Catálogo de publicaciones - libros
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings
Roberto De Prisco ; Moti Yung (eds.)
En conferencia: 5º International Conference on Security and Cryptography for Networks (SCN) . Maiori, Italy . September 6, 2006 - September 8, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-38080-1
ISBN electrónico
978-3-540-38081-8
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11832072_21
Shoehorning Security into the EPC Tag Standard
Daniel V. Bailey; Ari Juels
The EPCglobal Class-1 Generation-2 UHF tag standard is certain to become the worldwide specification for inexpensive RFID tags. Because of its sharp focus on simple “license plate” tags, it supports only the most rudimentary of security and privacy features, and essentially none of the cryptographic techniques that underpin authentication and privacy-protection in higher-powered computational devices. To support more-sophisticated applications, the drafters of this standard envisioned the re-use of the basic air interface and command set in higher-class standards. We propose ways to incorporate mainstream cryptographic functionality into the Class-1 Gen-2 standard. Our techniques circumvene the intended modes of operation of the standard, but adhere closely enough to preserve formal compliance. For this reason, we use the term to describe our layering of new security functionality on the standard.
- Applied Authentication | Pp. 303-320
doi: 10.1007/11832072_22
Proof-Carrying Proxy Certificates
Walid Bagga; Stefano Crosta; Refik Molva
The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this paper, we present a new concept called . Our approach allows to combine the verification of the validity of the proxy certificate and the authorization decision making in an elegant way that enhances the privacy of the end user. In contrast with standard proxy certificates that are generated using standard (public-key) signature schemes, the proposed certificates are generated using a signature scheme for which the validity of a generated signature proves the compliance of the signer with a credential-based policy. We present a concrete realization of our approach using bilinear pairings over elliptic curves and we prove its security under adapted attack models.
- Applied Authentication | Pp. 321-335
doi: 10.1007/11832072_23
Cryptanalysis of Rainbow
Olivier Billet; Henri Gilbert
Rainbow is a fast asymmetric multivariate signature algorithm proposed by J. Ding and D. Schmidt in [5]. This paper presents a cryptanalysis of Rainbow which enables an attacker provided with the public key to recover an equivalent representation of the secret key, thus allowing her to efficiently forge a signature of any message. For the set of parameter values recommended by the authors of Rainbow in order to achieve a security level strictly higher than 2, the complexity of our attack is less than 2 operations. This is 2 times less than the complexity of the best known attack used by the authors to dimension their system.
- Public Key Related Cryptanalysis | Pp. 336-347
doi: 10.1007/11832072_24
An Improved LPN Algorithm
Éric Levieil; Pierre-Alain Fouque
HB is a shared-key authentication protocol, proposed by Juels and Weis at Crypto 2005, using prior work of Hopper and Blum. Its very low computational cost makes it attractive for low-cost devices such as radio-frequency identification(RFID) tags. Juels and Weis gave a security proof, relying on the hardness of the “learning parity with noise” (LPN) problem. Here, we improve the previous best known algorithm proposed by Blum, Kalai, and Wasserman for solving the LPN problem. This new algorithm yields an attack for HB in the detection-based model with work factor 2.
- Public Key Related Cryptanalysis | Pp. 348-359
doi: 10.1007/11832072_25
Theory and Practice of Multiparty Computation
Ivan Damgård
This is a short summary of the invited talk given by the author at the SCN conference.
- Invited Talk | Pp. 360-364