These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings.
Author(s): Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu (auth.), Ronald Cramer (eds.)
Series: Lecture Notes in Computer Science 3494 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 578
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Front Matter....Pages -
Cryptanalysis of the Hash Functions MD4 and RIPEMD....Pages 1-18
How to Break MD5 and Other Hash Functions....Pages 19-35
Collisions of SHA-0 and Reduced SHA-1....Pages 36-57
Reducing Complexity Assumptions for Statistically-Hiding Commitment....Pages 58-77
Smooth Projective Hashing and Two-Message Oblivious Transfer....Pages 78-95
On Robust Combiners for Oblivious Transfer and Other Primitives....Pages 96-113
Efficient Identity-Based Encryption Without Random Oracles....Pages 114-127
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM....Pages 128-146
Secure Remote Authentication Using Biometric Data....Pages 147-163
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators....Pages 164-180
3-Move Undeniable Signature Scheme....Pages 181-197
Group Signatures with Efficient Concurrent Join....Pages 198-214
Floating-Point LLL Revisited....Pages 215-233
Practical Cryptography in High Dimensional Tori....Pages 234-250
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers....Pages 251-267
Computational Indistinguishability Between Quantum States and Its Cryptographic Application....Pages 268-284
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes....Pages 285-301
Compact E-Cash....Pages 302-321
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience....Pages 322-340
Differential Cryptanalysis for Multivariate Schemes....Pages 341-353
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem....Pages 354-370
Partial Key Exposure Attacks on RSA up to Full Size Exponents....Pages 371-386
The RSA Group is Pseudo-Free....Pages 387-403
Universally Composable Password-Based Key Exchange....Pages 404-421
Mercurial Commitments with Applications to Zero-Knowledge Sets....Pages 422-439
Hierarchical Identity Based Encryption with Constant Size Ciphertext....Pages 440-456
Fuzzy Identity-Based Encryption....Pages 457-473
Second Preimages on n -Bit Hash Functions for Much Less than 2 n Work....Pages 474-490
Predicting and Distinguishing Attacks on RC4 Keystream Generator....Pages 491-506
Related-Key Boomerang and Rectangle Attacks....Pages 507-525
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions....Pages 526-541
Public Traceability in Traitor Tracing Schemes....Pages 542-558
One-Way Chain Based Broadcast Encryption Schemes....Pages 559-574
Back Matter....Pages -