 This paper breaks new ground on two accounts: (1) it shows how
 to obtain secure and efficient secret handshakes with reusable
 credentials, and (2) it provides the first treatment of multi-party
 secret handshakes, whereby m>=2 parties establish a secure,
 anonymous and unobservable communication channel only if they all
 belong to the same group. An interesting new issue encountered
 in multi-party secret handshakes is the need to ensure that all
 parties are distinct. (This is [...]
 | 33. | A Flexible Framework for Secret Handshakes | 
| 4 |  |  |  |  |  |  |  An Efficient CDH-based Signature Scheme With a Tight Security Reduction Benoit Chevallier-Mames
 None/signature schemes, discrete logarithm problem, Diffie-Hellman problem, EDL
 
 Abstract: At Eurocrypt 03, Goh and Jarecki showed that, contrary to other
 signature schemes in the discrete-log setting, the EDL signature
 scheme has a tight security reduction, namely to the
 Computational Diffie-Hellman (CDH) problem, in the Random Oracle
 (RO) model.  They also remarked that EDL can be turned into an
 off-line/on-line signature scheme using the technique of Shamir
 and Tauman, based on chameleon hash functions.
 
 In this paper, we propose a new signature scheme that also has a
 tight security reduction to CDH but whose resulting signatures
 are smaller than EDL signatures.  Further, similarly to the
 Schnorr signature scheme (but contrary to EDL), our signature is
 naturally efficient on-line: no additional trick is needed for
 the off-line phase and the verification process is unchanged.
 
 For example, in elliptic curve groups, our scheme results in a
 25% improvement on the state-of-the-art discrete-log based
 schemes, with the same security level.  This [...]
 | 34. | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | 
| 3 |  |  |  |  |  |  |  Concurrent Composition of Secure Protocols in the Timing Model Yael Kalai and Yehuda Lindell and Manoj Prabhakaran
 cryptographic protocols/multiparty computation, concurrent general composition, timing model
 
 Abstract: In the setting of secure multiparty computation, a set of mutually
 distrustful parties wish to securely compute some joint function
 of their inputs. In the stand-alone case, it has been shown that
 {em every} efficient function can be securely computed.
 However, in the setting of concurrent composition, broad
 impossibility results have been proven for the case of no honest
 majority and no trusted setup phase. These results hold both for
 the case of general composition (where a secure protocol is run
 many times concurrently with arbitrary other protocols) and self
 composition (where a single secure protocol is run many times
 concurrently).
 
 In this paper, we investigate the feasibility of obtaining
 security in the concurrent setting, assuming that each party has a
 local clock and that these clocks proceed at approximately the
 same rate. We show that under this mild timing assumption, it is
 possible to securely compute {em any} multiparty functionality
 under concurrent [...]
 | 35. | Concurrent Composition of Secure Protocols in the Timing Model | 
| 1 |  |  |  |  |  |  |  Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes Claude Castelluccia and Einar Mykletun and Gene Tsudik
 public-key cryptography/SSL, RSA, Client-aided
 
 Abstract: Much of today's distributed computing takes place in a client/server model.
 Despite advances in fault tolerance -- in particular, replication and load
 distribution -- server overload remains to be
 a major problem. In the Web context, one of the main overload factors is the
 direct consequence of expensive Public Key operations performed by servers
 as part of each SSL handshake. Since most SSL-enabled servers use RSA,
 the burden of performing many costly decryption operations can be
 very detrimental to server performance. This paper examines a
 promising technique for re-balancing RSA-based client/server
 handshakes. This technique facilitates more favorable load distribution
 by requiring clients to perform more work (as part of encryption) and
 servers to perform commensurately less work, thus resulting in better
 SSL throughput.  Proposed techniques are based on careful adaptation of
 variants of Server-Aided RSA originally constructed by
 Matsumoto, et al. Experimental resu [...]
 | 36. | Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes | 
| 5 |  |  |  |  |  |  |  Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen and Gilles Van Assche
 secret-key cryptography/Stream ciphers, cryptanalysis
 
 Abstract: This paper presents a new type of distinguisher for the shrinking generator and the alternating-step generator with known feedback polynomial and for the multiplexor generator. For the former the distinguisher is more efficient than existing ones and for the latter it results in a complete breakdown of security. The distinguisher is conceptually very simple and lends itself to theoretical analysis leading to reliable predictions of its probability of success.
 
 | 37. | Distinguishing Stream Ciphers with Convolutional Filters | 
| 3 |  |  |  |  |  |  |  Unfairness of a protocol for certified delivery Juan M. Estevez-Tapiador and Almudena Alcaide
 cryptographic protocols/fair exchange, non-repudiation, attacks
 
 Abstract: Recently, Nenadi'c emph{et al.} (2004) proposed the RSA-CEGD
 protocol for certified delivery of e-goods. This is a relatively
 complex scheme based on verifiable and recoverable encrypted
 signatures (VRES) to guarantee properties such as strong fairness
 and non-repudiation, among others. In this paper, we demonstrate how
 this protocol cannot achieve fairness by presenting a severe attack
 and also pointing out some other weaknesses.
 | 38. | Unfairness of a protocol for certified delivery | 
| 3 |  |  |  |  |  |  |  On the Security of a Group Signature Scheme with Strong Separability Lihua Liu and Zhengjun Cao
 cryptographic protocols/Group signature, Untraceability,Universal forgeability.
 
 Abstract: A group signature scheme allows a
 group member of a given group to sign messages on behalf of
 the group in an anonymous and unlinkable fashion. In case of
 a dispute, however, a designated group manager can reveal
 the signer of a valid group signature. Many applications of
 group signatures require that the group manager can be split
 into a membership manager and a revocation manager. Such a
 group signature scheme with strong separability was proposed
 in paper [1]. Unfortunately, the scheme is insecure which has   been shown in [2][3][4]. In this  paper
 we show that the scheme  is untraceable by a simple and direct attack.  Besides, we show its universal forgeability by a
 general attack which only needs to choose five random numbers.
 We minutely explain the technique to shun the challenge in
 the scheme.
 | 39. | On the Security of a Group Signature Scheme with Strong Separability | 
| 4 |  |  |  |  |  |  |  Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.
 secret-key cryptography/boolean functions, cryptanalisis, discrete functions
 
 Abstract: We are using the group-theory methods for justification of
 algebraic method in cryptanalysis. The obtained results are using
 for investigation of  Boolean functions cryptographic properties.
 | 40. | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | 
| 4 |  |  |  |  |  |  |  An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption Hsiao-Ying Lin and Wen-Guey Tzeng
 None/secure computation, the greater than problem
 
 Abstract: We proposed a two-round protocol for solving the
 Millionaires Problem in the setting of semi-honest
 parties.
 Our protocol uses either multiplicative or additive
 homomorphic encryptions.
 Previously proposed protocols used additive or XOR
 homomorphic encryption schemes only.
 The computation and communication costs of our protocol
 are in the same asymptotic order as those of
 the other efficient protocols.
 Nevertheless, since multiplicative homomorphic encryption
 scheme is more efficient than an additive one practically,
 our construction saves computation time and communication
 bandwidth in practicality.
 In comparison with the most efficient previous solution, our
 protocol saves 89% computation time and 25% communication bits.
 | 41. | An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption | 
| 1 |  |  |  |  |  |  |  On the affine classification of cubic bent functions Sergey Agievich
 secret-key cryptography/boolean functions, bent functions
 
 Abstract: We consider cubic boolean bent functions, each cubic monomial of which contains the same variable. We investigate canonical forms of these functions under affine transformations of variables.
 In particular, we refine the affine classification of cubic bent functions of 8 variables.
 
 | 42. | On the affine classification of cubic bent functions | 
| 3 |  |  |  |  |  |  |  Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 Nick Howgrave-Graham and Joseph H. Silverman and William Whyte
 public-key cryptography/encryption, ntru, lattice techniques
 
 Abstract: We present, for the first time, an algorithm to choose parameter sets for NTRUEncrypt that give a desired level of security.
 
 Note: This is an expanded version of a paper presented at CT-RSA 2005.
 | 43. | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | 
| 3 |  |  |  |  |  |  |  New Approaches for Deniable Authentication Mario Di Raimondo and Rosario Gennaro
 cryptographic protocols/Authentication, Deniability, Zero-Knowledge, Concurrency
 
 Abstract: Deniable Authentication protocols allow a Sender to authenticate a
 message for a Receiver, in a way that the Receiver cannot convince
 a third party that such authentication (or any authentication) ever
 took place.
 
 We point out a subtle definitional issue for deniability. In particular
 we propose the notion of {em forward deniability}, which requires that
 the authentications remain deniable even if the {em Sender} wants to later
 prove that she authenticated a message. We show that generic
 results where deniability is obtained by reduction to a computational
 zero-knowledge protocol for an NP-complete language
 do not achieve forward deniability.
 
 We then present two new approaches to the problem of deniable authentication.
 On the theoretical side, the novelty of our schemes is that they
 do not require the use of CCA-secure encryption (all previous known solutions
 did), thus showing a different generic approach to the problem of
 deniable authentication. On the practica [...]
 | 44. | New Approaches for Deniable Authentication | 
| 3 |  |  |  |  |  |  |  Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme Qiang Tang and Chris J. Mitchell
 cryptographic protocols/wireless authentication, key agreement
 
 Abstract: In this paper we analyse an anonymous wireless authentication and
 conference key distribution scheme which is also designed to
 provide mobile participants with user identification privacy
 during the conference call. The proposed scheme consists of three
 sub-protocols: the Call Set-Up Authentication Protocol, the
 Hand-Off Authentication Protocol, and the Anonymous Conference
 Call Protocol. We show that the proposed scheme suffers from a
 number of security vulnerabilities.
 | 45. | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | 
| 4 |  |  |  |  |  |  |  Cryptanalysis of two identification schemes based on an ID-based cryptosystem Qiang Tang and Chris J. Mitchell
 cryptographic protocols/identification scheme Identity-based cryptosystem
 
 Abstract: Two identification schemes based on the Maurer-Yacobi ID-based
 cryptosystem are analysed and shown to suffer from serious
 security problems.
 | 46. | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | 
| 3 |  |  |  |  |  |  |  Adversarial Model for Radio Frequency Identification Gildas Avoine
 None/RFID, Adversarial Model, Privacy, Untraceability, Cryptanalysis
 
 Abstract: Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. They consist of transponders inserted into objects, of readers, and usually of a database which contains information about the objects. The key point is that authorised readers must be able to identify tags without an adversary being able to trace them. Traceability is often underestimated by advocates of the technology and sometimes exaggerated by its detractors. Whatever the true picture, this problem is a reality when it blocks the deployment of this technology and some companies, faced with being boycotted, have already abandoned its use. Using cryptographic primitives to thwart the traceability issues is an approach which has been explored for several years. However, the research carried out up to now has not provided satisfactory results as no universal formalism has been defined.
 In this paper, we propose an adversarial model suitable for RFID [...]
 | 47. | Adversarial Model for Radio Frequency Identification | 
| 3 |  |  |  |  |  |  |  David Chaum's Voter Verification using Encrypted Paper Receipts Poorvi L. Vora
 cryptographic protocols/election schemes
 
 Abstract: In this document, we provide an exposition of David Chaum's voter
 verification method that uses encrypted paper receipts. This
 document provides simply an exposition of the protocol, and does
 not address any of the proofs covered in Chaum's papers.
 | 48. | David Chaum's Voter Verification using Encrypted Paper Receipts | 
| 5 |  |  |  |  |  |  |  A Note on Shor's Quantum  Algorithm for Prime Factorization Zhengjun Cao
 foundations/ Shor's quantum algorithm, RSA modulus.
 
 Abstract: It's well known that  Shor[1]  proposed a
 polynomial time algorithm for prime factorization by using quantum
 computers. For a given number $n$, he gave an algorithm for
 finding the order $r$ of an element $x$  (mod $n$) instead of giving an  algorithm for factoring $n$ directly. The indirect
 algorithm is feasible  because   factorization can be reduced to
 finding the order of an element by using randomization[2]. But a
 point should be stressed that the order of the number must be
 even. Actually, the restriction can be removed in a particular
 case. In this paper, we show that factoring RSA modulus (a product
 of two primes)  only needs to find the order of $2$, whether it is
 even or not.
 | 49. | A Note on Shor's Quantum  Algorithm for Prime Factorization | 
| 3 |  |  |  |  |  |  |  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems Ziv Kfir and Avishai Wool
 applications/RFID
 
 Abstract: A contactless smartcard is a smartcard that can communicate with other
 devices without any physical connection, using Radio-Frequency
 Identifier (RFID) technology. Contactless smartcards are becoming
 increasingly popular, with applications like credit-cards,
 national-ID, passports, physical access. The security of such
 applications is clearly critical. A key feature of RFID-based systems
 is their very short range: typical systems are designed to operate at
 a range of ~10cm. In this study we show that contactless
 smartcard technology is vulnerable to relay attacks: An attacker can
 trick the reader into communicating with a victim smartcard that is
 very far away. A "low-tech" attacker can build a pick-pocket system
 that can remotely use a victim contactless smartcard, without the
 victim's knowledge. The attack system consists of two devices, which
 we call the "ghost" and the "leech". We discuss basic designs for
 the attacker's equipment, and explore their possible operat [...]
 | 50. | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | 
| 3 |  |  |  |  |  |  |  An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun and Mu-En Wu
 public-key cryptography/
 
 Abstract: Based on the Chinese Remainder Theorem (CRT), Quisquater and Couvreur proposed an RSA variant, RSA-CRT, to speedup RSA decryption. According to RSA-CRT, Wiener suggested another RSA variant, Rebalanced RSA-CRT, to further speedup RSA-CRT decryption by shifting decryption cost to encryption cost. However, such an approach will make RSA encryption very time-consuming because the public exponent e in Rebalanced RSA-CRT will be of the same order of magnitude as £p(N). In this paper we study the following problem: does there exist any secure variant of Rebalanced RSA-CRT, whose public exponent e is much shorter than £p(N)? We solve this problem by designing a variant of Rebalanced RSA-CRT with d_{p} and d_{q} of 198 bits. This variant has the public exponent e=2^511+1 such that its encryption is about 3 times faster than that of the original Rebalanced RSA-CRT.
 | 51. | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | 
| 1 |  |  |  |  |  |  |  Untraceability of Two Group Signature Schemes Zhengjun Cao
 cryptographic protocols/Group signature, Untraceability.
 
 Abstract: A group signature scheme allows a
 group member of a given group to sign messages on behalf of
 the group in an anonymous  fashion. In case of
 a dispute, however, a designated group manager can reveal
 the signer of a valid group signature.  In the paper, we
 show the untraceability of two group signatures in [1, 5] by  new and  very simple attacks.
 Although those flaws,  such as, forgeability,
 untraceability and linkability   have been shown in [2, 7, 8, 9],  we should point out that our attacks are more simple.
 | 53. | Untraceability of Two Group Signature Schemes | 
| 4 |  |  |  |  |  |  |  Key Derivation and Randomness Extraction Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval
 cryptographic protocols/Key exchange, Randomness extractors, Key derivation
 
 Abstract: Key derivation refers to the process by which an agreed upon large
 random number, often named master secret, is used to derive keys to
 encrypt and authenticate data. Practitioners and standardization
 bodies have usually used the random oracle model to get key material
 from a Diffie-Hellman key exchange. However, proofs in the standard model
 require randomness extractors to formally extract the entropy of the
 random master secret into a seed prior to derive other keys.
 
 This paper first deals with the protocol $Sigma_0$, in which the key
 derivation phase is (deliberately) omitted, and security inaccuracies
 in the analysis and design of the Internet Key Exchange
 (IKE version 1) protocol, corrected in IKEv2.
 They do not endanger the practical use of IKEv1, since the security
 could be proved, at least, in the random oracle model.
 However, in the standard model, there is not yet any formal global security
 proof, but just separated analyses which do not fit together  [...]
 | 54. | Key Derivation and Randomness Extraction | 
| 3 |  |  |  |  |  |  |  One More Cup of Coffee Bob Dylan (???)
 None/Cup, Coffee, Valley
 
 Abstract: One more cup of coffee for the road,
 One more cup of coffee 'fore i go
 To the valley below.
 | 101. | One More Cup of Coffee |