Progress on Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China edited by Kefei Chen Shanghai Jiaotong University China KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON, MOSCOW eBook ISBN: 1-4020-7987-7 Print ISBN: 1-4020-7986-9 ©2004 Kluwer Academic Publishers New York, Boston, Dordrecht, London, Moscow Print ©2004 Kluwer Academic Publishers Boston All rights reserved No part of this eBook may be reproduced or transmitted in any form or by any means, electronic, mechanical, recording, or otherwise, without written consent from the Publisher Created in the United States of America Visit Kluwer Online at: http://kluweronline.com and Kluwer's eBookstore at: http://ebooks.kluweronline.com International Workshop on Progress on Cryptography Organized by Department of Computer Science and Engineering, SJTU In cooeration with National Natural Science Foundation of China (NSFC) Aerospace Information Co., Ltd. Workshop Co-Chairs Kefei Chen (Shanghai Jiaotong University, China) Dake He (Southwest Jiaotong University, China) Program committee Kefei Chen (Chair, Shanghai Jiaotong University, China) Lidong Chen (Motorola Inc., USA) Cunsheng Ding (HKUST, Hong Kong, China) Dengguo Feng (Chinese Academy of Sciences, China) Guang Gong (University of Waterloo, Canada) Dake He (Southwest Jiaotong University, China) Xuejia Lai (S.W.I.S. GROUP, Switzerland) Bazhong Shen, (Broadcom Corp., USA) Huafei Zhu (Institute for Infocomm Research, Singapore) Organizing committee Kefei Chen (Shanghai Jiaotong University, China) Dawu Gu (Shanghai Jiaotong University, China) Baoan Guo (Chair, Tsinghua University, China) Liangsheng He (Chinese Academy of Sciences, China) Shengli Liu (Shanghai Jiaotong University, China) Weidong Qiu (Shanghai Jiaotong University, China) Dong Zheng (Shanghai Jiaotong University, China) This page intentionally left blank Contents Foreword xi Preface xiii Randomness and Discrepancy Transforms 1 Guang Gong Legendre Sequences and Modified Jacobi Sequences 9 Enjian Bai, Bin Zhang Resilient Functions with Good Cryptographic Properties 17 WEN Qiao-yan, ZHANG Jie Differential Factoring for Integers 25 Chuan-Kun Wu Simple and Efficient Systematic A-codes from Error Correcting Codes 33 Cunsheng Ding, Xiaojian Tian, Xuesong Wang On Coefficients of Binary Expression of Integer Sums 45 Bao Li, Zongduo Dai A new publicly verifiable proxy signcryption scheme 53 Zhang Zhang, Qingkuan Dong, Mian Cai Some New Proxy Signature Schemes from Pairings 59 Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin Construction of Digital Signature Schemes Based on DLP 67 Wei-Zhang Du , Kefei Chen DLP-based blind signatures and their application in E-Cash systems 73 Weidong Qiu A Group of Threshold Group-Signature Schemes with Privilege Subsets 81 Chen Weidong, Feng Dengguo viii PROGRESS ON CRYPTOGRAPHY A New Group Signature Scheme with Unlimited Group Size 89 FU Xiaotong, XU Chunxiang Identity Based Signature Scheme Based on Quadratic Residues 97 Weidong Qiu, Kefei Chen New Signature Scheme Based on Factoring and Discrete Logarithms 107 Shimin Wei New Transitive Signature Scheme based on Discreted Logarithm Problem 113 Zichen Li, Juanmei Zhang, Dong Zheng Blind signature schemes based on GOST signature 123 Zhenjie Huang, Yumin Wang One-off Blind Public Key 129 Zhang Qiupu, Guo Baoan Analysis on the two classes of Robust Threshold Key Escrow Schemes 137 Feng Dengguo, Chen Weidong Privacy-Preserving Approximately Equation Solving over Reals 145 Zhi Gan, Qiang Li, Kefei Chen An Authenticated Key Agreement Protocol Resistant to DoS attack 151 Lu Haining, Gu Dawu A comment on a multi-signature scheme 157 ZHENG Dong, CHEN Kefei, HE Liangsheng Cryptanalysis of LKK Proxy Signature 161 ZHENG Dong, LIU Shengli, CHEN Kefei Attack on Identity-Based Broadcasting Encryption Schemes 165 Shengli Liu, Zheng Dong, Kefei Chen Differential-Linear Cryptanalysis of Camellia 173 Wenling WU, Dengguo FENG Security Analysis of EV-DO System 181 Zhu, Hong Ru A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem 187 Huafei Zhu, Yongjian Liao Quantum cryptographic algorithm for classical binary information 195 Nanrun Zhou, Guihua Zeng Practical Quantum Key Distribution Network 201 Contents ix Jie Zhu, Guihua Zeng A Survey of P2P Network Security Issues based on Protocol Stack 209 ZHANG Dehua, ZHANG Yuqing DDoS Scouter: A simple IP traceback scheme 217 Chen Kai, Hu Xiaoxin, Hao Ruibing A Method of Digital Data Transformation–Base91 229 He Dake, He Wei An approach to the formal analysis of TMN protocol 235 ZHANG Yu-Qing, LIU Xiu-Ying This page intentionally left blank Foreword Teacher Xiao will turn 70 this year. As his students, we learnt from him not only scientific knowledge, but also the ethics in the life; not only through the lectures in the serious classroom, but also through the conversations outside the campus over the world, politics, economics, life. We all enjoyed the time of listening your lectures and we are proud to be your students. Since a quarter of century, teacher Xiao has educated hundreds of us in the fields of mathematics, information theory, communication, cryptology, etc. Today, the “old-classmates” have grown up into the society; many of them are taking the key positions all over the world. Especially, when we talk about the “Xidian branch schools” are spreading the seeds in many places like Beijing, Shanghai, ... I think he would be proud of the intellect, energy and enthusiasm that he gave us during our campus life and would be especially proud of his achievements and the achievements that his students have made since our Xidian life. Best wishes to Teacher Xiao’s seventieth birthday! XUEJIA LAI, ZURICH, SWITZERLAND This page intentionally left blank Preface This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last 25 years. Cryptography, in Chinese, consists of two characters meaning “secret cod- ing”. Thanks to Ch’in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the In- ternet, we realize that cryptography and its related applications have developed far beyond “secret coding”. China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are professor Xiao’s former students. We will never forget a moment in the late 1970’s, during the time when China was just opening its door to the world, when Professor Xiao explained the idea of public key cryptography at a lecture. We were so fascinated that many of us have since devoted our careers to cryptography research and applications. Professor Xiao had started a weekly cryptography seminar, where we discussed newly published cryptography research papers from all over the world. We greatly benefited by the method he taught us, which was to catch the main ideas of each piece of research work. He also influenced us deeply by his method of approaching a creative breakthrough. As he said, “only when you can stand on the top of the existing results, just as you stand on the highest peak to look at all the mountains, can you figure out where to go next.” With this advice, we took our first step in research by thoroughly understanding other people’s work. As a result, many of us generated our first few pieces of work through the seminars. “Professor Xiao’s graduate students” as a group, has been attracting the attention of the academic cryptography community since the first ChinaCrypt in 1984, at which his first few graduate students presented some very impressive xiv PROGRESS ON CRYPTOGRAPHY work. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This proceeding includes 32 papers. These papers cover a range of topics, from mathematical results of cryptography to practical applications. This proceeding includes a sample of research conducted by Professor Xiao’s former and current graduate students. In China, we use the term “peaches and plums” to refer to “pupils and disci- ples”. Now Professor Xiao’s peaches and plums have spread all over the world. We are recognized as a special group in the cryptography community with not only our distinguished achievements but also our outstanding spirit. Many peo- ple have asked about the underlying motivation behind this quarter-century leg- end in cryptography research, made by professor Xiao and his students. Among all possibilities, I would consider independent thinking and honest attitude as the most crucial aspects. Professor Xiao guided us not only to a fascinating scientific field where many of us made our life-long careers but also to a realm of thought which made us as who we are today. Please join me in wishing Professor Xiao a Happy 70th Birthday. LIDONG CHEN, PALATINE, IL, USA This proceedings is dedicated to Professor Guozheng XIAO on his 70th birthday This page intentionally left blank RANDOMNESS AND DISCREPANCY TRANSFORMS Guang Gong Department of Electrical and Computer