Table Of ContentLecture Notes in Computer Science 2501
EditedbyG.Goos,J.Hartmanis,andJ.vanLeeuwen
3
Berlin
Heidelberg
NewYork
Barcelona
HongKong
London
Milan
Paris
Tokyo
Yuliang Zheng (Ed.)
Advances in Cryptology –
ASIACRYPT 2002
8th International Conference on the Theory
andApplication of Cryptology and Information Security
Queenstown, New Zealand, December 1-5, 2002
Proceedings
1 3
SeriesEditors
GerhardGoos,KarlsruheUniversity,Germany
JurisHartmanis,CornellUniversity,NY,USA
JanvanLeeuwen,UtrechtUniversity,TheNetherlands
VolumeEditor
YuliangZheng
UniversityofNorthCarolinaatCharlotte
DepartmentofSoftwareandInformationSystems
9201UniversityCityBlvd,Charlotte,NC28223,USA
E-mail:[email protected]
Cataloging-in-PublicationDataappliedfor
AcatalogrecordforthisbookisavailablefromtheLibraryofCongress.
BibliographicinformationpublishedbyDieDeutscheBibliothek
DieDeutscheBibliothekliststhispublicationintheDeutscheNationalbibliografie;
detailedbibliographicdataisavailableintheInternetat<http://dnb.ddb.de>.
CRSubjectClassification(1998):E.3,D.4.6,K.6.5,F.2.1-2,C.2,J.1,G.2.2
ISSN0302-9743
ISBN3-540-00171-9Springer-VerlagBerlinHeidelbergNewYork
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting,
reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965,
initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer-Verlag.Violationsare
liableforprosecutionundertheGermanCopyrightLaw.
Springer-VerlagBerlinHeidelbergNewYork
amemberofBertelsmannSpringerScience+BusinessMediaGmbH
http://www.springer.de
©Springer-VerlagBerlinHeidelberg2002
PrintedinGermany
Typesetting:Camera-readybyauthor,dataconversionbySteingra¨berSatztechnikGmbH,Heidelberg
Printedonacid-freepaper SPIN:10870805 06/3142 543210
Preface
ASIACRYPT2002washeldinQueenstown,NewZealand,December1–5,2002.
The conference was organized by the International Association for Cryptologic
Research (IACR).
The program committee received 173 submissions from around the world,
from which 34 were selected for presentation. Each submission was reviewed by
at least three experts in the relevant research area.
Let me first thank all the authors, including those whose submissions were
not successful, for taking the time to prepare the submissions. Their dedication
andeffortsinadvancingresearchincryptographymadethisconferencepossible.
Selecting presentations from such a large number of submissions was an ex-
tremely difficult and challenging task. The program committee members, to-
gether with external referees, spent thousands of hours of their precious time
reviewing the submissions. At the completion of the selection process, the pro-
gramcommitteereceived875reviewreportsintotal.Inaddition,thecommittee
received several hundred comments during the three-week period of discussions.
Taking this opportunity, I would like to thank all the program committee
membersfortheirtimeanddedication.Withouttheirexpertiseinthestateofthe
art in cryptography and their willingness to serve the data security community,
the conference would not have had such a high-quality program. I would also
like to thank the numerous external referees for their invaluable assistance in
identifying the scientific and practical merits of the submissions.
Thequalityoftheprogramwasfurtherenhancedbytwodistinguishedkeynote
speeches delivered by Prof. Tsutomu Matsumoto from Yokohama National Uni-
versity in Japan, and Dr. Moti Yung from CertCo and Columbia University
in the USA. On behalf of the program committee, I would like to thank both
prominent pioneers in cryptography for their inspiring presentations.
ThanksalsogotothegeneralchairHankWolfefromtheUniversityofOtago
for successfully running the conference in such a beautiful town. It was a won-
derful experience for me to work with Hank.
The reviewing process benefited greatly from the advice of Bart Preneel and
Wim Moreau on handling the reviewing software. I appreciated Colin Boyd’s
assistance in editing the proceedings. My special thanks go to Lawrence Teo
who acted as my assistant during the entire period of setting up the website,
accepting, reviewing submissions, and editing the final proceedings. The year-
longprocesswouldnothaverunsosmoothlywithouthistirelesshelpandsuperb
technical skills in handling the software packages.
September 2002 Yuliang Zheng
ASIACRYPT 2002
December 1–5, 2002, Queenstown, New Zealand
Sponsored by the
International Association for Cryptologic Research (IACR)
General Chair
Henry Wolfe, University of Otago, New Zealand
Program Chair
Yuliang Zheng, University of North Carolina at Charlotte, USA
Program Committee
Feng Bao .....................................................LIT, Singapore
Ed Dawson ...................................................QUT, Australia
Giovanni DiCrescenzo .........................................Telcordia, USA
Matthew Franklin ............................................UC Davis, USA
Dieter Gollmann .....................................Microsoft Research, UK
Helena Handschuh ..........................................Gemplus, France
Philip Hawkes ..........................................Qualcomm, Australia
Ari Juels .............................................RSA Laboratories, USA
Kwangjo Kim ..............................................ICU, South Korea
Seungjoo Kim ............................................KISA, South Korea
Chi Sung Laih ......................National Cheng Kung University, Taiwan
Pil Joong Lee .......................................POSTECH, South Korea
Arjen Lenstra .................................................Citibank, USA
Phil MacKenzie ....................................Lucent Technologies, USA
Masahiro Mambo ...................................Tohoku University, Japan
Wenbo Mao ....................................................HP Labs, UK
Keith Martin ......................Royal Holloway, University of London, UK
Alfred Menezes ...............................University of Waterloo, Canada
Phong Nguyen ...................................................ENS, France
Dingyi Pei ...............................Chinese Academy of Sciences, China
Bart Preneel .........................Katholieke Universiteit Leuven, Belgium
Kouichi Sakurai ....................................Kyushu University, Japan
Jessica Staddon ..................................................PARC, USA
Serge Vaudenay ...........................................EPFL, Switzerland
Sung-Ming Yen ..........................National Central University, Taiwan
Xian-Mo Zhang ..........................University of Wollongong, Australia
Yuliang Zheng (Chair) ..................................UNC Charlotte, USA
Hong Zhu ...........................................Fudan University, China
Advisory Member:
Colin Boyd (Asiacrypt 2001 Program Chair) ..................QUT, Australia
VIII Organization
External Reviewers
Masayuki Abe Craig Gentry
Giuseppe Ateniese David Goldberg
Gildas Avoine Juan Manuel Gonzalez-Nieto
Joonsang Baek Louis Goubin
Dirk Balfanz Louis Granboulan
Mark Bauer Richard Graveman
Peter Beelen Dan Greene
Alex Biryukov D.J. Guan
Simon Blackburn Jae-Cheol Ha
Daniel Bleichenbacher Stuart Haber
Alexandra Boldyreva Satoshi Hada
Dan Boneh Goichiro Hanaoka
Colin Boyd Darrel Hankerson
Emmanuel Bresson Matthew Henricksen
Eric Brier Florian Hess
Linda Burnett Shoichi Hirose
Brice Canvel Dennis Hofheinz
Dario Catalano Herbie Hopkins
Stefania Cavallar Min-Shiang Hwang
Geng Hau Chang Yong Ho Hwang
Chien-ning Chen Hisashi Inoue
Chien Yuan Chen Toshiya Itoh
Liqun Chen Tetsu Iwata
Jung Hee Cheon Markus Jakobsson
J.H. Chiu Jinn-Ke Jan
YoungJu Choie Rob Johnson
Andrew Clark Marc Joye
Scott Contini Wen-Shenq Juang
Jean-S´ebastien Coron Pascal Junod
Nicolas Courtois Burt Kaliski
Christophe De Canni`ere Masayuki Kanda
Alex Dent Jonathan Katz
Anand Desai Alexander Kholosha
Markus Dichtl Aggelos Kiayias
Hiroshi Doi Hiroaki Kikuchi
Glenn Durfee Chong Hee Kim
Chun I Fan Neal Koblitz
Marc Fischlin Takeshi Koshiba
Yair Frankel Kaoru Kurosawa
Martin Gagne Hidenori Kuwakado
Steven Galbraith Tanja Lange
Juan Garay Dong-Hoon Lee
Katharina Geissler Narn-Yih Lee
Rosario Gennaro Sangjin Lee
Organization IX
Y.C. Lee Junji Shikata
Hsi-Chung Lin Atsushi Shimbo
Chi-Jen Lu Igor Shparlinski
Chun-Shien Lu Francesco Sica
Christoph Ludwig Alice Silverberg
David M’Ra¨ihi Joe Silverman
Mike Malkin Sang Gyoo Sim
Tal Malkin Leonie Simpson
John Malone-Lee Nigel Smart
Takashi Mano Diana Smetters
James McKee David Soldera
Bill Millan Martijn Stam
Sara Miner Makoto Sugita
Takaaki Mizuki Hung-Min Sun
Jean Monnerat Koutarou Suzuki
Shiho Moriai Mike Szydlo
Siguna Muller Mitsuru Tada
Bill Munro Tsuyoshi Takagi
David Naccache Katsuyuki Takashima
Koh-ichi Nagao Edlyn Teske
Toru Nakanishi Yiannis Tsiounis
Kazuo Ohta Christophe Tymen
Kazuomi Oishi Wen-Guey Tzeng
Satomi Okazaki Masashi Une
Rafail Ostrovsky Frederik Vercauteren
Akira Otsuka Eric Verheul
Pascal Paillier Kapali Viswanathan
Dong Jin Park Jose Vivas
Ji-Hwan Park Huaxiong Wang
Kenny Paterson Peter Wild
Giuseppe Persiano Hao-Chi Wong
John Proos Tzong-Chen Wu
Michael Quisquater Masato Yamamichi
Arash Reyhani-Masoleh Akihiro Yamamura
Vincent Rijmen Jeff Yan
Matt Robshaw Ching-Nung Yang
Peter de Rooij Yi-Shiung Yeh
Greg Rose Yiqun Lisa Yin
Ludovic Rousseau Maki Yoshida
Taiichi Saito Dae Hyun Yum
Ryuichi Sakai Fangguo Zhang
Jasper Scholten Yiqiang Zuo
Chaofeng Sha
Table of Contents
Analysis of Bernstein’s Factorization Circuit........................... 1
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
A Variant of the Cramer-Shoup Cryptosystem
for Groups of Unknown Order ....................................... 27
Stefan Lucks
Looking beyond XTR .............................................. 46
Wieb Bosma, James Hutton, Eric R. Verheul
Bounds for Robust Metering Schemes
and Their Relationship with A2-code ................................. 64
Wakaha Ogata, Kaoru Kurosawa
Unconditionally Secure Anonymous Encryption
and Group Authentication .......................................... 81
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
Adapting the Weaknesses of the Random Oracle Model
to the Generic Group Model......................................... 100
Alexander W. Dent
On the Impossibilities of Basing One-Way Permutations
on Central Cryptographic Primitives ................................. 110
Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu
A Statistically-Hiding Integer Commitment Scheme
Based on Groups with Hidden Order ................................. 125
Ivan Damg˚ard, Eiichiro Fujisaki
Efficient Oblivious Transfer in the Bounded-Storage Model .............. 143
Dowon Hong, Ku-Young Chang, Heuisu Ryu
In How Many Ways Can You Write Rijndael? ......................... 160
Elad Barkan, Eli Biham
On the Security of Rijndael-Like Structures
against Differential and Linear Cryptanalysis .......................... 176
Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon,
Jongin Lim
Threshold Cryptosystems Based on Factoring.......................... 192
Jonathan Katz, Moti Yung