Table Of ContentLecture Notes in Computer Science 5487
CommencedPublicationin1973
FoundingandFormerSeriesEditors:
GerhardGoos,JurisHartmanis,andJanvanLeeuwen
EditorialBoard
DavidHutchison
LancasterUniversity,UK
TakeoKanade
CarnegieMellonUniversity,Pittsburgh,PA,USA
JosefKittler
UniversityofSurrey,Guildford,UK
JonM.Kleinberg
CornellUniversity,Ithaca,NY,USA
AlfredKobsa
UniversityofCalifornia,Irvine,CA,USA
FriedemannMattern
ETHZurich,Switzerland
JohnC.Mitchell
StanfordUniversity,CA,USA
MoniNaor
WeizmannInstituteofScience,Rehovot,Israel
OscarNierstrasz
UniversityofBern,Switzerland
C.PanduRangan
IndianInstituteofTechnology,Madras,India
BernhardSteffen
UniversityofDortmund,Germany
MadhuSudan
MassachusettsInstituteofTechnology,MA,USA
DemetriTerzopoulos
UniversityofCalifornia,LosAngeles,CA,USA
DougTygar
UniversityofCalifornia,Berkeley,CA,USA
GerhardWeikum
Max-PlanckInstituteofComputerScience,Saarbruecken,Germany
MotiYung Peng Liu Dongdai Lin (Eds.)
Information Security
and Cryptology
4th International Conference, Inscrypt 2008
Beijing, China, December 14-17, 2008
Revised Selected Papers
1 3
VolumeEditors
MotiYung
GoogleInc.andColumbiaUniversity
ComputerScienceDepartment
Room464,S.W.MuddBuilding,NewYork,NY10027,USA
E-mail:[email protected]
PengLiu
PennsylvaniaStateUniversity
CollegeofInformationSciencesandTechnology
UniversityPark,PA16802,USA
E-mail:[email protected]
DongdaiLin
SKLOIS,InstituteofSoftware,ChineseAcademyofSciences
Beijing100080,China
E-mail:[email protected]
LibraryofCongressControlNumber:Appliedfor
CRSubjectClassification(1998):E.3,D.4.6,F.2.1,C.2,J.1,C.3,K.4.4,K.6.5
LNCSSublibrary:SL4–SecurityandCryptology
ISSN 0302-9743
ISBN-10 3-642-01439-9SpringerBerlinHeidelbergNewYork
ISBN-13 978-3-642-01439-0SpringerBerlinHeidelbergNewYork
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting,
reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965,
initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable
toprosecutionundertheGermanCopyrightLaw.
springer.com
©Springer-VerlagBerlinHeidelberg2009
PrintedinGermany
Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India
Printedonacid-freepaper SPIN:12653966 06/3180 543210
Preface
The 4th China International Conference on Information Security and Cryptol-
ogy(Inscrypt2008)wasco-organizedbytheChineseAssociationforCryptologic
Researchand by the State Key Laboratoryof InformationSecurity.The confer-
encewasheldinBeijing,China inmid-December,andwasfurther sponsoredby
the Institute of Software, the Graduate University of the Chinese Academy of
Sciences, and the National Natural Science Foundations of China.
Givenitsfour-yearsuccess,Inscryptisnowatradition.Itis,infact,aleading
annualinternationaleventinthe areaofcryptographyandinformationsecurity,
taking place in China. We are pleased to report the continuous support of the
entire community:authors,attendees,committee members,reviewers,sponsors,
andorganizers.This state of affairsreflects the fact that the researchareascov-
ered by Inscrypt are important to modern computing, where increased security,
trust,safety,andreliabilityarerequired.Thisneedmakessurethatthe relevant
research community, worldwide, continues producing important fundamental,
experimental, and applied work in the wide areas of cryptographyand informa-
tionsecurityresearch.Itis nota surprisethatthe scientific programofInscrypt
2008 coverednumerous fields of research within these general areas.
The International Program Committee of Inscrypt 2008 received a total of
183 submissions from 23 countries and regions, with only 40 being selected for
presentation: 28 submissions which are collected in this volume, were chosen
for the regular papers track and 12 for the short papers track. All anonymous
submissions were reviewed by experts in the relevant areas and based on their
ranking, technical remarks, and strict selection criteria the papers were chosen
to the various tracks. The selection to both tracks was a highly competitive
process. We note also that reviews of submissions by committee members were
hiddenfromtheirauthorsthroughouttheentirereviewprocess.Wefurthernote
that due to the conferenceformat,many goodpapers haveregrettablynotbeen
accepted.
Inscrypt 2008 was made possible by the joint efforts of numerous people
and organizations worldwide. We take this opportunity to thank the Program
Committeemembersandtheexternalexpertstheyemployedfortheirinvaluable
help in producing the conference program. We further thank the conference
OrganizingCommittee,thevarioussponsors,andtheconferenceattendees.Last
but not least, we express our great gratitude to all the authors who submitted
papers to the conference, the invited speakers, and the session Chairs.
December 2008 Moti Yung
‘ Peng Liu
Dongdai Lin
Inscrypt 2008
4th China International Conference
on Information Security and Cryptology
Beijing, China
December 15 - 17, 2008
Sponsored and organized by the
Chinese Association for Cryptologic Research
and
State Key Laboratory of Information Security
(Chinese Academy of Sciences)
General Chairs
Dengguo Feng SKLOIS, Chinese Academy of Sciences, China
Program Co-chairs
Moti Yung Google Inc. and Columbia University, USA
Peng Liu Pennsylvania State University, USA
Dongdai Lin SKLOIS, Institute of Software, Chinese
Academy of Sciences, China
Program Committee
Vladimir S. Anashin Moscow University, Russia
Vijay Atluri Rutgers University, USA
Marina Blanton University of Notre Dame, USA
Zhenfu Cao Shanghai Jiaotong University, China
Claude Carlet INRIA,University Paris 8, France
Jean-Sebastien Coron University of Luxembourg, Luxembourg
Marc Dacier Symantec Research Labs Europe, France
Cunsheng Ding Hong Kong University of Science and
Technology, Hong Kong
Jintai Ding University of Cincinnati, USA
Stefan Dziembowski University of Rome “La Sapienza”, Italy
Jean-Charles Faugere INRIA, France
Guang Gong University of Waterloo, Canada
Qijun Gu Texas State University, USA
Martin Hell University of Lund, Sweden
VIII Organization
Xuxian Jiang North Carolina State University, USA
Jiwu Jing Graduate University of CAS, China
Brian King Indiana University-Purdue University,
Indianapolis, USA
Miroslaw Kutylowski Wroclaw University of Technology, Poland
Chi-Sung Lai National Cheng Kung University, Taiwan
DongHoon Lee Korea University, Korea
Albert Levi Sabanci University, Turkey
Jianhua Li Shanghai Jiaotong University, China
Jie Li University of Tsukuba, Japan
Ninghui Li Purdue University, USA
Yingjiu Li Singapore Management University, Singapore
Benoit Libert Universite Catholique de Louvain, Belgium
Javier Lopez University of Malaga, Spain
Xiapu Luo HongKongPolytechnicUniversity,HongKong
Bodo Moeller Google Inc., Zurich, Switzerland
Mridul Nandi NIST, USA
Peng Ning North Carolina State University, USA
Eiji Okamoto Tsukuba University, Japan
Ludovic Perret LIP6/INRIA Paris-Rocquencourt,France
Giuseppe Persiano University of Salerno, Italy
Raphael C.-W. Phan LoughboroughUniversity, UK
Bimal K. Roy Indian Statistical Institute, India
Kouichi Sakurai Kyushu University, Japan
Bhavani Thuraisingham University of Texas at Dallas, USA
Carmela Troncoso K.U. Leuven, Belgium
Shabsi Walfish Google Inc., USA
Huaxiong Wang Nanyang TechnologicalUniversity, Singapore
Xiaoyun Wang Shandong University, China
Chuankun Wu Institute of Software, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Meng Yu Western Illinois University, USA
Erik Zenner Technical University of Denmark, Denmark
Yuliang Zheng UniversityofNorthCarolinaatCharlotte,USA
Jianying Zhou Institute for Infocomm Research, Singapore
Sencun Zhu Pennsylvania State University, USA
Organizing Committee Co-chairs
Jiwu Jing SKLOIS, Graduate University of Chinese
Academy of Sciences, China
Zhijun Qiang Chinese Association for Cryptologic Research,
China
Organization IX
Organizing Committee
Chuankun Wu SKLOIS, Institute of Software of CAS, China
Daren Zha SKLOIS, Graduate University of CAS, China
Xiaoyang Wen SKLOIS, Graduate University of CAS, China
Aihua Zhang SKLOIS, Graduate University of CAS, China
Secretary and Treasurer
Shi Zhang SKLOIS, Graduate University of CAS, China
WEB/Registration
Yicong Liu SKLOIS, Graduate University of CAS, China
Jingjing Wu SKLOIS, Graduate University of CAS, China
Table of Contents
Invited Talks
The State of Hash Functions and the NIST SHA-3 Competition
(Extended Abstract) ............................................. 1
Bart Preneel
Key Evolution Systems in Untrusted Update Environments ........... 12
Benoˆıt Libert, Jean-Jacques Quisquater, and Moti Yung
Secure and Privacy-PreservingInformation Brokering................. 22
Peng Liu
Digital Signature and Signcryption Schemes
Provably Secure Convertible Nominative Signature Scheme .......... 23
Wei Zhao, Changlu Lin, and Dingfeng Ye
Cryptanalysis of Two Ring Signcryption Schemes .................... 41
Huaqun Wang and Hong Yu
Efficient Signcryption Key Encapsulation without Random Oracles..... 47
Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi
Privacy and Anonymity
Strong Anonymous Signatures ..................................... 60
Rui Zhang and Hideki Imai
Publicly Verifiable Privacy-PreservingGroup Decryption.............. 72
Bo Qin, Qianhong Wu, Willy Susilo, and Yi Mu
Privacy for Private Key in Signatures............................... 84
Qianhong Wu, Bo Qin, Yi Mu, and Willy Susilo
Message Authentication Code and Hash Function
Security of Truncated MACs ...................................... 96
Peng Wang, Dengguo Feng, Changlu Lin, and Wenling Wu
Security Analysis of Multivariate Polynomials for Hashing............. 115
Luk Bettale, Jean-Charles Faug`ere, and Ludovic Perret
XII Table of Contents
Secure Protocols
SPVT-II: An Efficient Security Protocol Verifier Based on Logic
Programming.................................................... 125
MengJun Li, Ti Zhou, and ZhouJun Li
Batch ZK Proof and Verification of OR Logic........................ 141
Kun Peng and Feng Bao
Symmetric Cryptography
Constructing Variable-Length PRPs and SPRPs from Fixed-Length
PRPs........................................................... 157
Debra L. Cook, Moti Yung, and Angelos Keromytis
Impossible Differential Analysis of Reduced Round CLEFIA........... 181
Wenying Zhang and Jing Han
Reducible Polynomial over F Constructed by Trinomial σ−LFSR ..... 192
2
Guang Zeng, Yang Yang, Wenbao Han, and Shuqin Fan
Certificateless Cryptography
Chosen Ciphertext Secure Certificateless Threshold Encryption in the
Standard Model ................................................. 201
Piyi Yang, Zhenfu Cao, and Xiaolei Dong
Further Observations on Certificateless Public Key Encryption......... 217
Xu an Wang, Xinyi Huang, and Xiaoyuan Yang
Hardware Implementation and Side Channel Attack
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted
Mobile Computing ............................................... 240
Mooseop Kim, Jaecheol Ryou, and Sungik Jun
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of
Integers to Resist SPA............................................ 253
Duo Liu, Zhiyong Tan, and Yiqi Dai
Wireless Network Security
A Novel Marking Probability Distribution Using Probability
Propagationin HierarchicalWSN .................................. 265
Bo-Chao Cheng, Huan Chen, and Guo-Tan Liao