Catálogo de publicaciones - libros

Compartir en
redes sociales


Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings

Roberto De Prisco ; Moti Yung (eds.)

En conferencia: 5º International Conference on Security and Cryptography for Networks (SCN) . Maiori, Italy . September 6, 2006 - September 8, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-38080-1

ISBN electrónico

978-3-540-38081-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Shoehorning Security into the EPC Tag Standard

Daniel V. Bailey; Ari Juels

The EPCglobal Class-1 Generation-2 UHF tag standard is certain to become the worldwide specification for inexpensive RFID tags. Because of its sharp focus on simple “license plate” tags, it supports only the most rudimentary of security and privacy features, and essentially none of the cryptographic techniques that underpin authentication and privacy-protection in higher-powered computational devices. To support more-sophisticated applications, the drafters of this standard envisioned the re-use of the basic air interface and command set in higher-class standards. We propose ways to incorporate mainstream cryptographic functionality into the Class-1 Gen-2 standard. Our techniques circumvene the intended modes of operation of the standard, but adhere closely enough to preserve formal compliance. For this reason, we use the term to describe our layering of new security functionality on the standard.

- Applied Authentication | Pp. 303-320

Proof-Carrying Proxy Certificates

Walid Bagga; Stefano Crosta; Refik Molva

The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this paper, we present a new concept called . Our approach allows to combine the verification of the validity of the proxy certificate and the authorization decision making in an elegant way that enhances the privacy of the end user. In contrast with standard proxy certificates that are generated using standard (public-key) signature schemes, the proposed certificates are generated using a signature scheme for which the validity of a generated signature proves the compliance of the signer with a credential-based policy. We present a concrete realization of our approach using bilinear pairings over elliptic curves and we prove its security under adapted attack models.

- Applied Authentication | Pp. 321-335

Cryptanalysis of Rainbow

Olivier Billet; Henri Gilbert

Rainbow is a fast asymmetric multivariate signature algorithm proposed by J. Ding and D. Schmidt in [5]. This paper presents a cryptanalysis of Rainbow which enables an attacker provided with the public key to recover an equivalent representation of the secret key, thus allowing her to efficiently forge a signature of any message. For the set of parameter values recommended by the authors of Rainbow in order to achieve a security level strictly higher than 2, the complexity of our attack is less than 2 operations. This is 2 times less than the complexity of the best known attack used by the authors to dimension their system.

- Public Key Related Cryptanalysis | Pp. 336-347

An Improved LPN Algorithm

Éric Levieil; Pierre-Alain Fouque

HB is a shared-key authentication protocol, proposed by Juels and Weis at Crypto 2005, using prior work of Hopper and Blum. Its very low computational cost makes it attractive for low-cost devices such as radio-frequency identification(RFID) tags. Juels and Weis gave a security proof, relying on the hardness of the “learning parity with noise” (LPN) problem. Here, we improve the previous best known algorithm proposed by Blum, Kalai, and Wasserman for solving the LPN problem. This new algorithm yields an attack for HB in the detection-based model with work factor 2.

- Public Key Related Cryptanalysis | Pp. 348-359

Theory and Practice of Multiparty Computation

Ivan Damgård

This is a short summary of the invited talk given by the author at the SCN conference.

- Invited Talk | Pp. 360-364