Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected...

Full description

Saved in:
Bibliographic Details
Main Authors International Conference on Information and Communications Security, Hui, Lucas Chi-Kwong
Format eBook Book
LanguageEnglish
Published Cham Springer Nature 2015
Springer
Springer International Publishing AG
Edition1
SeriesLNCS sublibrary. SL 4, Security and cryptology
Subjects
Online AccessGet full text
ISBN3319219669
9783319219660
3319219650
9783319219653

Cover

Table of Contents:
  • Intro -- Preface -- Organization -- Contents -- Error-Tolerant Algebraic Side-Channel Attacks Using BEE -- 1 Introduction -- 2 Algebraic Side-Channel Attacks Using BEE -- 2.1 Building an Equation System -- 2.2 Extracting Side-Channel Information -- 2.3 Solving the System of Equations and Noisy Side-Channel Information with BEE -- 3 Algebraic Side-Channel Attacks Under the Hamming Weight Leakage Model -- 3.1 PRESENT-80 -- 3.2 AES-128 -- 4 Cold Boot Attacks and Other Applications -- 4.1 Cold Boot Attacks Against AES-128 -- 4.2 Side-Channel Cube Attacks -- 5 Discussion -- 6 Conclusion -- A Equations of the S-Box in PRESENT -- B Algebraic Side-Channel Attack of SIMON-32 Under Hamming Distance Leakage Model -- C Running Time of Cold Boot Attack against AES-128 -- References -- SEDB: Building Secure Database Services for Sensitive Data -- 1 Introduction -- 2 System Overview -- 3 The Protocol -- 3.1 Query Processing -- 3.2 Discussions -- 4 Security Analysis -- 5 Performance Evaluation -- 6 Related Works -- 7 Conclusion -- A Appendix -- References -- Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Outline -- 2 Background -- 2.1 ARM TrustZone -- 2.2 Physical Unclonable Functions and Fuzzy Extractors -- 3 Objectives and Threat Model -- 3.1 Objectives -- 3.2 Threat Model -- 4 Design -- 4.1 Mdaak Primitives -- 4.2 Mdaak Components -- 4.3 Storage Support -- 4.4 Security Analysis -- 5 Implementation -- 5.1 Hardware Testbed -- 5.2 Software Implementation -- 6 Evaluation -- 6.1 Curve Parameters -- 6.2 Code Size -- 6.3 Performance -- 6.4 Suggestions -- 7 Related Work -- 8 Conclusion -- References -- Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 Elliptic Curve Cryptography
  • 3.2 Generation of Search Set and Displaying an Instance
  • A Single-Challenge Security Implies Multi-challenge Security -- B Justification of the Truncated q-RW Assumption -- References -- Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation -- Abstract -- 1 Introduction -- 2 Analyzing Display Electromagnetic Radiation Signal Properties -- 3 Evalution Algorithm -- 4 Experimental Results -- 5 Conclusion -- Acknowledgment -- References -- How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 CPA -- 2.2 MIA -- 2.3 KSA -- 2.4 Sosd and Sost -- 3 Evaluation Framework -- 3.1 Metrics -- 3.2 Factors -- 4 Experimental Evaluation -- 4.1 Simulated Experiments -- 4.2 Practical Experiments. -- 4.3 Experimental Observations -- 5 Conclusions -- References -- Attribute Based Key-Insulated Signatures with Message Recovery -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 ABKIS with Message Recovery Template -- 2.2 Security Definitions for ABKIS with Message Recovery -- 3 Proposed ABKIS with Message Recovery -- 3.1 ABKIS Scheme with Message Recovery for Small Universe -- 3.2 Large Universe ABKIS Scheme with Message Recovery -- 3.3 Security Proof of SU-ABKIS and LU-ABKIS -- 4 Some Possible Extensions -- 5 Conclusion -- References -- XOR Based Non-monotone t-(k,n)*-Visual Cryptographic Schemes Using Linear Algebra -- 1 Introduction -- 1.1 An Alternative for ``OR'' Based VCS -- 1.2 Our Contribution -- 2 The Model and Construction for t-(k,n)*-NM-XVCS -- 2.1 The Construction -- 3 On the Contrast of t-(k,n)*-NM-XVCS: Achieving Optimal Relative Contrast -- 3.1 (k-1)-(k,n)*-NM-XVCS -- 3.2 (n,n)-XVCS -- 4 Reducing Pixel Expansion -- 5 Achieving Optimality for both Pixel Expansion and Relative Contrast -- 6 Conclusion -- References
  • A Visual One-Time Password Authentication Scheme Using Mobile Devices -- 1 Introduction -- 2 Related Work -- 2.1 Visual Authentication -- 2.2 Authentication Using a Personal Device -- 2.3 One-Time Passwords -- 3 Model and Definition of the Visual One-Time Password Authentication System -- 4 Proposed Visual OTP Scheme -- 4.1 Design -- 4.2 Practical Issues -- 5 Discussion -- 5.1 Advantages of the Visual OTP Scheme -- 5.2 Limitations -- 6 Conclusion -- References -- Secure and Efficient Scheme for Delegation of Signing Rights -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Outline of the Paper -- 2 Preliminaries -- 3 IBMPS Scheme and Its Security -- 3.1 Definition of IBMPS Scheme -- 3.2 Security Model for IBMPS Scheme -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Extraction -- 4.3 Proxy Key Generation -- 4.4 Multi-proxy Signature -- 4.5 Multi-proxy Verification -- 5 Correctness and Security Proof -- 5.1 Proof of Correctness of Our IBMPS Scheme -- 5.2 Proof of Security of Our IBMPS Scheme -- 6 Efficiency Comparison -- References -- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator -- 1 Introduction -- 1.1 Our Approach -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Decisional Parallel BDHE Assumption -- 2.3 Linear Secret Sharing Schemes -- 3 Definition of CP-ABE with SEM -- 3.1 Fully-RCCA-CCA Security Model for CP-ABE with SEM -- 4 Our Construction of CP-ABE with SEM -- 4.1 Security Proof -- 5 Conclusion and Discussion -- References -- MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis -- 1 Introduction -- 2 The Cognitive Task as MOVTCHA -- 2.1 Design and Execution of Movtcha -- 2.2 Cognitive and Behavioral Feature Extraction -- 2.3 Telling Computers and Humans Apart -- 3 Nuts and Bolts of Our System -- 3.1 Selecting Images to Be Tailored
  • 2.2 Android and TrustStore -- 3 Attack Scenario -- 3.1 Self-signed Certificate -- 3.2 Installed Malicious Root CA-signed Certificate -- 4 TagDroid -- 4.1 Overview -- 4.2 ValMod -- 4.3 PeerVerify -- 5 Evaluation -- 5.1 Effectiveness -- 5.2 Performance -- 6 Related Work -- 7 Conclusion -- References -- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter -- 1 Introduction -- 2 Preliminaries -- 3 1-st Minimum Algebraic Immunity AImin(f) -- 4 A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers via Our Theoretical Results -- 5 Application of Our Method on a LFSR-Based Stream Cipher Overlooking Our Criterion -- 6 Conclusion -- References -- A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Protocol for Private Lookup -- 4.1 Speeding Up the Offline Phase -- 4.2 Speeding Up the Vector-Only Phase -- 5 Protocol for DFA Execution -- 6 Protocol for SSSD -- 7 Conclusions -- References -- Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors -- 1 Introduction -- 2 Multiplication Techniques -- 2.1 Operand Scanning Method -- 2.2 Product Scanning Method -- 2.3 Hybrid Method -- 2.4 Operand Caching Method -- 2.5 Karatsuba Multiplication -- 3 Our Implementation -- 3.1 Loop Structure -- 3.2 Inner-Loop Operation -- 4 Performance Evaluation and Comparison -- 5 Conclusions -- References -- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Definition of Identity-Based Encryption -- 2.1 Syntax -- 2.2 Security -- 3 Number Theoretic Assumptions -- 3.1 Definition of Assumptions -- 3.2 Relationship Between Assumptions -- 4 New Security Proof for the Boneh-Boyen IBE Scheme -- 5 Discussion
  • 2.2 The X86-64 CPU Architecture -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Implementation of Secure Scalar Multiplication in ECC -- 3.3 Deployment of ECC Cryptosystem in the Operating System -- 4 Evaluation and Discussion -- 4.1 Security Verification -- 4.2 Performance -- 5 Conclusion and Future Work -- References -- 4P_VES: A Collusion-Resistant Accountable Virtual Economy System -- 1 Introduction -- 2 System Model -- 3 Preliminaries -- 3.1 Commitment -- 3.2 Dynamic Accumulator -- 3.3 Cryptographic Assumptions -- 4 Scheme Construction -- 5 Property Analysis -- 6 Performance Evaluation -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Privacy-Preserving Distance-Bounding Proof-of-Knowledge -- 1 Introduction -- 2 Background -- 2.1 Distance-Bounding Proof-of-Knowledge (DBPK-Log) -- 2.2 BBS+ Signature Scheme [6] -- 3 Model -- 4 PDB Construction -- 5 Conclusion -- References -- Distance Lower Bounding -- 1 Introduction -- 2 DLB - Model and Impossibilities -- 2.1 Attacks on DLB Protocols -- 2.2 Impossibility Results -- 2.3 Restricted DF, MiM, and CF -- 3 DLB Protocol Constructions -- 3.1 The Protocol DLB-BM -- 3.2 The Design of Erasure Sequence and Its Response -- 4 Security Analysis of DLB-BM -- 5 Practical Consideration -- 6 Concluding Remarks -- A Proof Sketch of Theorem 1 -- B Proof of Theorem 2 -- References -- Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Pairing and Mathematical Assumptions -- 2.2 Non-Interactive Verification of Pairing Product Equation [16] -- 3 Security Model of OTNk 1 -- 4 The Protocol -- 5 Security Analysis -- 6 Comparison -- References -- TagDroid: Hybrid SSL Certificate Verification in Android -- 1 Introduction -- 2 Background -- 2.1 Android and SSL Certificate Verification