Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.

Author(s): Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 3822 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 428
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography....Pages 1-9
You Can Prove So Many Things in Zero-Knowledge....Pages 10-27
Improvements on Security Proofs of Some Identity Based Encryption Schemes....Pages 28-41
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme....Pages 42-52
ID-Based Signature Scheme Without Trusted PKG....Pages 53-62
Specifying Authentication Using Signal Events in CSP....Pages 63-74
Modeling RFID Security....Pages 75-90
Enforcing Email Addresses Privacy Using Tokens....Pages 91-100
Efficient Authentication of Electronic Document Workflow....Pages 101-112
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms....Pages 113-127
Efficient Group Signatures from Bilinear Pairing....Pages 128-139
Enhanced Aggregate Signatures from Pairings....Pages 140-149
Constructing Secure Proxy Cryptosystem....Pages 150-161
Towards a General RC4-Like Keystream Generator....Pages 162-174
HCTR: A Variable-Input-Length Enciphering Mode....Pages 175-188
The k th-Order Quasi-Generalized Bent Functions over Ring Z p ....Pages 189-201
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences....Pages 202-209
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP....Pages 210-220
An Improved Secure Two-Party Computation Protocol....Pages 221-232
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes....Pages 233-241
ID-Based Threshold Unsigncryption Scheme from Pairings....Pages 242-253
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach....Pages 254-264
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control....Pages 265-278
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection....Pages 279-289
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes....Pages 290-301
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption....Pages 302-312
A Remark on Implementing the Weil Pairing....Pages 313-323
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC....Pages 324-335
Key Management for Secure Overlay Multicast....Pages 336-345
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN....Pages 346-357
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault....Pages 358-369
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes....Pages 370-383
New Methods to Construct Cheating Immune Multisecret Sharing Scheme....Pages 384-394
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation....Pages 395-406
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks....Pages 407-418
Back Matter....Pages -