Author Index

Total Page:16

File Type:pdf, Size:1020Kb

Author Index Cambridge University Press 978-0-521-88037-4 - Advanced Data Structures Peter Brass Index More information Author Index This is a list of authors of papers cited in this book, together with their current affiliation, where I could find it. This shows the wide geographic distribution of the subject, as well as some centers. Serge Abiteboul: [Abiteboul et al. 2001] Amihood Amir: [Amir et al. 2000] Bar-Ilan INRIA Rocquencourt, France University, Israel Mohamed Ibrahim Abouelhoda: Arne Andersson: [Andersson 1989a, b, [Abouelhoda et al. 2004] University of Ulm, 1990, 1993, 1999; Andersson et al. 1990; Germany Andersson and Nilsson 1993, 1994, 1995] Wilhelm Ackermann: [Ackermann 1928] Uppsala University, Sweden (died 1962) Chuan-Heng Ang: [Ang and Tan 1995] Georgi˘ı M. Adel’son-Vel’ski˘ı: National University of Singapore, Singapore [Adel’son-Vel’ski˘ı and Landis 1962] Jun-Ichi Aoe: [Aoe et al. 1992; Morimoto Pankaj K. Agarwal: [Agarwal et al. 2002, et al. 1994] University of Tokushima, Japan 2005] Duke University, USA Alberto Apostolico: [Apostolico 1985; Alfred V. Aho: [Aho et al. 1974, 1976] Apostolico et al. 1994] Purdue University at Columbia University, USA West Lafayette, USA Miklos´ Ajtai: [Ajtai 1978] IBM Research Cecilia R. Aragon: [Seidel and Aragon Almaden, USA 1996] Lawrence Berkeley National Susanne Albers: [Albers and Karpinski Laboratory, USA 2002] University of Freiburg, Germany Bruce W. Arden: [Arden et al. 1961] Brian Allen: [Allen and Munro 1978] Lars Arge: [Arge and Vitter 2003; Procopiuc Jussara Almeida: [Fan et al. 2000] et al. 2003; Arge et al. 2004; Agarwal et al. University of Wisconsin at Madison, USA 2005] University of Aarhus, Denmark Noga Alon: [Alon et al. 1999] Tel Aviv Setsuo Arikawa: [Kasai et al. 2001] Kyushu University, Israel University, Japan Stephen Alstrup: [Alstrup et al. 1998, 1999, Hiroki Arimura: [Kasai et al. 2001] 2000, 2005; Alstrup and Holm 2000; Hokkaido University, Japan Alstrup and Thorup 2000; Alstrup and A. Arvind: [Arvind and Rangan 1999] Rauhe 2002] University of Copenhagen, Malcolm P. Atkinson: [Hunt et al. 2002] Denmark University of Edinburgh, Great Britain Helmut Alt: [Mehlhorn et al. 1988] Free Mike D. Atkinson: [Atkinson et al. 1986] University Berlin, Germany University of Otago, New Zealand Srinivas Aluru: [Ko and Aluru 2003, 2005] Mauricio Ayala-Rincon:´ [Ayala-Rincon´ Iowa State University, USA and Conejo 2003] University of Brasilia, Ole Amble: [Amble and Knuth 1974] Brasil 441 © Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-88037-4 - Advanced Data Structures Peter Brass Index More information 442 Author Index Yossi Azar: [Azar et al. 1999] Tel Aviv Guy E. Blelloch: [Blelloch et al. 2003] University, Israel Carnegie Mellon University, USA Ghada Hany Badr: [Badr and Oommen, Norbert Blum: [Blum and Mehlhorn 1980; 2004] National Research Council, Canada Blum 1986] University of Bonn, Germany Jean-Loup Baer: [Baer 1975] University of Anselm Blumer: [Blumer et al. 1985] Tufts Washington, USA University, USA Ricardo A. Baeza-Yates: [Gonnet et al. Janet A. Blumer: [Blumer et al. 1985; 1992; Baeza-Yates and Soza-Pollman 1998] Blumer 1987] Yahoo Research, Barcelona, Spain, and Flavio Bonomi: [Bonomi et al. 2006] Cisco Yahoo Research Latin America, Santiago, Research Center, USA Chile Prosenjit Bose: [Bose et al. 2003] Carleton Amitabha Bagchi: [Bagchi et al. 2002] University, Canada Indian Institute of Technology at Delhi, Panayiotis Bozanis: [Bozanis et al. 2003] India University of Thessaly, Greece Brenda S. Baker: [Baker 1993] Bell Labs, Peter Brass: [Brass 2007] City College New Murray Hill, USA York, USA Lech Banachowski: [Banachowski 1980] Gilles Brassard: [Brassard and Kannan, Polish-Japanese Institute of Information 1988] University of Montreal, Canada Technology, Warsaw, Poland Richard P. Brent: [Brent 1973] Australian Shivi Shekhar Bansil: [Bansil et al. 2003] National University, Australia Rudolf Bayer: [Bayer 1971, 1972a, b; Bayer Dany Breslauer: [Breslauer 1995] and McCreight 1972; Kempfe et al. 1987] Rene´ de la Briandais: [Briandais 1959] Technical University Munchen,¨ Germany Gerth Stølting Brodal: [Brodal 1995, Carter Bays: [Bays 1973a, b] University of 1996a, b, 1998; Brodal and Ga¸sieniec 1996; South Carolina, USA Brodal and Venkatesh 2000; Brodal et al. Norbert Beckmann: [Beckmann et al. 2002] University of Aarhus, Denmark 1990] Andrei Z. Broder: [Broder and Karlin 1990; R. Charles Bell: [Bell and Floyd 1983] Azar et al. 1999; Broder and Mitzenmacher Amir M. Ben-Amram: [Ben-Amram 1995; 2004; Fan et al. 2000] Yahoo, USA Alstrup et al. 1999] Academic College of Andrej Brodnik: [Brodnik and Munro 1999] Tel Aviv-Yaffo, Israel Technical University of Lulea,˚ Sweden Michael A. Bender: [Bender et al. 2002] HerveBr´ onnimann:¨ [Bronnimann¨ et al. State University of New York at Stony 2003] Brooklyn Polytechnic University, Brook, USA USA Michael Ben-Or: [Ben-Or 1983] Hebrew Mark Robbin Brown: [Brown 1978; Brown University of Jerusalem, Israel and Tarjan 1980] Samuel Watkins Bent: [Bent et al. 1985] Adam Louis Buchsbaum: [Buchsbaum et al. Jon Louis Bentley: [Bentley 1975, 1979, 1992, 1998; Buchsbaum and Tarjan 1995; 1990; Bentley and Friedman 1979; Bentley Bagchi et al. 2002] AT&T Labs–Research, and Maurer 1980; Bentley and Saxe 1980; USA Bentley and Sedgewick 1997] Bell Labs, Harry Buhrman: [Buhrman et al. 2000] USA University of Amsterdam, The Netherlands Petra Berenbrink: [Berenbrink et al. 2000] Jochen Burghardt: [Burghardt 2001] Simon Fraser University, Canada Fraunhofer Institute for Computer Mark de Berg: [Ferragina et al. 1999; Architecture and Software Technology, Agarwal et al. 2002; Arge et al. 2004] Berlin, Germany University of Eindhoven, The Netherlands Walter A. Burkhard: [Burkhard 1975] Omer Berkman: [Berkman and Vishkin 1994] University of California at San Diego, USA James R. Bitner: [Bitner 1979] Stefan Burkhardt: [Burkhardt and Gabriele Blankenagel: [Blankenagel and Karkk¨ ainen¨ 2003; Karkk¨ ainen¨ et al. 2006] Guting¨ 1994] Google, Switzerland © Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-88037-4 - Advanced Data Structures Peter Brass Index More information Author Index 443 F. Warren Burton: [Burton et al. 1985, Douglas W. Clark: [Clark 1975] Princeton 1990] Simon Fraser University, Canada University, USA Helen Cameron: [Cameron and Wood 1992] Edmund G. Coffman Jr: [Coffman and Eve University of Manitoba, Canada 1970] Columbia University, USA Pei Cao: [Fan et al. 2000] Stanford University, Saar Cohen: [Cohen and Matias 2003] USA Alessia De Col: [Colussi and De Col 1996] Svante Carlsson: [Carlsson 1984, 1987, University of Padua, Italy 1988, 1991; Carlsson et al. 1988, 1989; Richard Cole: [Bender et al. 2002; Cole and Carlsson and Chen 1992] Lund University, Hariharan 2003, 2005; Cole and Lewenstein Sweden 2003] New York University, USA J. Lawrence Carter: [Carter et al. 1978; Livio Colussi: [Colussi and De Col 1996] Markowsky et al. 1978; Carter and Wegman University of Padua, Italy 1979] Douglas Comer: [Comer and Sethi 1977] Fred´ eric´ Cazals: [Bronnimann¨ et al. 2003] Purdue University at West Lafayette, USA INRIA Sophia-Antipolis, France Paulo D. Conejo: [Ayala-Rincon´ and Conejo Pedro Celis: [Celis et al. 1985] Microsoft, 2003] USA Gordon V. Cormack: [Cormack et al. 1985] D.J. Challab: [Challab, 1991] University of Waterloo, Canada Chin-Chen Chang: [Chang 1984; Chang Maxime Crochemore: [Holub and et al. 1986, 1991] Feng Chia University, Crochemore 2002; Crochemore and Rytter Taiwan, Republic of China 2003] University of Marne-la-Vallee,´ Hsi Chang: [Chang and Iyengar 1984] France S.C. Chang: [Chang and Du 1993] Karel Culik, II: [Culik et al. 1981; Culik and Philippe Chanzy: [Chanzy et al. 2001] Wood 1982] University of South Carolina, Bernard Chazelle: [Chazelle 1985, USA 1990a, b; Chazelle and Guibas 1986a, b; Walter Cunto: [Cunto et al. 1989] Chazelle et al. 2004] Princeton University, Zbigniew J. Czech: [Czech et al. 1992, 1997; USA Czech and Majewski 1993; Majewski et al. C.Y. Chen: [Chang et al. 1991] Feng Chia 1996; Czech 1998] Silesian Technical University, Taiwan, Republic of China University at Gliwice, Poland Jingsen Chen: [Carlsson et al. 1989; Carlsson Artur Czumaj: [Berenbrink et al. 2000] New and Chen 1992; Chen 1995] Technical Jersey Institute of Technology, USA University of Lulea,˚ Sweden Ole-Johan Dahl: [Jonassen and Dahl 1975] Lin Chen: [Chen 1986; Chen and Schott (died 2002) 1996] Roger B. Dannenberg: [Dannenberg 1990] M.T. Chen: [Blumer et al. 1985; Chen and Carnegie Mellon University, USA Seiferas 1985] Amjad M. Daoud: [Fox et al. 1992] Qi Fan Chen: [Fox et al. 1992] University of Petra, Jordan Siu-Wing Cheng: [Cheng and Janardan A. Colin Day: [Day 1976] 1991] Hong Kong University of Science and Erik D. Demaine: [Bender et al. 2002; Technology, China Demaine et al. 2004; Patrasˇ ¸cu and Demaine Seonghun Cho: [Cho and Sahni 1998, 1999, 2004] Massachusetts Institute of 2000] Technology, USA Ying Choi: [Choi and Lam 1997] Luc Devroye: [Devroye 1992; Chanzy et al. Kyun-Rak Chong: [Chong and Sahni 2000] 2001; Devroye and Morin 2003; Devroye Hong-Ik University, Korea et al. 2004] McGill University, Canada C.-K. Chu: [Shepherd et al. 1989] George Diehr: [Diehr and Faaland 1984] Jiang-Hsing Chu: [Chu and Knott 1994] California State University at San Marcos, Soon M. Chung: [Chung 1992] Wright State USA University, USA Paul F. Dietz: [Dietz 1982; Dietz and Sleator R.J. Cichelli: [Cichelli 1980] 1987; Dietz and Raman 1991] © Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-88037-4 - Advanced Data Structures Peter Brass Index More information 444 Author Index Martin Dietzfelbinger: [Dietzfelbinger Bruce Faaland: [Diehr and Faaland 1984] and Meyer auf der Heide 1992; University of Washington, USA Dietzfelbinger et al. 1994; Alon et al. 1999; Rolf Fagerberg: [Fagerberg 1996a, b; Dietzfelbinger and Hagerup 2001] Larsen and Fagerberg 1996] University of Technical University Ilmenau, Germany Southern Denmark at Odense, Denmark Yuzheng Ding: [Ding and Weiss 1993, Ronald Fagin: [Fagin et al. 1979] IBM 1994] Almaden Research Center, USA Ajit A. Diwan: [Diwan et al. 1996] Indian Sean M.
Recommended publications
  • Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗
    Substitution-permutation networks, pseudorandom functions, and natural proofs∗ Eric Miles† Emanuele Viola‡ August 20, 2015 Abstract This paper takes a new step towards closing the gap between pseudorandom func- tions (PRF) and their popular, bounded-input-length counterparts. This gap is both quantitative, because these counterparts are more efficient than PRF in various ways, and methodological, because these counterparts usually fit in the substitution-permutation network paradigm (SPN), which has not been used to construct PRF. We give several candidate PRF that are inspired by the SPN paradigm. Most Fi of our candidates are more efficient than previous ones. Our main candidates are: : 0, 1 n 0, 1 n is an SPN whose S-box is a random function on b bits given F1 { } → { } as part of the seed. We prove that resists attacks that run in time 2ǫb. F1 ≤ : 0, 1 n 0, 1 n is an SPN where the S-box is (patched) field inversion, F2 { } → { } a common choice in practical constructions. We show that is computable with F2 boolean circuits of size n logO(1) n, and that it has exponential security 2Ω(n) against · linear and differential cryptanalysis. : 0, 1 n 0, 1 is a non-standard variant on the SPN paradigm, where F3 { } → { } “states” grow in length. We show that is computable with TC0 circuits of size F3 n1+ǫ, for any ǫ> 0, and that it is almost 3-wise independent. : 0, 1 n 0, 1 uses an extreme setting of the SPN parameters (one round, F4 { } → { } one S-box, no diffusion matrix). The S-box is again (patched) field inversion.
    [Show full text]
  • 1 Review of Counter-Mode Encryption ¡
    Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption Helger Lipmaa Phillip Rogaway Helsinki University of Technology (Finland) and University of California at Davis (USA) and University of Tartu (Estonia) Chiang Mai University (Thailand) [email protected] [email protected] http://www.tml.hut.fi/ helger http://www.cs.ucdavis.edu/ rogaway David Wagner University of California Berkeley (USA) [email protected] http://www.cs.berkeley.edu/ wagner Abstract Counter-mode encryption (“CTR mode”) was introduced by Diffie and Hellman already in 1979 [5] and is already standardized by, for example, [1, Section 6.4]. It is indeed one of the best known modes that are not standardized in [10]. We suggest that NIST, in standardizing AES modes of operation, should include CTR-mode encryption as one possibility for the next reasons. First, CTR mode has significant efficiency advantages over the standard encryption modes without weakening the security. In particular its tight security has been proven. Second, most of the perceived disadvantages of CTR mode are not valid criticisms, but rather caused by the lack of knowledge. 1 Review of Counter-Mode Encryption ¡ Notation. Let EK X ¢ denote the encipherment of an n-bit block X using key K and a block cipher E. For concreteness £ ¤ we assume that E £ AES, so n 128. If X is a nonempty string and i is a nonnegative integer, then X i denotes ¥ the ¥ X -bit string that one gets by regarding X as a nonnegative number (written in binary, most significant bit first), X ¦ ¥ ¥ adding i to this number, taking the result modulo 2 ¦ , and converting this number back into an X -bit string.
    [Show full text]
  • Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
    Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Phillip Rogaway (Ed.) Advances in Cryptology – CRYPTO 2011 31st Annual Cryptology Conference Santa Barbara, CA, USA, August 14-18, 2011 Proceedings 13 Volume Editor Phillip Rogaway University of California Department of Computer Science Davis, CA 95616, USA E-mail: [email protected] ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-22791-2 e-ISBN 978-3-642-22792-9 DOI 10.1007/978-3-642-22792-9 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011932695 CR Subject Classification (1998): E.3, G.2.1, F.2.1-2, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 – Security and Cryptology © International Association for Cryptologic Research 2011 This work is subject to copyright.
    [Show full text]
  • Secure Image Transferring Using Asymmetric Crypto System
    Oo Khet Khet Khaing et al.; International Journal of Advance Research and Development (Volume 4, Issue 9) Available online at: www.ijarnd.com Secure image transferring using asymmetric crypto system Khet Khet Khaing Oo1, Yan Naung Soe2, Yi Mar Myint3 1,2University of Computer Studies, Myitkyina, Myanmar 3University of Computer Studies, Monywa, Myanmar ABSTRACT defined as Plain Text. The message that cannot be understood by anyone or meaningless message is what we call as Cipher Nowadays, with the growth of technology, security is an Text. Encryption is the process of converting plaintext into important issue in communication. In many applications, the ciphertext with a key. A Key is a numeric or alphanumeric text transmission of data (massage, image and so on) is needed to or maybe a special symbol. Decryption is a reverse process of provide security against from preventing unauthorized users. encryption in which original message is retrieved from the Cryptography is a technique that provides secure ciphertext. Encryption takes place at the sender end and communication. The two widely accepted and used Decryption takes place at the receiver end. cryptographic methods are symmetric and asymmetric. There are so many different techniques should be used to protect A system or product that provides encryption and decryption is confidential image data from unauthorized access. This called cryptosystem. Cryptosystem uses encryption algorithms system provides secure image transmission between sender that determine how simple or complex the encryption process and receiver. This system uses Optimal Asymmetric will be, the necessary software component, and the key Encryption Padding (OAEP) with RSA encryption algorithm (usually a long string of bits), which works with the algorithm to provide security during transmission.
    [Show full text]
  • Identity-Based Format-Preserving Encryption
    Session G3: Crypto Standards CCS’17, October 30-November 3, 2017, Dallas, TX, USA Identity-Based Format-Preserving Encryption Mihir Bellare∗ Viet Tung Hoang† University of California San Diego Florida State University La Jolla, California Tallahassee, Florida [email protected] [email protected] ABSTRACT “format" as the plaintext. Tweakable blockciphers [27] are the spe- cial case where F.Dom = 0, 1 F.bl for some integer F.bl called the We introduce identity-based format-preserving encryption (IB-FPE) { } as a way to localize and limit the damage to format-preserving en- block length. cryption (FPE) from key exposure. We give denitions, relations be- The canonical metric of security for an FPE scheme F is prp se- tween them, generic attacks and two transforms of FPE schemes to curity [10, 26]. The game picks a challenge bit b and random key F.kl IB-FPE schemes. As a special case, we introduce and cover identity- J 0, 1 . For each tweak T it also lets Π T, be a random ∈ { } ( ·) based tweakable blockciphers. We apply all this to analyze DFF, an permutation over F.Dom. The adversary can ask for encryp- A FPE scheme proposed to NIST for standardization. tion under a tweak T and message X of its choice, being returned F J,T, X if b = 1 or Π T, X if b = 0, and similarly for decryption. ( ) ( ) FPE is not easy to build. Today the most practical approach is 1 INTRODUCTION Feistel with strong —AES-based— round functions and a number of rounds r 8.
    [Show full text]
  • Tweakable Block Ciphers
    Tweakable Block Ciphers Moses Liskov1, Ronald L. Rivest1, and David Wagner2 1 Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139, USA [email protected], [email protected] 2 University of California Berkeley Soda Hall Berkeley, CA 94720, USA [email protected] Abstract. We propose a new cryptographic primitive, the “tweakable block cipher.” Such a cipher has not only the usual inputs – message and cryptographic key – but also a third input, the “tweak.” The tweak serves much the same purpose that an initialization vector does for CBC mode or that a nonce does for OCB mode. Our proposal thus brings this feature down to the primitive block-cipher level, instead of incorporating it only at the higher modes-of-operation levels. We suggest that (1) tweakable block ciphers are easy to design, (2) the extra cost of making a block cipher “tweakable” is small, and (3) it is easier to design and prove modes of operation based on tweakable block ciphers. Keywords: block ciphers, tweakable block ciphers, initialization vector, modes of operation 1 Introduction A conventional block cipher takes two inputs – a key K ∈{0, 1}k and a message (or plaintext) M ∈{0, 1}n – and produces a single output – a ciphertext C ∈ {0, 1}n. The signature for a block cipher is thus (see Figure 1(a)): E : {0, 1}k ×{0, 1}n →{0, 1}n . (1) On the other hand, the corresponding operators for variable-length encryp- tion have a different signature. These operators are usually defined as “modes of operation” for a block cipher, but they may also be viewed abstractly as another set of encryption operators.
    [Show full text]
  • Protecting Communications Against Forgery
    Algorithmic Number Theory MSRI Publications Volume 44, 2008 Protecting communications against forgery DANIEL J. BERNSTEIN ABSTRACT. This paper is an introduction to cryptography. It covers secret- key message-authentication codes, unpredictable random functions, public- key secret-sharing systems, and public-key signature systems. 1. Introduction Cryptography protects communications against espionage: an eavesdropper who intercepts a message will be unable to decipher it. This is useful for many types of information: credit-card transactions, medical records, love letters. Cryptography also protects communications against sabotage: a forger who fabricates or modifies a message will be unable to deceive the receiver. This is useful for all types of information. If the receiver does not care about the authenticity of a message, why is he listening to the message in the first place? This paper explains how cryptography prevents forgery. Section 2 explains how to protect n messages if the sender and receiver share 128(n 1) secret + bits. Section 3 explains how the sender and receiver can generate many shared secret bits from a short shared secret. Section 4 explains how the sender and receiver can generate a short shared secret from a public conversation. Section 5 explains how the sender can protect a message sent to many receivers, without sharing any secrets. Mathematics Subject Classification: 94A62. Permanent ID of this document: 9774ae5a1749a7b256cc923a7ef9d4dc. Date: 2008.05.01. 535 536 DANIEL J. BERNSTEIN 2. Unbreakable secret-key authenticators Here is a protocol for transmitting a message when the sender and receiver both know certain secrets: Secrets p, k Secrets p, k Authenticated Possibly forged Message m / / / Verification message m, a message m0, a0 The message is a polynomial m F[x] with m(0) 0 and deg m 1000000.
    [Show full text]
  • How to Protect DES Against Exhaustive Key Search (An Analysis of DESX)
    J. Cryptology (2001) 14: 17–35 DOI: 10.1007/s001450010015 © 2001 International Association for Cryptologic Research How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) Joe Kilian NEC Research Institute, 4 Independence Way, Princeton, NJ 08540, U.S.A. [email protected] Phillip Rogaway Department of Computer Science, University of California at Davis, Davis, CA 95616, U.S.A. [email protected] Communicated by Bart Preneel Received July 1997 and revised July 2000 Online publication 27 November 2000 Abstract. The block cipher DESX is defined by DESXk.k1.k2(x) = k2 DESk (k1 x), where denotes bitwise exclusive-or. This construction was first suggested by Rivest as a computationally cheap way to protect DES against exhaustive key-search attacks. This paper proves, in a formal model, that the DESX construction is sound. We show that, when F is an idealized block cipher, FX k.k1.k2(x) = k2 Fk (k1 x) is substantially more resistant to key search than is F. In fact, our analysis says that FX has an effective key length of at least + n 1 lg m bits, where is the key length of F, n is the block length, and m bounds the number of hx, FX K (x)i pairs the adversary can obtain. Key words. Cryptanalysis, DES, DESX, Export controls, Key search. 1. Introduction With its 56-bit keys, the susceptibility of DES to exhaustive key search has been a concern and a complaint since the cipher was first made public; see, for example, [8]. The problem has escalated to the point that the Electronic Frontier Foundation has now built a DES cracking machine, at a cost of less than US$250,000, that can find the right key in about 3 days [9], [14].
    [Show full text]
  • Privacy-Preserving Shortest Path Computation (Extended Version)
    Privacy-Preserving Shortest Path Computation (Extended Version) David J. Wu Joe Zimmerman J´er´emy Planul John C. Mitchell Stanford University fdwu4, jzim, [email protected], [email protected] Abstract Navigation is one of the most popular cloud computing services. But in virtually all cloud-based navigation systems, the client must reveal her location and destination to the cloud service provider in order to learn the fastest route. In this work, we present a cryptographic protocol for navigation on city streets that provides privacy for both the client's location and the service provider's routing data. Our key ingredient is a novel method for compressing the next-hop routing matrices in networks such as city street maps. Applying our compression method to the map of Los Angeles, for example, we achieve over tenfold reduction in the representation size. In conjunction with other cryptographic techniques, this compressed representation results in an efficient protocol suitable for fully-private real-time navigation on city streets. We demonstrate the practicality of our protocol by benchmarking it on real street map data for major cities such as San Francisco and Washington, D.C. 1 Introduction Location privacy is a major concern among smartphone users, and there have been numerous controversies due to companies tracking users' locations [AVD11, Che11]. Among the various applications that require location information, navigation is one of the most popular. For example, companies such as Google, Apple, and Waze have built traffic-aware navigation apps to provide users with the most up-to-date routing information. But to use these services, users must reveal their location and destination to the cloud service provider.
    [Show full text]
  • Substring-Searchable Symmetric Encryption
    Substring-Searchable Symmetric Encryption Melissa Chase Emily Shen Microsoft Research MIT Lincoln Laboratory∗ [email protected] [email protected] June 18, 2015 Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data { given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) and structured encryption. Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees. Encryption of a string of length n takes O(λn) time and produces a ciphertext of size O(λn), and querying for a substring of length m that occurs k times takes O(λm+k) time and three rounds of communication, where λ is the security parameter. Our security definition guarantees correctness of query results and privacy of data and queries against a malicious, adaptive adversary. Following the line of work started by Curtmola et al. (ACM CCS 2006), in order to construct more efficient schemes we allow the query protocol to leak some limited information that is captured precisely in the definition. We prove security of our substring-searchable encryption scheme against malicious adversaries, where the query protocol leaks limited information about memory access patterns through the suffix tree of the encrypted string. 1 Introduction In traditional symmetric-key encryption schemes, a user encrypts a message so that only the owner of the corresponding secret key can decrypt it.
    [Show full text]
  • The Moral Character of Cryptographic Work⋆
    The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA [email protected] December 2015 (minor revisions March 2016) Abstract. Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Keywords: cryptography · ethics · mass surveillance · privacy · Snowden · social responsibility Preamble. Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game|a set of puzzles involving communicating parties and notional adversaries. This vision of who we are animates a field whose work is intellectually impressive and rapidly produced, but also quite inbred and divorced from real-world concerns. Is this what cryptography should be like? Is it how we should expend the bulk of our intellectual capital? For me, these questions came to a head with the Snowden disclosures of 2013. If cryptography's most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting electronically? Yet I soon realized that most cryptographers didn't see it this way.
    [Show full text]
  • Proofs of Space
    Proofs of Space Stefan Dziembowski1?, Sebastian Faust2, Vladimir Kolmogorov3??, and Krzysztof Pietrzak3??? 1 University of Warsaw 2 Ruhr-University Bochum 3 IST Austria Abstract. Proofs of work (PoW) have been suggested by Dwork and Naor (Cryp- to’92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service attacks. More recently, PoWs have been used to prevent double spending in the Bitcoin digital currency system. In this work, we put forward an alternative concept for PoWs – so-called proofs of space (PoS), where a service requestor must dedicate a significant amount of disk space as opposed to computation. We construct secure PoS schemes in the random oracle model (with one additional mild assumption required for the proof to go through), using graphs with high “pebbling complexity” and Merkle hash-trees. We discuss some applications, including follow-up work where a de- centralized digital currency scheme called Spacecoin is constructed that uses PoS (instead of wasteful PoW like in Bitcoin) to prevent double spending. The main technical contribution of this work is the construction of (directed, loop- free) graphs on N vertices with in-degree O(log log N) such that even if one places Θ(N) pebbles on the nodes of the graph, there’s a constant fraction of nodes that needs Θ(N) steps to be pebbled (where in every step one can put a pebble on a node if all its parents have a pebble).
    [Show full text]