Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings

Front Cover
Springer Science & Business Media, Jun 27, 2001 - Business & Economics - 522 pages
ACISP2001,theSixthAustralasianConferenceonInformationSecurityandP- vacy,washeldinSydney,Australia. TheconferencewassponsoredbyInfor- tionandNetworkedSystemSecurityResearch(INSSR),MacquarieUniversity, theAustralianComputerSociety,andtheUniversityofWesternSydney. Iam gratefultoalltheseorganizationsfortheirsupportoftheconference. Theaimofthisconferencewastodrawtogetherresearchers,designers,and usersofinformationsecuritysystemsandtechnologies. Theconferenceprogram addressedarangeofaspectsfromsystemandnetworksecuritytosecureInternet applicationstocryptographyandcryptanalysis. Thisyeartheprogramcomm- teeinvitedtwointernationalkeynotespeakersDr. YacovYacobifromMicrosoft Research (USA) and Dr. Cli'ord Neumann from the University of Southern California(USA). Dr. Yacobi''stalkaddressedtheissuesoftrust,privacy,and anti-piracyinelectroniccommerce. Dr. Neumann''saddresswasconcernedwith authorizationpolicyissuesandtheirenforcementinapplications. Theconferencereceived91papersfromAmerica,Asia,Australia,and- rope. The program committee accepted 38 papers and these were presented insome9sessionscoveringsystemsecurity,networksecurity,trustandaccess control,Authentication,cryptography,cryptanalysis,DigitalSignatures,Elliptic CurveBasedTechniques,andSecretSharingandThresholdSchemes. Thisyear theacceptedpaperscamefromarangeofcountries,including7fromAustralia, 8fromKorea,7fromJapan,3fromUK,3fromGermany,3fromUSA,2from Singapore,2fromCanadaand1fromBelgium,Estonia,andTaiwan. Organizingaconferencesuchasthisoneisatime-consumingtaskandIwould liketothankallthepeoplewhoworkedhardtomakethisconferenceasuccess. Inparticular,IwouldliketothankProgramCo-chairYiMuforhistirelesswork andthemembersoftheprogramcommitteeforputtingtogetheranexcellent program,andallthesessionchairsandspeakersfortheirtimeande'ort. Special thanks to Yi Mu, Laura Olsen, Rajan Shankaran, and Michael Hitchens for theirhelpwithlocalorganizationdetails. Finally,Iwouldliketothankallthe authorswhosubmittedpapersandalltheparticipantsofACISP2001. Ihope thattheprofessionalcontactsmadeatthisconference,thepresentations,and theproceedingshaveo'eredyouinsightsandideasthatyoucanapplytoyour owne'ortsinsecurityandprivacy. July2001 VijayVaradharajan AUSTRALASIANCONFERENCEON INFORMATIONSECURITYANDPRIVACY ACISP2001 Sponsoredby MacquarieUniversity AustralianComputerSociety General Chair: VijayVaradharajan MacquarieUniversity,Australia Program Chairs: VijayVaradharajan MacquarieUniversity,Australia YiMu MacquarieUniversity,Australia Program Committee: RossAnderson CambridgeUniversity,UK ColinBoyd QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia YvoDesmedt FloridaStateUniversity,USA PaulEngland Microsoft YairFrankel ColumbiaUniversity,USA AjoyGhosh UNISYS,Australia DieterGollman Microsoft JohnGordon ConceptLabs,UK KwangjoKim ICU,Korea ChuchangLiu DSTO,Australia MasahiroMambo TohokuUniversity,Japan WenboMao Hewlett-PackardLab. ,UK ChrisMitchell LondonUniversity,UK EijiOkamoto UniversityofWisconsin,USA JoePato Hewlett-PackardLab. ,USA JosefPieprzyk MacquarieUniversity,Australia BartPreneel KatholiekeUniversity,Belgium SteveRoberts WithamPtyLtd,Australia QingSihan AcademyofScience,China ReiSafavi-Naini UniversityofWollongong,Australia JenniferSeberry UniversityofWollongong,Australia YuliangZheng MonashUniversity,Australia TableofContents AFewThoughtsonE-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 YacovYacobi NewCBC-MACForgeryAttacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 KarlBrincat,ChrisJ. Mitchell CryptanalysisofaPublicKeyCryptosystemProposedatACISP2000. . . . 15 AmrYoussef,GuangGong ImprovedCryptanalysisoftheSelf-ShrinkingGenerator . . . . . . . . . . . . . . . . 21 ErikZenner,MatthiasKrause,StefanLucks AttacksBasedonSmallFactorsinVariousGroupStructures . . . . . . . . . . . . 36 ChrisPavlovski,ColinBoyd OnClassifyingConferenceKeyDistributionProtocols. . . . . . . . . . . . . . . . . . 51 ShahrokhSaeednia,ReiSafavi-Naini,WillySusilo PseudorandomnessofMISTY-TypeTransformationsandtheBlockCipher KASUMI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Ju-SungKang,OkyeonYi,DowonHong,HyunsookCho NewPublic-KeyCryptosystemUsingDivisorClassGroups. . . . . . . . . . . . . . 74 HwankooKim,SangJaeMoon FirstImplementationofCryptographicProtocolsBasedonAlgebraic NumberFields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 AndreasMeyer,StefanNeis,ThomasPfahler PracticalKeyRecoverySchemes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Sung-MingYen Non-deterministicProcessors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 DavidMay,HenkL. Muller,NigelP. Smart PersonalSecureBooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 NaomaruItoi,WilliamA. Arbaugh,SamuelaJ. Pollack, DanielM. Reeves EvaluationofTamper-ResistantSoftwareDeviatingfromStructured ProgrammingRules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 HideakiGoto,MasahiroMambo,HirokiShizuya,YasuyoshiWatanabe AStrategyforMLSWork'ow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 VladIngarWietrzyk,MakotoTakizawa,VijayVaradharajan X TableofContents Condition-DrivenIntegrationofSecurityServices . . . . . . . . . . . . . . . . . . . . . . 176 Cli'ordNeumann SKETHIC:SecureKernelExtensionagainstTrojanHorseswith Information-CarryingCodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Eun-SunCho,SunhoHong,SechangOh,Hong-JinYeh,ManpyoHong, Cheol-WonLee,HyundongPark,Chun-SikPark SecureandPrivateDistributionofOnlineVideoandSomeRelated CryptographicIssues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 FengBao,RobertDeng,PeirongFeng,YanGuo,HongjunWu PrivateInformationRetrievalBasedontheSubgroupMembership Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 AkihiroYamamura,TaiichiSaito APracticalEnglishAuctionwithOne-TimeRegistration . . . . . . . . . . . . . . . 221 KazumasaOmote,AtsukoMiyaji AUserAuthenticationSchemewithIdentityandLocationPrivacy. . . . . . . 235 ShouichiHirose,SusumuYoshida AnEnd-to-EndAuthenticationProtocolinWirelessApplicationProtocol. 247 Jong-PhilYang,WeonShin,Kyung-HyuneRhee ErrorDetectionandAuthenticationinQuantumKeyDistribution . . . . . . . 260 AkihiroYamamura,HirokazuIshizuka AnAxiomaticBasisforReasoningaboutTrustinPKIs. . . . . . . . . . . . . . . . . 274 ChuchangLiu,MarisOzols,TonyCant AKnowledge-BasedApproachtoInternetAuthorizations. . . . . . . . . . . . . . . 292 AlongLin ApplicationsofTrustedReviewtoInformationSecurity. . . . . . . . . . . . . . . . . 305 JohnYesberg,MarieHenderson NetworkSecurityModelingandCyberAttackSimulationMethodology. . . 320 Sung-DoChi,JongSouPark,Ki-ChanJung,Jang-SeLee CryptographicSalt:ACountermeasureagainstDenial-of-ServiceAttacks. . 334 DongGookPark,JungJoonKim,ColinBoyd,EdDawson EnhancedModesofOperationfortheEncryptioninHigh-SpeedNetworks andTheirImpactonQoS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Few Thoughts on ECommerce
1
New CBCMAC Forgery Attacks
3
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
15
Improved Cryptanalysis of the SelfShrinking Generator
21
Attacks Based on Small Factors in Various Group Structures
36
On Classifying Conference Key Distribution Protocols
51
Pseudorandomness of MISTYType Transformations and the Block Cipher KASUMI
60
New PublicKey Cryptosystem Using Divisor Class Groups
74
Error Detection and Authentication in Quantum Key Distribution
260
An Axiomatic Basis for Reasoning about Trust in PKIs
274
A KnowledgeBased Approach to Internet Authorizations
292
Applications of Trusted Review to Information Security
305
Network Security Modeling and Cyber Attack Simulation Methodology
320
A Countermeasure against DenialofService Attacks
334
Enhanced Modes of Operation for the Encryption in HighSpeed Networks and Their Impact on QoS
344
Improving the Availability of TimeStamping Services
360

First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
84
Practical Key Recovery Schemes
104
Nondeterministic Processors
115
Personal Secure Booting
130
Evaluation of TamperResistant Software Deviating from Structured Programming Rules
145
A Strategy for MLS Workflow
159
ConditionDriven Integration of Security Services
176
Secure Kernel Extension against Trojan Horses with InformationCarrying Codes
177
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
190
Private Information Retrieval Based on the Subgroup Membership Problem
206
A Practical English Auction with OneTime Registration
221
A User Authentication Scheme with Identity and Location Privacy
235
An EndtoEnd Authentication Protocol in Wireless Application Protocol
247
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
376
Democratic Systems
392
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
403
Provably Secure Distributed Schnorr Signatures and a t n Threshold Scheme for Implicit Certificates
417
How to Construct FailStop Confirmer Signature Schemes
435
Signature Schemes Based on 3rd Order Shift Registers
445
Anonymous Statistical Survey of Attributes
460
Secure Mobile Agent Using Strong Nondesignated Proxy Signature
474
Elliptic Curve Based Password Authenticated Key Exchange Protocols
487
Elliptic Curve Cryptography on a Palm OS Device
502
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field
514
Author Index
521
Copyright

Other editions - View all

Common terms and phrases