This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held in Santa Barbara, California, USA in August 2005.
The 33 revised full papers presented were carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on hash functions, theory, cryptanalysis, zero knowledge, anonymity, privacy, broadcast encryption, human-oriented cryptography, secret sharing, multi-party computation, random oracles, information theoretic security, and primitives and protocols.
Author(s): Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin (auth.), Victor Shoup (eds.)
Series: Lecture Notes in Computer Science 3621 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 572
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Discrete Mathematics in Computer Science; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
Efficient Collision Search Attacks on SHA-0....Pages 1-16
Finding Collisions in the Full SHA-1....Pages 17-36
Pebbling and Proofs of Work....Pages 37-54
Composition Does Not Imply Adaptive Security....Pages 55-65
On the Discrete Logarithm Problem on Algebraic Tori....Pages 66-85
A Practical Attack on a Braid Group Based Cryptographic Protocol....Pages 86-96
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption....Pages 97-117
Unconditional Characterizations of Non-interactive Zero-Knowledge....Pages 118-134
Impossibility and Feasibility Results for Zero Knowledge with Public Keys....Pages 135-151
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors....Pages 152-168
A Formal Treatment of Onion Routing....Pages 169-187
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy....Pages 188-204
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions....Pages 205-222
Private Searching on Streaming Data....Pages 223-240
Privacy-Preserving Set Operations....Pages 241-257
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys....Pages 258-275
Generic Transformation for Scalable Broadcast Encryption Schemes....Pages 276-292
Authenticating Pervasive Devices with Human Protocols....Pages 293-308
Secure Communications over Insecure Channels Based on Short Authenticated Strings....Pages 309-326
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes....Pages 327-343
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields....Pages 344-360
Secure Computation Without Authentication....Pages 361-377
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator....Pages 378-394
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems....Pages 395-411
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes....Pages 412-429
Merkle-Damgård Revisited: How to Construct a Hash Function....Pages 430-448
On the Generic Insecurity of the Full Domain Hash....Pages 449-466
New Monotones and Lower Bounds in Unconditional Two-Party Computation....Pages 467-477
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption....Pages 478-493
A Quantum Cipher with Near Optimal Key-Recycling....Pages 494-510
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction....Pages 511-526
Improved Security Analyses for CBC MACs....Pages 527-545
HMQV: A High-Performance Secure Diffie-Hellman Protocol....Pages 546-566
Back Matter....Pages -