CRYPTO 2007:
Santa Barbara, California, USA
Alfred Menezes (Ed.):Advances in Cryptology - CRYPTO 2007
27th Annual International Cryptology Conference
Santa Barbara, CA, USA, August 19-23, 2007
Lecture Notes in Computer Science, 4622 Springer 2007, ISBN 978-3-540-74142-8
August 19-23, 2007, Santa Barbara, California, USA
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy
Computer Science Department, University of California, Santa Barbara
Preface , by Alfred Menezes
General Chair
Markus Jakobsson, Indiana University, USA
Program Chair
Alfred Menezes, University of Waterloo, Canada
Program Committee
Amos Beimel | Ben-Gurion University, Israel |
Alex Biryukov | University of Luxembourg, Luxembourg |
Xavier Boyen | Voltage Security, USA |
Yevgeniy Dodis | New York University, USA |
Orr Dunkelman | Katholieke Universiteit Leuven, Belgium |
Matt Franklin | UC Davis, USA |
Steven Galbraith | Royal Holloway, University of London, UK |
Rosario Gennaro | IBM Research, USA |
Martin Hirt | ETH Zurich, Switzerland |
Nick Howgrave-Graham | NTRU, USA |
Antoine Joux | DGA and Université de Versailles, France |
John Kelsey | NIST, USA |
Neal Koblitz | University of Washington, USA |
Kaoru Kurosawa | Ibaraki University, Japan |
Tanja Lange | Technische Universiteit Eindhoven, Netherlands |
Kristin Lauter | Microsoft Research. USA |
Kenny Paterson | Royal Holloway, University of London, UK |
David Pointcheval | École Normale Supérieure, France |
Bart Preneel | Katholieke Universiteit Leuven, Belgium |
Zulfikar Ramzan | Symantec, USA |
Omer Reingold | Weizmann Institute of Science, Israel |
Rei Safavi-Naini | University of Calgary, Canada |
Amit Sahai | UCLA, USA |
Palash Sarkar | Indian Statistical Institute, India |
Nigel Smart | University of Bristol, UK |
Adam Smith | UCLA & Penn State University, USA |
Rainer Steinwandt | Florida Atlantic University, USA |
Yiqun Lisa Yin | Independent Consultant, USA |
External Reviewers
Advisory Members
Cynthia Dwork (CRYPTO 2006 Program Chair), Microsoft, USA
David Wagner (CRYPTO 2008 Program Chair), UC Berkeley, USA
Cryptanalysis I
-
Vivien Dubois
,
Pierre-Alain Fouque
,
Adi Shamir
,
Jacques Stern
:
Practical Cryptanalysis of SFLASH , ( .ps ). 1-12
BibTeX -
Pierre-Alain Fouque
,
Gaëtan Leurent
,
Phong Q. Nguyen
:
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 , ( .ps ). 13-30
BibTeX
Secure Searching
-
Amos Beimel
,
Tal Malkin
,
Kobbi Nissim
,
Enav Weinreb
:
How Should We Solve Search Problems Privately? , ( .ps ). 31-49
BibTeX -
Dan Boneh
,
Eyal Kushilevitz
,
Rafail Ostrovsky
,
William E. Skeith III
:
Public Key Encryption That Allows PIR Queries , ( .ps ). 50-67
BibTeX
Invited Talk
-
Ross Anderson
,
Tyler Moore
:
Information Security Economics - and Beyond , ( .ps ). 68-91
BibTeX
Theory I
-
Benny Applebaum
,
Yuval Ishai
,
Eyal Kushilevitz
:
Cryptography with Constant Input Locality , ( .ps ). 92-110
BibTeX -
Omer Horvitz
,
Jonathan Katz
:
Universally-Composable Two-Party Computation in Two Rounds , ( .ps ). 111-129
BibTeX -
Ueli M. Maurer
,
Krzysztof Pietrzak
,
Renato Renner
:
Indistinguishability Amplification , ( .ps ). 130-149
BibTeX
Lattices
-
Nick Howgrave-Graham
:
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU , ( .ps ). 150-169
BibTeX -
Guillaume Hanrot
,
Damien Stehlé
:
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm , ( .ps ). 170-186
BibTeX
Random Oracles
-
Ueli M. Maurer
,
Stefano Tessaro
:
Domain Extension of Public Random Functions: Beyond the Birthday Barrier , ( .ps ). 187-204
BibTeX -
Dominique Unruh
:
Random Oracles and Auxiliary Input , ( .ps ). 205-223
BibTeX
Hash Functions
-
Marc Fischlin
,
Anja Lehmann
:
Security-Amplifying Combiners for Collision-Resistant Hash Functions , ( .ps ). 224-243
BibTeX -
Antoine Joux
,
Thomas Peyrin
:
Hash Functions and the (Amplified) Boomerang Attack , ( .ps ). 244-263
BibTeX -
Ran Canetti
,
Ronald L. Rivest
,
Madhu Sudan
,
Luca Trevisan
,
Salil P. Vadhan
,
Hoeteck Wee
:
Amplifying Collision Resistance: A Complexity-Theoretic Treatment , ( .ps ). 264-283
BibTeX
Theory II
-
Danny Harnik
,
Yuval Ishai
,
Eyal Kushilevitz
:
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? , ( .ps ). 284-302
BibTeX -
Melissa Chase
,
Anna Lysyanskaya
:
Simulatable VRFs with Applications to Multi-theorem NIZK , ( .ps ). 303-322
BibTeX -
Jens Groth
,
Rafail Ostrovsky
:
Cryptography in the Multi-string Model , ( .ps ). 323-341
BibTeX
Quantum Cryptography
-
Ivan Damgård
,
Serge Fehr
,
Louis Salvail
,
Christian Schaffner
:
Secure Identification and QKD in the Bounded-Quantum-Storage Model , ( .ps ). 342-359
BibTeX -
Ivan Damgård
,
Serge Fehr
,
Renato Renner
,
Louis Salvail
,
Christian Schaffner
:
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications , ( .ps ). 360-378
BibTeX
Cryptanalysis II
-
Jean-Sébastien Coron
:
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach , ( .ps ). 379-394
BibTeX -
Ellen Jochemsz
,
Alexander May
:
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073 , ( .ps ). 395-411
BibTeX
Encryption
-
Shai Halevi
:
Invertible Universal Hashing and the TET Encryption Mode , ( .ps ). 412-429
BibTeX -
Vipul Goyal
:
Reducing Trust in the PKG in Identity Based Cryptosystems , ( .ps ). 430-447
BibTeX -
Aggelos Kiayias
,
Serdar Pehlivanoglu
:
Pirate Evolution: How to Make the Most of Your Traitor Keys , ( .ps ). 448-465
BibTeX
Protocol Analysis
-
Daniel R. L. Brown
,
Kristian Gjøsteen
:
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator , ( .ps ). 466-481
BibTeX -
Emmanuel Bresson
,
Yassine Lakhnech
,
Laurent Mazaré
,
Bogdan Warinschi
:
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness , ( .ps ). 482-499
BibTeX -
Russell Impagliazzo
,
Ragesh Jaiswal
,
Valentine Kabanets
:
Chernoff-Type Direct Product Theorems , ( .ps ). 500-516
BibTeX
Public-Key Encryption
-
Manoj Prabhakaran
,
Mike Rosulek
:
Rerandomizable RCCA Encryption , ( .ps ). 517-534
BibTeX -
Mihir Bellare
,
Alexandra Boldyreva
,
Adam O'Neill
:
Deterministic and Efficiently Searchable Encryption , ( .ps ). 535-552
BibTeX -
Dennis Hofheinz
,
Eike Kiltz
:
Secure Hybrid Encryption from Weakened Key Encapsulation , ( .ps ). 553-571
BibTeX
Multi-party Computation
-
Ivan Damgård
,
Jesper Buus Nielsen
:
Scalable and Unconditionally Secure Multiparty Computation , ( .ps ). 572-590
BibTeX -
Yvo Desmedt
,
Josef Pieprzyk
,
Ron Steinfeld
,
Huaxiong Wang
:
On Secure Multi-party Computation in Black-Box Groups , ( .ps ). 591-612
BibTeX -
Ronald Cramer
,
Eike Kiltz
,
Carles Padró
:
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra , ( .ps ). 613-630
BibTeX
Author Index