ICISC 2003, Volume 6Jong In Lim, Dong Hoon Lee This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers. |
Contents
Invited Talk | 1 |
On the Security of a Group Signature Scheme with Forward Security | 27 |
An Efficient Strong Designated Verifier Signature Scheme | 40 |
Table of Contents | 49 |
Primitives | 55 |
New Methods to Construct Cheating Immune Functions | 79 |
Fast Implementations | 97 |
A General Expansion Method Using Efficient Endomorphisms | 112 |
ReceiptFree Electronic Auction Schemes Using Homomorphic Encryption | 259 |
Watermarking | 274 |
Analysis of the Bounds for Linear Block Codes in Watermark Channel | 294 |
Security Analysis of Some Proxy Signatures | 305 |
A More Secure and Efficacious TTS Signature Scheme | 320 |
JiunMing Chen and BoYin Yang | 328 |
An Efficient Revocation Algorithm in Group Signatures | 339 |
Efficient Forward and Provably Secure IDBased Signcryption Scheme | 352 |
Design of Bit Parallel Multiplier with Lower Time Complexity | 127 |
Architecture for an Elliptic Curve Scalar Multiplication Resistant | 139 |
Efficient Scalar Multiplication in Hyperelliptic Curves | 152 |
Computer SecurityMobile Security | 166 |
Extended Role Based Access Control and Procedural Restrictions | 184 |
LayerBased Access Control Model in the Manufacturing Infrastructure | 197 |
VotingAuction Protocols | 215 |
SealedBid Auctions with Efficient Bids | 230 |
Providing ReceiptFreeness in MixnetBased Voting Protocols | 245 |
AuthenticationThreshold Protocols | 370 |
A New Algorithm for Searching a Consistent Set of Shares | 377 |
Noninteractive Deniable Ring Authentication | 386 |
BlockStream Ciphers | 402 |
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher | 418 |
ARIA | 432 |
Truncated Differential Attacks on 8Round CRYPTON | 446 |
457 | |
Other editions - View all
Common terms and phrases
access control addition Advances adversary algorithm application assignment assume attack auction authentication bidder bits block called ciphertext communication complexity Computer consider construct Cryptography Cryptology curves decryption defined definition denote described distributed divisor double efficient elliptic curves embedding encryption example execution exists extended field formal function given hash functions identity implementation initial input knowledge LNCS manager method multiplication needs Note objects obtain operation organization original output pair perform polynomial present probability problem proof proposed protection protocol prove proxy public key random receipt-free represent resistant result ring role round satisfies Science secret servers shares signature scheme signer signing Springer-Verlag step Table task Theorem threshold valid vector verifier voting watermark