Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.

Author(s): Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.)
Series: Lecture Notes in Computer Science 4990
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 534
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Cryptanalysis of the SFLASH Signature Scheme....Pages 1-4
On the Evolution of User Authentication: Non-bilateral Factors....Pages 5-10
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message....Pages 11-24
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility....Pages 25-39
An Efficient ID-Based Proxy Signature Scheme from Pairings....Pages 40-50
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent....Pages 51-65
Linear Slide Attacks on the KeeLoq Block Cipher....Pages 66-80
A Key Predistribution Scheme Based on 3-Designs....Pages 81-92
Provably Secure N -Party Authenticated Key Exchange in the Multicast DPWA Setting....Pages 93-107
A Provably Secure One-Pass Two-Party Key Establishment Protocol....Pages 108-122
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption....Pages 123-137
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries....Pages 138-152
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor....Pages 153-166
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures....Pages 167-181
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks....Pages 182-191
Probabilistic ( n , n ) Visual Secret Sharing Scheme for Grayscale Images....Pages 192-200
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks....Pages 201-215
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity....Pages 216-230
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves....Pages 231-245
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators....Pages 246-255
Linear Equation on Polynomial Single Cycle T-Functions....Pages 256-270
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables....Pages 271-282
Anonymity and k -Choice Identities....Pages 283-297
Deniable Authentication on the Internet....Pages 298-312
Orthogonality between Key Privacy and Data Privacy, Revisited....Pages 313-327
Unlinkable Randomizable Signature and Its Application in Group Signature....Pages 328-342
An Improved Collision Attack on MD5 Algorithm....Pages 343-357
Multivariates Polynomials for Hashing....Pages 358-371
Efficient Public Key Encryption with Keyword Search Schemes from Pairings....Pages 372-383
Multi-Identity Single-Key Decryption without Random Oracles....Pages 384-398
Kipnis-Shamir Attack on HFE Revisited....Pages 399-411
Cryptanalysis of General Lu-Lee Type Systems....Pages 412-426
A Timing-Resistant Elliptic Curve Backdoor in RSA....Pages 427-441
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol....Pages 442-456
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control....Pages 457-462
Building Trusted Sub-domain for the Grid with Trusted Computing....Pages 463-471
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM....Pages 472-481
Online Tracing Scanning Worm with Sliding Window....Pages 482-496
A New Proactive Defense Model Based on Intrusion Deception and Traceback....Pages 497-506
On Modeling Post Decryption Error Processes in UMTS Air Interface....Pages 507-516
A Simple, Smart and Extensible Framework for Network Security Measurement....Pages 517-531
Back Matter....Pages -