Lecture Notes in Computer Science 6402 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen

Lecture Notes in Computer Science 6402 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen

Lecture Notes in Computer Science 6402 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Swee-Huay Heng Kaoru Kurosawa (Eds.) Provable Security 4th International Conference, ProvSec 2010 Malacca, Malaysia, October 13-15, 2010 Proceedings 13 Volume Editors Swee-Huay Heng Multimedia University Faculty of Information Science and Technology Jalan Ayer Keroh Lama, 75450 Malacca, Malaysia E-mail: [email protected] Kaoru Kurosawa Ibaraki University Department of Computer and Information Sciences 4-12-1 Nakanarusawa, Hitachi, Ibaraki, 316-8511, Japan E-mail: [email protected] Library of Congress Control Number: 2010935665 CR Subject Classification (1998): E.3, C.2, K.6.5, D.4.6, J.1, E.4 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-16279-7 Springer Berlin Heidelberg New York ISBN-13 978-3-642-16279-4 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com © Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180 Preface ProvSec 2010 was held in Malacca, Malaysia, October 13–15, 2010. This was the 4th Provable Security conference in the series aimed at stimulating the exchange of ideas in the emerging areas of provable security. This conference was organized by the Faculty of Information Science and Technology, Multimedia University, Malaysia, and co-organized by the Malaysian Society for Cryptology Research (MSCR). The conference received a total of 47 submissions. Each submission was re- viewed by at least three members of the Program Committee, and submissions co-authored by members of the Program Committee were reviewed by at least five members. The review process was a challenging task, 17 papers were ac- cepted for presentation at the conference (with 1 conditionally accepted) after almost two months of review process, and some good submissions had to be rejected. This proceedings contains the revised versions of the accepted papers, which were not subject to editorial review, and the authors bear full responsi- bility for their contents. The conference also featured an invited lecture by Eike Kiltz entitled “Cryptographic Protocols from Lattices.” There were many parties who contributed in one way or another to the success of ProvSec 2010. We would like to thank all of the authors from many different countries for submitting their work. We are deeply grateful to the Program Com- mittee for their hard work and effort in ensuring that each submission received a fair and thorough review. We also gratefully acknowledge the effort and exper- tise of the external reviewers. Lastly, we would like to record our appreciation to the General Chair, Bok-Min Goi, and the local Organizing Committee, for their dedication and commitment in organizing the conference, and to Shai Halevi, for granting us the permission to use the user-friendly Web-Submission-and-Review system. October 2010 Swee-Huay Heng Kaoru Kurosawa ProvSec 2010 The Fourth International Conference on Provable Security Malacca, Malaysia October 13–15, 2010 Organized by Multimedia University, Malaysia Co-organized by Malaysian Society for Cryptology Research (MSCR) Supported by INSPEM, Universiti Putra Malaysia General Chair Bok-Min Goi Universiti Tunku Abdul Rahman, Malaysia Program Co-chairs Swee-Huay Heng Multimedia University, Malaysia Kaoru Kurosawa Ibaraki University, Japan Program Committee Alexandra Boldyreva Georgia Institute of Technology, USA Xavier Boyen Stanford University, USA David Cash University of California, San Diego, USA Dario Catalano Universit di Catania, Italy Alexander W. Dent Royal Holloway, University of London, UK Eiichiro Fujisaki NTT, Japan Jun Furukawa NEC Corporation, Japan Matthew Green The Johns Hopkins University, USA Vipul Goyal Microsoft Research, India Goichiro Hanaoka AIST, Japan Swee-Huay Heng Multimedia University, Malaysia (Co-chair) Takeshi Koshiba Saitama University, Japan Noboru Kunihiro University of Tokyo, Japan Kaoru Kurosawa Ibaraki University, Japan (Co-chair) Benoit Libert Universit´e catholique de Louvain, Belgium David Naccache Ecole´ normale sup´erieure, France Gregory Neven IBM Research, Switzerland Jesper Buus Nielsen University of Aarhus, Denmark VIII Organization Tatsuaki Okamoto NTT, Japan Josef Pieprzyk Macquarie University, Australia Palash Sarkar Indian Statistical Institute, India Berry Schoenmakers TU Eindhoven, The Netherlands Gil Segev Weizmann Institute of Science, Israel Willy Susilo University of Wollongong, Australia Keisuke Tanaka Tokyo Institute of Technology, Japan Steering Committee Feng Bao Institute for Infocomm Research, Singapore Xavier Boyen Stanford University, USA Yi Mu University of Wollongong, Australia Josef Pieprzyk Macquarie University, Australia Willy Susilo University of Wollongong, Australia Organizing Committee Ji-Jian Chin Multimedia University Michael Goh Multimedia University Hailiza Kamarulhaili MSCR/Universiti Sains Malaysia Muhammad Rezal K.A. MSCR/Universiti Putra Malaysia Huo-Chong Ling Multimedia University Chu-Kiong Loo Multimedia University Thian-Song Ong Multimedia University Shing-Chiang Tan Multimedia University Connie Tee Multimedia University Wei-Chuen Yau Multimedia University External Reviewers Tadashi Araragi Xinyi Huang Palash Sarkar Man Ho Au Jae Ahn Hyun Thomas Shrimpton Zvika Brakerski Toshiyuki Isshiki Martijn Stam Pierre-Louis Cayrel Akinori Kawachi S. Sree Vivek Andr´e Chailloux Yutaka Kawai Bogdan Warinschi Sanjit Chatterjee Virendra Kumar Kan Yasuda Dario Fiore Daisuke Moriyama Kenji Yasunaga Fuchun Guo Ryo Nishimaki Kazuki Yoneyama Vanishree H David Nowak Maki Yoshida Satoshi Hada Adam O’Neill Tsz Hon Yuen Yoshikazu Hanatani Somindu C. Ramanna Wei Zhang Qiong Huang Thomas Ristenpart Table of Contents Identification Improved Zero-Knowledge Identification with Lattices ................ 1 Pierre-Louis Cayrel, Richard Lindner, Markus R¨uckert, and Rosemberg Silva Identification Schemes of Proofs of Ability—Secure against Concurrent Man-in-the-Middle Attacks ........................................ 18 Hiroaki Anada and Seiko Arita Auto Proofs A Calculus for Game-Based Security Proofs ......................... 35 David Nowak and Yu Zhang Automating Computational Proofs for Public-Key-Based Key Exchange ....................................................... 53 Long Ngo, Colin Boyd, and Juan Gonz´alez Nieto Signature I A Framework for Constructing Convertible Undeniable Signatures...... 70 Ryo Kikuchi, Le Trieu Phong, and Wakaha Ogata Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm ....................................................... 87 Laila El Aimani Hash Function Collision Resistant Double-Length Hashing .......................... 102 Ewan Fleischmann, Christian Forler, Michael Gorski, and Stefan Lucks Interpreting Hash Function Security Proofs .......................... 119 Juraj Sarinayˇ Protocol Formal and Precise Analysis of Soundness of Several Shuffling Schemes ........................................................ 133 Kun Peng and Feng Bao X Table of Contents Distinguishing Distributions Using Chernoff Information .............. 144 Thomas Baign`eres, Pouyan Sepehrdad, and Serge Vaudenay Signature II A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) .............. 166 Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, and Duncan S. Wong An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation............................ 184 Keita Emura, Atsuko Miyaji, and Kazumasa Omote Invited Talk Cryptographic Protocols from Lattices (Abstract) .................... 199 Eike Kiltz Encryption A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication ............................ 200 Keita Emura, Atsuko Miyaji, and Kazumasa Omote Efficient Broadcast Encryption with Personalized Messages ............ 214 Go Ohtake, Goichiro Hanaoka, and Kazuto Ogawa Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption .... 229 Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro Signcryption Identity Based Public Verifiable Signcryption Scheme ................. 244 S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan Fully Secure Threshold Unsigncryption ............................. 261 Javier Herranz, Alexandre Ruiz, and Germ´an S´aez Author Index .................................................. 279.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us