By Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong (auth.), Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shinichi Kawamura (eds.)

ISBN-10: 3540476997

ISBN-13: 9783540476993

ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this 12 months in Kyoto and to submit the complaints as a quantity of the Lecture Notes in desktop technology sequence. The workshop was once our ?rst trial in that significant educational society teams on protection in Japan, viz. ISEC and CSEC, together prepared it; ISEC is a te- nical team on info defense of the Institute of Electronics, info and conversation Engineers (IEICE), and CSEC is a unique curiosity crew on laptop safeguard of the knowledge Processing Society of Japan (IPSJ). It was once Ryoichi Sasaki, the previous head of CSEC, who proposed retaining such a global workshop in Japan for the ?rst time, years in the past. the 2 teams supported his concept and began organizing the workshop. CSEC has its annual family symposium, the pc protection Symposium (CSS), in - tober for 3 days, and we determined to arrange the workshop ahead of CSS this yr. The preliminary objective of the workshop used to be basically to supply younger researchers with the chance to provide their paintings in English. despite the fact that, because of extra submissions than we had expected, the standard of the accredited papers grew to become much better than we had anticipated. Theconferencereceived147submissions,outofwhichtheprogramcommittee chosen 30 for presentation. those court cases comprise the ?nal models of the approved papers, which the authors ?nalized at the foundation of reviews from the reviewers. seeing that those revisions weren't topic to editorial overview, the authors undergo complete accountability for the contents in their papers.

Show description

Read Online or Download Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings PDF

Best computers books

Download e-book for iPad: IN-350 Планирование и внедрение LDAP by

Данный курс предназначен для подготовки слушателей к использованию LDAP в качестве сервера идентификации. В курсе рассматриваются вопросы настройки, установки, структурирования и конфигурирования сервера разрешения имен с использованием сервиса LDAP сервера sunlight ONE (Open community setting) в операционной системе Solaris nine.

Extra info for Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

Sample text

Section 2 introduces the message algebra, including the probabilistic encryption and probabilistic hash operators. It also defines the observational equivalence relation on messages. Section 3 then introduces the computational world, giving the security definitions for encryption and hashes. In Section 4 the semantic interpretation [[−]] is defined and Section 5 proves the soundness of this interpretation. Finally, Section 6 discusses further research directions. Sound Computational Interpretation of Symbolic Hashes 2 35 The Algebraic Setting This section describes the message space and the observational equivalence extending the well-known Abadi-Rogaway logic [AR02] of algebraic messages with hashes.

6 Efficiency We compare the efficiency of the proposed scheme to the previous scheme [12]. Signature Length. For the bilinear groups G1 , G2 with bilinear map e and isomorphism ψ, we can adopt the elliptic curves proposed in [11] called MNT curves. The use of MNT curves can make the representations of elements in G1 short. Then, one can take the order p to be 170-bit prime, and the representations of G1 , GT can be expressed in 171 and 1020 bits, respectively [6]. The proposed group signature includes 3 elements from G1 and 6 elements from Zp .

Then, informally the DLDH assumption means that ha+b = f β+xi and a random hc are indistinguishable, namely T3 = ψ(f )β+xi does not reveal any information on xi . The formal proof is described later. In addition, we improve the efficiency on the SP K proving the ownership of Ai . The construction is derived from [9]. Let T1 be the commitment of Ai . T1 is computed by T1 = Ai g˜α , where g˜ is a public element from G1 and α is a random factor chosen by the signer. t. Ai = g1 another commitment. Thus, forging a group signature implies forging an SDH pair, which breaks the q-SDH assumption.

Download PDF sample

Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings by Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong (auth.), Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shinichi Kawamura (eds.)


by Donald
4.2

Rated 4.53 of 5 – based on 5 votes