Table Of ContentLecture Notes in Computer Science 4318
CommencedPublicationin1973
FoundingandFormerSeriesEditors:
GerhardGoos,JurisHartmanis,andJanvanLeeuwen
EditorialBoard
DavidHutchison
LancasterUniversity,UK
TakeoKanade
CarnegieMellonUniversity,Pittsburgh,PA,USA
JosefKittler
UniversityofSurrey,Guildford,UK
JonM.Kleinberg
CornellUniversity,Ithaca,NY,USA
FriedemannMattern
ETHZurich,Switzerland
JohnC.Mitchell
StanfordUniversity,CA,USA
MoniNaor
WeizmannInstituteofScience,Rehovot,Israel
OscarNierstrasz
UniversityofBern,Switzerland
C.PanduRangan
IndianInstituteofTechnology,Madras,India
BernhardSteffen
UniversityofDortmund,Germany
MadhuSudan
MassachusettsInstituteofTechnology,MA,USA
DemetriTerzopoulos
UniversityofCalifornia,LosAngeles,CA,USA
DougTygar
UniversityofCalifornia,Berkeley,CA,USA
MosheY.Vardi
RiceUniversity,Houston,TX,USA
GerhardWeikum
Max-PlanckInstituteofComputerScience,Saarbruecken,Germany
Helger Lipmaa MotiYung
Dongdai Lin (Eds.)
Information Security
and Cryptology
Second SKLOIS Conference, Inscrypt 2006
Beijing,China,November29-December1,2006
Proceedings
1 3
VolumeEditors
HelgerLipmaa
AdastralPostgraduateCampus
UniversityCollege
London,UK
E-mail:[email protected]
MotiYung
ComputerScienceDepartment
ColumbiaUniversity
NewYork,USA
E-mail:[email protected]
DongdaiLin
SKLOIS,InstituteofSoftware
ChineseAcademyofSciences
Beijing100080,China
E-mail:[email protected]
LibraryofCongressControlNumber:2006936729
CRSubjectClassification(1998):E.3,D.4.6,F.2.1,C.2,J.1,C.3,K.4.4,K.6.5
LNCSSublibrary:SL4–SecurityandCryptology
ISSN 0302-9743
ISBN-10 3-540-49608-4SpringerBerlinHeidelbergNewYork
ISBN-13 978-3-540-49608-3SpringerBerlinHeidelbergNewYork
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting,
reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965,
initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable
toprosecutionundertheGermanCopyrightLaw.
SpringerisapartofSpringerScience+BusinessMedia
springer.com
©Springer-VerlagBerlinHeidelberg2006
PrintedinGermany
Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India
Printedonacid-freepaper SPIN:11937807 06/3142 543210
Preface
The second SKLOIS Conference on Information Security and Cryptology 2006
(Inscrypt, formerly CISC) was organizedby the State Key Laboratoryof Infor-
mation Security of the Chinese Academy of Sciences. This international confer-
ence washeld in Beijing,China and wassponsoredby the Institute of Software,
the Chinese Academy ofSciences,the GraduateUniversityofChinese Academy
of Sciences and the National Natural Science Foundations of China. The con-
ference proceedings, with contributed papers, are published by Springer in this
volume of Lecture Notes in Computer Science (LNCS).
TheresearchareascoveredbyInscrypthavebeengainingincreasedvisibility
recently since modern computing andcommunicationinfrastructures andappli-
cationsrequireincreasedsecurity,trustandsafety.Indeedimportantfundamen-
tal,experimentalandappliedworkhasbeendoneinwide areasofcryptography
and information security research in recent years. Accordingly, the program of
Inscrypt 2006 coverednumerous fields of research within these areas.
The International Program Committee of the conference received a total of
225 submissions, from which only 23 submissions were selected for presentation
at the regular papers track and are part of this volume. In addition to this
track, the conference also hosted a short paper track of 13 presentations that
were carefully selected as well. All anonymous submissions were reviewed by
experts in the relevant areas and based on their ranking, technical remarks and
strict selection criteria the papers were selected to the various tracks.
Manypeopleandorganizationshelpedinmakingtheconferenceareality.We
would like to take this opportunity to thank the Program Committee members
and the external experts for their invaluable help in producing the conference
program.We wouldlike to further thank the conferenceOrganizingCommittee.
Special thanks are due to Dongdai Lin for his excellent help in organizing the
conferenceandtheproceedings.Wewishtothankthevarioussponsorsand,last
butnotleast,wealsoexpressourthankstoalltheauthorswhosubmittedpapers
to the conference, the invited speakers,the sessionchairs and all the conference
attendees.
November 2006 Helger Lipmaa and Moti Yung
Inscrypt (formerly CISC) 2006
2nd SKLOIS Conference
on Information Security and Cryptology
Beijing, China
November 29 - December 1, 2006
Sponsored and organized by
State Key Laboratory of Information Security
(Chinese Academy of Sciences)
General Chair
Dengguo Feng SKLOIS, Chinese Academy of Sciences, China
Program Co-chairs
Helger Lipmaa University College London, UK
Moti Yung RSA Labs and Columbia University, USA
Program Committee
N. Asokan Nokia, Finland
Catharina Candolin SET-Security Oy, Finland
Kefei Chen Shanhai Jiaotong University, China
Ee Chien Chang NUS, Singapore
Debra Cook Bell Labs, USA
Claudia Diaz K.U. Leuven, Belgium
Orr Dunkelman Technion, Israel
Nelly Fazio IBM Almaden, USA
Kris Gaj George Mason University, USA
Juan Garay Bell Labs, USA
Minaxi Gupta Indiana University, USA
Florian Hess TU Berlin, Germany
Yupu Hu Xidian University, China
Tetsu Iwata Nagoya University, Japan
Aggelos Kiayias University of Connecticut, USA
Kaoru Kurosawa Ibaraki University, Japan
Peeter Laud University of Tartu, Estonia
Benoit Libert UCL, Belgium
VIII Organization
Dongdai Lin SKLOIS, China
Javier Lopez University of Malaga, Spain
Masahiro Mambo Tsukuba University, Japan
Wenbo Mao HP Shanghai, China
Steven Myers Indiana University, USA
Lan Nguyen WinMagic Inc., Canada
Hieu Phan UCL, UK
Raphael Phan Swinburne University of Technology, Malaysia
Markku-Juhani O. Saarinen Royal Holloway, UK
Palash Sarkar ISI, India
Nitesh Saxena Polytechnic University, USA
Katja Schmidt-Samoa TU Darmstadt, Germany
Berry Schoenmakers Eindhoven University of Technology,
Netherlands
Yiannis Stamatiou CTI, Greece
Rainer Steinwandt FAU, USA
Ivan Visconti University of Salerno, Italy
Guilin Wang I2R, Singapore
Huaxiong Wang Macquarie University, Australia
Xiaoyun Wang Tsinghua University, China
Yunlei Zhao Fudan University, China
Proceedings Co-editors
Helger Lipmaa University College London, UK
Moti Yung RSA Labs and Columbia University, USA
Dongdai Lin Chinese Academy of Sciences, China
Organizing Committee
Dongdai Lin SKLOIS, Chinese Academy of Sciences, China
Jiwu Jing SKLOIS, Chinese Academy of Sciences, China
Chuankun Wu SKLOIS, Chinese Academy of Sciences, China
Wenling Wu SKLOIS, Chinese Academy of Sciences, China
Zhenfeng Zhang SKLOIS, Chinese Academy of Sciences, China
Secretary and Treasurer
Yi Qin Chinese Academy of Sciences, China
Table of Contents
Digital Signature Schemes
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings
in CISC ’05 ...................................................... 1
Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim,
Ikkwon Yie, Kilsoo Chun
Identity-Based Key-Insulated Signature with Secure Key-Updates....... 13
Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
Efficient Intrusion-Resilient Signatures Without Random Oracles........ 27
Benoˆıt Libert, Jean-Jacques Quisquater, Moti Yung
Sequences and Stream Ciphers
New Constructions of Large Binary Sequences Family with Low
Correlation....................................................... 42
Xin Tong, Jie Zhang, Qiao-Yan Wen
On the Rate of Coincidence of Two Clock-ControlledCombiners ........ 54
Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li
Symmetric-Key Cryptography
Designing Power Analysis Resistant and High Performance Block
Cipher Coprocessor Using WDDL and Wave-Pipelining ................ 66
Yuanman Tong, Zhiying Wang, Kui Dai, Hongyi Lu
OPMAC: One-Key Poly1305MAC ................................. 78
Dayin Wang, Dongdai Lin, Wenling Wu
A General Construction of Tweakable Block Ciphers and Different
Modes of Operations .............................................. 88
Debrup Chakraborty, Palash Sarkar
Cryptographic Schemes
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing
Scheme .......................................................... 103
Christophe Tartary, Huaxiong Wang
X Table of Contents
Efficient Short Signcryption Scheme with Public Verifiability ........... 118
Changshe Ma
A Revocation Scheme Preserving Privacy ............................ 130
L(cid:2) ukasz Krzywiecki, Przemysl(cid:2)aw Kubiak, Mirosl(cid:2)aw Kutyl(cid:2)owski
Network Security
Deterministic Packet Marking with Link Signatures for IP Traceback .... 144
Yi Shi, Xinyu Yang, Ning Li, Yong Qi
Survey and Taxonomy of Feature Selection Algorithms in Intrusion
Detection System ................................................. 153
You Chen, Yang Li, Xue-Qi Cheng, Li Guo
A Network Security Policy Model and Its Realization Mechanism ....... 168
Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao
Packet Marking Based Cooperative Attack Response Service for
Effectively Handling Suspicious Traffic............................... 182
Gaeil An, Joon S. Park
Access Control
A Verifiable Formal Specification for RBAC Model with Constraints
of Separation of Duty.............................................. 196
Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou
Design and Implementation of Fast Access Control That Supports
the Separation of Duty ............................................ 211
SeongKi Kim, EunKyung Jin, YoungJin Song, SangYong Han
Computer and Applications Security
A Practical Alternative to Domain and Type Enforcement Integrity
Formal Models ................................................... 225
Liuying Tang, Sihan Qing
Return Address Randomization Scheme for Annuling Data-Injection
Buffer Overflow Attacks ........................................... 238
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hong
Application and Evaluation of Bayesian Filter for Chinese Spam ........ 253
Zhan Wang, Yoshiaki Hori, Kouichi Sakurai
Table of Contents XI
Web and Media Security
Batch Decryption of Encrypted Short Messages and Its Application
on Concurrent SSL Handshakes..................................... 264
Yongdong Wu, Feng Bao
An Enterprise Security Management System as a Web-Based
Application Service for Small/Medium Businesses ..................... 279
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho Kun Moon,
Jin Gi Choe, Yu Kang
Obtaining Asymptotic Fingerprint Codes Through a New Analysis
of the Boneh-Shaw Codes .......................................... 289
Marcel Fernandez, Josep Cotrina
Author Index................................................... 305
Cryptanalysis of Two Signature Schemes Based
on Bilinear Pairings in CISC ’05
Haeryong Park1,(cid:2), Zhengjun Cao2, Lihua Liu3, Seongan Lim4,(cid:2)(cid:2),
Ikkwon Yie4, and Kilsoo Chun1
1 Korea Information Security Agency (KISA),Seoul, Korea 138-803
{hrpark, kschun}@kisa.or.kr
2 Department of Mathematics, Shanghai University,Shanghai, China 200444
[email protected]
3 Department of Information and Computation Sciences, Shanghai Maritime
University,Shanghai, China 200135
4 Department of Mathematics, InhaUniversity,Incheon,Korea 402-751
{seongannym, ikyie}@inha.ac.kr
Abstract. Thebilinearity ofpairings allows efficient signatureverifica-
tionforsignatureschemesbasedondiscretelogarithmtypeproblemand
often provides useful additional functionalities to signature schemes. In
recent years,bilinear pairings havebeenwidely usedtocreate signature
schemes. But the bilinearity can also be an attack point in uncarefully
designedprotocols.Wecryptanalyzetwosignatureschemespresentedat
CISC’05,Chengetal.’sgroupsignatureschemeandGuetal.’sID-based
verifiably encrypted signature scheme, both based on bilinear pairings.
Weshowthattheirimproperusesofabilinearpairingleadtountraceable
group signatures for Cheng et al.’s group signature scheme and univer-
sally forgeable signatures for Gu et al.’s ID-based verifiably encrypted
signature scheme.
Keywords: bilinear pairing, group signature, ID-based cryptography,
verifiably encrypted signature.
1 Introduction
Recently, bilinear pairings have been widely used to create many signature
schemes with additional functionality or better efficiency. For example, there
havebeenpapersonshortsignatures,groupsignatures,verifiablyencryptedsig-
natures, and many more. The linearity of bilinear pairings is very effective in
termsofboth“efficiency”and“functionality”.Butoneshouldbecarefulsothat
the linearity should not be manipulated in a malicious way by an attacker.
Inthispaper,weshallshowthattwosignatureschemesproposedatCISC’05
based on bilinear pairings can be attacked by using the taking advantage of the
bilinearity property.
(cid:2) This work was supported by MIC.
(cid:2)(cid:2) ThisworkwassupportedbytheKRFGrant(KRF-2004-R03-10023) fundedbythe
Korean Government(MOEHRD).
H.Lipmaa,M.Yung,andD.Lin(Eds.):Inscrypt2006,LNCS4318,pp.1–12,2006.
(cid:2)c Springer-VerlagBerlinHeidelberg2006