Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings [1 ed.] 978-3-540-30855-3

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory

187 91 70KB

English Pages 428 [430] Year 2005

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Front Matter....Pages -
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography....Pages 1-9
You Can Prove So Many Things in Zero-Knowledge....Pages 10-27
Improvements on Security Proofs of Some Identity Based Encryption Schemes....Pages 28-41
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme....Pages 42-52
ID-Based Signature Scheme Without Trusted PKG....Pages 53-62
Specifying Authentication Using Signal Events in CSP....Pages 63-74
Modeling RFID Security....Pages 75-90
Enforcing Email Addresses Privacy Using Tokens....Pages 91-100
Efficient Authentication of Electronic Document Workflow....Pages 101-112
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms....Pages 113-127
Efficient Group Signatures from Bilinear Pairing....Pages 128-139
Enhanced Aggregate Signatures from Pairings....Pages 140-149
Constructing Secure Proxy Cryptosystem....Pages 150-161
Towards a General RC4-Like Keystream Generator....Pages 162-174
HCTR: A Variable-Input-Length Enciphering Mode....Pages 175-188
The k th-Order Quasi-Generalized Bent Functions over Ring Z p ....Pages 189-201
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences....Pages 202-209
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP....Pages 210-220
An Improved Secure Two-Party Computation Protocol....Pages 221-232
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes....Pages 233-241
ID-Based Threshold Unsigncryption Scheme from Pairings....Pages 242-253
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach....Pages 254-264
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control....Pages 265-278
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection....Pages 279-289
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes....Pages 290-301
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption....Pages 302-312
A Remark on Implementing the Weil Pairing....Pages 313-323
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC....Pages 324-335
Key Management for Secure Overlay Multicast....Pages 336-345
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN....Pages 346-357
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault....Pages 358-369
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes....Pages 370-383
New Methods to Construct Cheating Immune Multisecret Sharing Scheme....Pages 384-394
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation....Pages 395-406
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks....Pages 407-418
Back Matter....Pages -

Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings [1 ed.]
 978-3-540-30855-3

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers