Table Of ContentYi Deng
Moti Yung (Eds.)
7
3
Information Security
8
3
1
S
and Cryptology
C
N
L
18th International Conference, Inscrypt 2022
Beijing, China, December 11–13, 2022
Revised Selected Papers
Lecture Notes in Computer Science 13837
FoundingEditors
GerhardGoos
JurisHartmanis
EditorialBoardMembers
ElisaBertino,PurdueUniversity,WestLafayette,IN,USA
WenGao,PekingUniversity,Beijing,China
BernhardSteffen ,TUDortmundUniversity,Dortmund,Germany
MotiYung ,ColumbiaUniversity,NewYork,NY,USA
TheseriesLectureNotesinComputerScience(LNCS),includingitssubseriesLecture
Notes in Artificial Intelligence (LNAI) and Lecture Notes in Bioinformatics (LNBI),
hasestablisheditselfasamediumforthepublicationofnewdevelopmentsincomputer
scienceandinformationtechnologyresearch,teaching,andeducation.
LNCSenjoysclosecooperationwiththecomputerscienceR&Dcommunity,the
seriescountsmanyrenownedacademicsamongitsvolumeeditorsandpaperauthors,and
collaborateswithprestigioussocieties.Itsmissionistoservethisinternationalcommu-
nitybyprovidinganinvaluableservice,mainlyfocusedonthepublicationofconference
andworkshopproceedingsandpostproceedings.LNCScommencedpublicationin1973.
Yi Deng · Moti Yung
Editors
Information Security
and Cryptology
18th International Conference, Inscrypt 2022
Beijing, China, December 11–13, 2022
Revised Selected Papers
Editors
YiDeng MotiYung
InstituteofInformationEngineering,CAS ColumbiaUniversity
Beijing,China NewYork,NY,USA
ISSN 0302-9743 ISSN 1611-3349 (electronic)
LectureNotesinComputerScience
ISBN 978-3-031-26552-5 ISBN 978-3-031-26553-2 (eBook)
https://doi.org/10.1007/978-3-031-26553-2
©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicense
toSpringerNatureSwitzerlandAG2023
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof
thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow
knownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsorthe
editorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforanyerrors
oromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin
publishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Preface
The 18th International Conference on Information Security and Cryptology (Inscrypt
2022) was held on-line on December 11–13, 2002. It was organized by the State Key
LaboratoryofInformationSecurity,ChineseAcademyofSciences,incooperationwith
theIACR.
InscryptisanannualinternationalconferenceheldinChina,coveringallresearch
areasofinformationsecurity,cryptology,andtheirapplications.Theprogramcommittee
ofInscrypt2022wascomposedof51members,andreceived69submissionsfromChina,
Japan,theUK,Australia,Romania,Belgium,andtheUSA,fromwhich23submissions
wereselectedasregularpapersand3papersasshortpapers.Allanonymoussubmissions
werereviewedbyatleastthreePCmemberseach,oraidedbyexternalreviewersinthe
relevantareas.Paperswereselectedtotheprogrambasedontheirrankings,discussions,
andtechnicalremarks.
TheprogramofInscrypt2022includedfourexcellentinvitedkeynotetalksbyHuax-
iong Wang (Singapore), Juan Garay (USA), Yu Yu (China), and Yilei Chen (China).
Furthermore,theprogramincluded9regularsessionsonthesubjectsofblockciphers,
public-keyencryptionandsignature,quantumcryptography,multi-partycomputations,
cryptanalysis, mathematical aspects of cryptography, stream ciphers, malware, and
lattices.
Manypeoplehelpedinmakingtheconferenceareality.Wewouldliketotakethis
opportunity to thank the Program Committee members and the external reviewers for
their invaluable help in producing the conference program. We would like to further
thank the honorary chairs, Xiaofeng Wang and Dongdai Lin, for their helpful advice,
and the general chairs, Wenhao Wang and Guozhu Meng, for their excellent help in
organizingtheconferenceandtheproceedings.Finally,wewishtothankalltheauthors
whosubmittedpaperstotheconference,theinvitedspeakers,thesessionchairs,andall
theconferenceattendees.
November2022 YiDeng
MotiYung
Organization
HonoraryChairs
XiaoFengWang IndianaUniversityBloomington,USA
DongdaiLin InstituteofInformationEngineering,CAS,China
GeneralChairs
WenhaoWang InstituteofInformationEngineering,CAS,China
GuozhuMeng InstituteofInformationEngineering,CAS,China
ProgramChairs
YiDeng InstituteofInformationEngineering,CAS,China
MotiYung ColumbiaUniversity,USA
ProgramCommittee
GhousAmjad GoogleLLC,USA
ManHoAu TheUniversityofHongKong,China
BoChen MichiganTechnologicalUniversity,USA
JieChen EastChinaNormalUniversity,China
KaiChen InstituteofInformationEngineering,CAS,China
RongmaoChen NationalUniversityofDefenseTechnology,
China
SanchuanChen FordhamUniversity,USA
SenChen TianjinUniversity,China
YuChen ShandongUniversity,China
XiaofengChen XidianUniversity,China
YileiChen TsinghuaUniversity,China
YueqiangCheng NIOSecurityResearch,USA
MicheleCiampi TheUniversityofEdinburgh,UK
YiDeng InstituteofInformationEngineering,CAS,China
WenruiDiao ShandongUniversity,China
XiongFan RutgersUniversity,USA
viii Organization
RuitaoFeng TheUniversityofNewSouthWales,Australia
NicholasGenise DualityTechnologies,USA
ChunGuo ShandongUniversity,China
DebiaoHe WuhanUniversity,China
XinyiHuang FujianNormalUniversity,China
MiroslawKutylowski WroclawUniversityofTechnology,Poland
JunzuoLai SingaporeManagementUniversity,Singapore
JingqiangLin UniversityofScienceandTechnologyofChina,
China
MeichengLiu InstituteofInformationEngineering,CAS,China
ZhenLiu ShanghaiJiaoTongUniversity,China
XianhuiLu InstituteofInformationEngineering,CAS,China
YuanLu InstituteofInformationEngineering,CAS,China
WeizhiMeng TechnicalUniversityofDenmark,Denmark
KhoaNguyen UniversityofWollongong,Australia
LongjiangQu NationalUniversityofDefenseTechnology,
China
WenboShen ZhejiangUniversity,China
BingSun NationalUniversityofDefenseTechnology,
China
MingshenSun Intel,USA
SiweiSun UniversityofChineseAcademyofSciences,
China
QiangTang UniversityofSydney,Australia
IvanVisconti UniversityofSalerno,Italy
DingWang NankaiUniversity,China
QianWang WuhanUniversity,China
WeijiaWang ShandongUniversity,China
XiangXie ShanghaiQiZhiInstitute,China
LuyiXing IndianaUniversityBloomington,USA
YangYu TsinghuaUniversity,China
YongYu ShaanxiNormalUniversity,China
YuYu ShanghaiJiaoTongUniversity,China
MotiYung ColumbiaUniversity,USA
ChaoZhang TsinghuaUniversity,China
JiangZhang InstituteofSoftware,CAS,China
JiliangZhang HunanUniversity,China
ChanganZhao SunYat-senUniversity,China
Hong-ShengZhou VirginiaCommonwealthUniversity,USA
HaojinZhu ShanghaiJiaoTongUniversity,China
Contents
BlockCiphers
HowFastCanSM4beinSoftware? ...................................... 3
XinMiao,ChunGuo,MeiqinWang,andWeijiaWang
LLLWBC:ANewLow-LatencyLight-WeightBlockCipher ................. 23
LeiZhang,RuichenWu,YuhanZhang,YafeiZheng,andWenlingWu
NewAutomaticSearchToolforSearchingforImpossibleDifferentials
UsingUndisturbedBits ................................................. 43
WeiweiCao,WentaoZhang,andChunningZhou
PublicKeyEncryption&Signature
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption
andSignature ......................................................... 67
MinZhang,BinbinTu,andYuChen
SR-MuSig2:AScalableandReconfigurable Multi-signatureScheme
andItsApplications .................................................... 87
WenqiuMaandRuiZhang
McEliece-TypeEncryptionBasedonGabidulinCodeswithNoHidden
Structure ............................................................. 108
WenshuoGuoandFang-WeiFu
Quantum
OptimizingtheDepthofQuantumImplementationsofLinearLayers ......... 129
ChengkaiZhuandZhenyuHuang
IND-CCASecurityofKyberintheQuantumRandomOracleModel,
Revisited ............................................................. 148
ZhaoChen,XianhuiLu,DingdingJia,andBaoLi
x Contents
MPC
Practical Multi-party Private Set Intersection Cardinality
andIntersection-SumUnderArbitraryCollusion ........................... 169
YouChen,NingDing,DawuGu,andYangBian
AmortizingDivisionandExponentiation .................................. 192
CongZhang,ShuaishuaiLi,andDongdaiLin
Cryptanalysis
GeneralizedBoomerangConnectivityTableandImprovedCryptanalysis
ofGIFT .............................................................. 213
ChenmengLi,BaofengWu,andDongdaiLin
CryptanalysisofCiminion .............................................. 234
LuluZhang,MeichengLiu,ShuaishuaiLi,andDongdaiLin
ClusteringEffectofIterativeDifferentialandLinearTrails .................. 252
TianyouDing,WentaoZhang,andChunningZhou
DifferentialCryptanalysisofRound-ReducedSPEEDYFamily ............... 272
QingyuanYu,KetingJia,GuangnanZou,andGuoyanZhang
MathematicalAspectsofCrypto
ANoteonInvertedTwistedEdwardsCurve ............................... 295
LuyingLiandWeiYu
EfficientlyComputableComplexMultiplicationofEllipticCurves ............ 305
XiaoLi,WeiYu,YuqingZhu,andZhizhongPan
Several Classes of Niho Type Boolean Functions with Few Walsh
TransformValues ...................................................... 318
YananWu,NianLi,XiangyongZeng,andYuhuaCai
StreamCiphers
Higher-OrderMaskingSchemeforTriviumHardwareImplementation ........ 337
BohanLi,HailongZhang,andDongdaiLin
AnExperimentallyVerifiedAttackon820-RoundTrivium .................. 357
ChengCheandTianTian