Table Of ContentTetsu Iwata · Jung Hee Cheon (Eds.)
3
5
4 Advances in Cryptology –
9
S
C ASIACRYPT 2015
N
L
21st International Conference on the Theory
and Application of Cryptology and Information Security
Auckland, New Zealand, November 29 – December 3, 2015
Proceedings, Part II
123
Lecture Notes in Computer Science 9453
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zürich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7410
Tetsu Iwata Jung Hee Cheon (Eds.)
(cid:129)
–
Advances in Cryptology
ASIACRYPT 2015
21st International Conference on the Theory
and Application of Cryptology and Information Security
–
Auckland, New Zealand, November 29 December 3, 2015
Proceedings, Part II
123
Editors
TetsuIwata JungHee Cheon
Nagoya University SeoulNational University
Nagoya Seoul
Japan Korea (Republicof)
ISSN 0302-9743 ISSN 1611-3349 (electronic)
Lecture Notesin Computer Science
ISBN 978-3-662-48799-0 ISBN978-3-662-48800-3 (eBook)
DOI 10.1007/978-3-662-48800-3
LibraryofCongressControlNumber:2015953256
LNCSSublibrary:SL4–SecurityandCryptology
SpringerHeidelbergNewYorkDordrechtLondon
©InternationalAssociationforCryptologicResearch2015
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow
knownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare
believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissionsthatmayhavebeenmade.
Printedonacid-freepaper
Springer-VerlagGmbHBerlinHeidelbergispartofSpringerScience+BusinessMedia
(www.springer.com)
Preface
ASIACRYPT 2015, the 21st Annual International Conference on Theory and Appli-
cation of Cryptology and Information Security, was held on the city campus of the
University of Auckland, New Zealand, from November 29 to December 3, 2015.
The conference focused on all technical aspects of cryptology, and was sponsored by
the International Association for Cryptologic Research (IACR).
The conference received 251 submissions from all over the world. The program
included 64 papers selected from these submissions by a Program Committee
(PC) comprising 43 leading experts of the field. In order to accommodate as many
high-quality submissions as possible, the conference ran in two parallel sessions, and
these two-volume proceedings contain the revised versions of the papers that were
selected.Therevisedversionswerenotreviewedagainandtheauthorsareresponsible
for their contents.
The selection of the papers was made through the usual double-blind review pro-
cess. Each submission was assigned three reviewers and submissions by PC members
were assigned five reviewers. The selection process was assisted by a total of 339
external reviewers. Following the individual review phase, the selection process
involved an extensive discussion phase.
This year, the conference featured three invited talks. Phillip Rogaway gave the
2015 IACR Distinguished Lecture on “The Moral Character of Cryptographic Work,”
GillesBarthegaveatalkon“Computer-AidedCryptography:StatusandPerspectives,”
and Masayuki Abe spoke on “Structure-Preserving Cryptography.” The proceedings
contain the abstracts of these talks. The conference also featured a traditional rump
session that contained short presentations on the latest research results of the field.
The best paper award was decided based on a vote by the PC members, and it was
given to “Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi
Divergence Rather than the Statistical Distance” by Shi Bai, Adeline Langlois, Tan-
crède Lepoint, Damien Stehlé, and Ron Steinfeld. Two more papers, “Key-Recovery
AttacksonASASA”byBriceMinaud,PatrickDerbez,Pierre-AlainFouque,andPierre
Karpman, and “The Tower Number Field Sieve” by Razvan Barbulescu, Pierrick
Gaudry, and Thorsten Kleinjung, were solicited to submit full versions to the Journal
of Cryptology.
ASIACRYPT 2015 was made possible by the contributions of many people. We
would like to thank the authors for submitting their research results to the conference.
We are deeply grateful to all the PC members and all the external reviewers for their
hard work to determine the program of the conference. We sincerely thank Steven
Galbraith,thegeneralchairoftheconference,andthemembersofthelocalOrganizing
Committee for handling all the organizational work of the conference. We also thank
Nigel Smart for organizing and chairing the rump session.
We thank Shai Halevi for setting up and letting us use the IACR conference
managementsoftware.Springerpublishedthetwo-volumeproceedingsandmadethese
VI Preface
available at the conference. We thank Alfred Hofmann, Anna Kramer, and their col-
leagues for handling the editorial process. Last but not least, we thank the speakers,
session chairs, and all the participants for coming to Auckland and contributing to
ASIACRYPT 2015.
December 2015 Tetsu Iwata
Jung Hee Cheon
ASIACRYPT 2015
The 21st Annual International Conference on Theory
and Application of Cryptology and Information Security
Sponsored by the International Association for Cryptologic Research (IACR)
November 29–December 3, 2015, Auckland, New Zealand
General Chair
Steven Galbraith University of Auckland, New Zealand
Program Co-chairs
Tetsu Iwata Nagoya University, Japan
Jung Hee Cheon Seoul National University, Korea
Program Committee
Daniel J. Bernstein University of Illinois at Chicago, USA and Technische
Universiteit Eindhoven, The Netherlands
Ignacio Cascudo Aarhus University, Denmark
Chen-Mou Cheng National Taiwan University, Taiwan
Sherman S.M. Chow Chinese University of Hong Kong, Hong Kong, SAR China
Kai-Min Chung Academia Sinica, Taiwan
Nico Döttling Aarhus University, Denmark
Jens Groth University College London, UK
Dawu Gu Shanghai Jiaotong University, China
Dong-Guk Han Kookmin University, Korea
Marc Joye Technicolor, USA
Nathan Keller Bar-Ilan University, Israel
Aggelos Kiayias National and Kapodistrian University of Athens, Greece
Kaoru Kurosawa Ibaraki University, Japan
Xuejia Lai Shanghai Jiaotong University, China
Hyang-Sook Lee Ewha Womans University, Korea
Jooyoung Lee Sejong University, Korea
Soojoon Lee Kyung Hee University, Korea
Arjen Lenstra EPFL, Switzerland
Hemanta K. Maji UCLA, USA
Alexander May Ruhr University Bochum, Germany
Bart Mennink KU Leuven, Belgium
Tatsuaki Okamoto NTT Secure Platform Laboratories, Japan
Raphael C.-W. Phan Multimedia University, Malaysia
VIII ASIACRYPT 2015
Josef Pieprzyk Queensland University of Technology, Australia
Bart Preneel KU Leuven, Belgium
Damien Robert Inria Bordeaux, France
Giovanni Russello University of Auckland, New Zealand
Ahmad-Reza TU Darmstadt, Germany
Sadeghi
Rei Safavi-Naini University of Calgary, Canada
Palash Sarkar Indian Statistical Institute, India
Yu Sasaki NTT Secure Platform Laboratories, Japan
Peter Schwabe Radboud University, The Netherlands
Jae Hong Seo Myongji University, Korea
Nigel Smart University of Bristol, UK
Damien Stehlé ENS de Lyon, France
Tsuyoshi Takagi Kyushu University, Japan
Mehdi Tibouchi NTT Secure Platform Laboratories, Japan
Dominique Unruh University of Tartu, Estonia
Serge Vaudenay EPFL, Switzerland
Vesselin Velichkov University of Luxembourg, Luxembourg
Huaxiong Wang Nanyang Technological University, Singapore
Hongjun Wu Nanyang Technological University, Singapore
Vassilis Zikas ETH Zurich, Switzerland
Additional Reviewers
Masayuki Abe Foteini Baldimtsi Pyrros Chaidos
Divesh Aggarwal Razvan Barbulescu Debrup Chakraborty
Shashank Agrawal Achiya Bar-On Donghoon Chang
Shweta Agrawal Harry Bartlett Seunghwan Chang
Hyunjin Ahn Lejla Batina Yun-An Chang
Janaka Alawatugoda Aurélie Bauer Chien-Ning Chen
Martin Albrecht Carsten Baum Jie Chen
Gergely Alpár Anja Becker Ming-Shing Chen
Joël Alwen Fabrice Benhamouda Yu-Chi Chen
Prabhanjan Ananth Shivam Bhasin Dooho Choi
Elena Andreeva Sanjay Bhattacherjee Seung Geol Choi
Yoshinori Aono Begül Bilgin Ji Young Chun
Daniel Apon Gaëtan Bisson Stelvio Cimato
Hassan Jameel Asghar Jonathan Bootle Sandro Coretti
Tomer Ashur Joppe W. Bos Jean-Marc Couveignes
Nuttapong Attrapadung Elette Boyle Joan Daemen
Maxime Augier Zvika Brakerski Bernardo David
Jean-Philippe Aumasson Mark Bun Angelo De Caro
Christian Badertscher David Cash Jeroen Delvaux
Yoo-Jin Baek Guilhem Castagnos Gregory Demay
Shi Bai Andrea Cerulli Patrick Derbez
ASIACRYPT2015 IX
Jintai Ding Dennis Hofheinz Pascal Lafourcade
Itai Dinur Justin Holmgren Russell W.F. Lai
Christophe Doche Deukjo Hong Adeline Langlois
Ming Duan Wei-Chih Hong Martin M. Lauridsen
Léo Ducas Tao Huang Changhoon Lee
Alina Dudeanu Yun-Ju Huang Changmin Lee
Orr Dunkelman Pavel Hubáček Eunjeong Lee
Keita Emura Michael Hutter Hyung Tae Lee
Martianus Frederic Andreas Hülsing Juhee Lee
Ezerman Jung Yeon Hwang Tancrède Lepoint
Xiong Fan Laurent Imbert Wen-Ding Li
Antonio Faonio Sorina Ionica Yang Li
Pooya Farshim Zahra Jafargholi Benoît Libert
Sebastian Faust Tibor Jager Seongan Lim
Marc Fischlin Jérémy Jean Changlu Lin
Eiichiro Fujisaki Ik Rae Jeong Fuchun Lin
Philippe Gaborit Hyungrok Jo Tingting Lin
Martin Gagné Thomas Johansson Wei-Kai Lin
Steven Galbraith Antoine Joux Feng-Hao Liu
Nicolas Gama Handan Kılınç Junrong Liu
Wei Gao Taewon Kim Shengli Liu
Peter Gaži Alexandre Karlov Ya Liu
Essam Ghadafi Pierre Karpman Zhen Liu
Hossein Ghodosi Kenji Kashiwabara Zhenhua Liu
Irene Giacomelli Aniket Kate Zhiqiang Liu
Benedikt Gierlichs Marcel Keller Satya Lokam
Zheng Gong Carmen Kempka Carl Löndahl
Dov Gordon Dmitry Khovratovich Yu Long
Robert Granger Dakshita Khurana Steve Lu
Sylvain Guilley Jinsu Kim Yiyuan Luo
Jian Guo Jongsung Kim Atul Luykx
Qian Guo Min Kyu Kim Vadim Lyubashevsky
Zheng Guo Sungwook Kim Alex J. Malozemoff
Divya Gupta Tae Hyun Kim Avradip Mandal
Florian Göpfert Taechan Kim Giorgia Azzurra Marson
Jaecheol Ha Taewan Kim Luke Mather
Xue Haiyang Paul Kirchner Takahiro Matsuda
Keisuke Hakuta Elena Kirshanova Christian Matt
Shuai Han Susumu Kiyoshima Peihan Miao
Neil Hanley Thorsten Kleinjung Daniele Micciancio
Malin Md Mokammel Jessica Koch Andrea Miele
Haque Markulf Kohlweiss Eric Miles
Yasufumi Hashimoto Ilan Komargodski Kazuhiko Minematsu
Gottfried Herold Venkata Koppula Marine Minier
Javier Herranz Ranjit Kumaresan Takaaki Mizuki
Shoichi Hirose Po-Chun Kuo Ameer Mohammed
Viet Tung Hoang Stefan Kölbl Paweł Morawiecki