ACNS 2003

International Conference on

Applied Cryptography and Network Security


Kunming, China
October 16-19, 2003



Conference Program


Tutorials

Key-Insulated Public Key Cryptosystems
    Moti Yung
    USA

Non-repudiation in e-Commerce and e-Government
    Jianying Zhou
    Singapore


Academic Track    [32 papers are selected out of 191 submissions to the academic track.]

Session 1A:    Cryptographic Applications


Multi-Party Computation from any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case

    Ventzislav Nikov, Svetla Nikova, and Bart Preneel

    The Netherlands / Belgium

Optimized $\chi^2$-Attack against RC6
    Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji
    Japan

Anonymity-Enhanced Pseudonym System

    Yuko Tamura and Atsuko Miyaji
    Japan


Session 2A:    Intrusion Detection

Using Feedback to Improve Masquerade Detection
    Kwong Yung
    USA

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
    Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, and Jia-Guang Sun
    China

An IP Traceback Scheme Integrating DPM and PPM
    Fan Min, Junyan Zhang, and Guowei Yang
    China

Session 3A:    Cryptographic Algorithms

Improved Scalable Hash Chain Traversal
    Sung-Ryul Kim
    Korea

Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
    Rui Zhang and Hideki Imai
    Japan

On the Security of Two Threshold Signature Schemes with Traceable Signers
    Guilin Wang, Xiaoxi Han, and Bo Zhu
    Singapore

Session 4A:    Digital Signature

Proxy and Threshold One-Time Signatures
    Mohamed Al-Ibrahim and Anton Cerny
    Australia / Kuwait

A Threshold GQ Signature Scheme
    Li-Shan Liu, Cheng-Kang Chu, and Wen-Guey Tzeng
    Taiwan

Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
    Gene Itkis and Peng Xie
    USA

A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
    Chongzhi Gao, Zheng'an Yao, and Lei Li
    China

Session 5A:    Security Modelling

Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
    Ching Lin and Vijay Varadharajan
    Australia

An Authorization Model for e-Consent Requirement in a Health Care Application
    Chun Ruan and Vijay Varadharajan
    Australia

PLI: A New Framework to Protect Digital Content for P2P Networks
    Guofei Gu, Bin Zhu, Shipeng Li, and Shiyong Zhang
    China

Session 6A:    Web Security

Improved Algebraic Traitor Tracing Scheme
    Chunyan Bai and Guiliang Feng
    USA

Common Vulnerability Markup Language
    Haitao Tian, Liusheng Huang, Zhi Zhou, and Hui Zhang
    China

Trust on Web Browser: Attack vs. Defense
    Tie-Yan Li and Yongdong Wu
    Singapore

Session 7A:    Security Protocols

Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
    Luciano Rila and Chris J. Mitchell
    UK

Does it Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
    Jae-Gwi Choi, Kouichi Sakurai, and Ji-Hwan Park
    Korea / Japan

Using OCSP to Secure Certificate-Using Transactions in m-Commerce
    Jose L. Munoz, Jordi Forne, Oscar Esparza, Isidoro Bernabe, and Miguel Soriano
    Spain

Session 8A:    Cryptanalysis

Differential Fault Analysis on A.E.S.
    P. Dusart, G. Letourneux, and O. Vivolo
    France

Side-Channel Attack on Substitution Blocks
    Roman Novak
    Slovenia

Timing Attack Against Implementation of a Parallel Algorithm for Modular Exponentiation
    Yasuyuki Sakai and Kouichi Sakurai
    Japan

A Fast Correlation Attack on LFSR-Based Stream Ciphers
    Sarbani Palit, Bimal Roy, and Arindom De
    India

Session 9A:    Key Management

Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient
    Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, and Dengguo Feng
    Singapore / China

An Efficient Tree-Based Group Key Agreement using Bilinear Map
    Sangwon Lee, Yongdae Kim, Kwangjo Kim, and Dae-Hyun Ryu
    Korea

A Key Recovery Mechanism for Reliable Group Key Management
    Taenam Cho and Sang-Ho Lee
    Korea

Session 10A:    Efficient Implementations

Efficient Software Implementation of LFSR and Boolean Function and its Application to Nonlinear Combiner Model
    Sandeepan Chaudhury and Subhamoy Maitra
    India

Efficient Distributed Signcryption Scheme as Group Signcryption
    Dongjin Kwak and Sangjae Moon
    Korea

Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
    Johann Groszschaedl and Guy-Armand Kamendje
    Austria


Technical Track 

Session 1T:    Security Analysis


An Example of a Man-in-the-middle Attack against Server Authenticated SSL-session
    Mattias Eriksson
    Sweden


A Defect of the Implementation Schemes of the TTM Cryptosystem
    Jintai Ding and Dieter Schmidt
    USA

An Attack Strategy for Incremental Hash Function based on Pair Chaining & XOR Combining
    Bok-Min Goi, M. U. Siddiqi, and Hean-Teik Chuah
    Malaysia

Session 2T:    Cryptographic Algorithms

Identification Schemes from Lattice Distinguishing Problem

    Khanh Nguyen
    Singapore


Cryptanalysis of AES Implemented on Computers with Cache

    Yukiyasu Tsunoo, Hiroyasu Kubo, Maki Shigeri, and Hiroshi Miyauchi
    Japan

On the Number of 5-variable Best Boolean Functions

    Min Xie and Dingyi Pei
    China


Session 3T:    Secure Multicast

Improving Performance of Multicast Rekeying by Combining Broadcast Encryption with Optimal Key Storage

    Josep Pegueroles and Francisco Rico-Novella
    Spain


The use of TCP Unicast Packet for Reliable Multicast

    Kyu-Tae Oh, Won-Hyuck Choi, and Jung-Sun Kim
    Korea


Session Key Generation for Secure Electronic Transaction

    Ismail Jabiullah, Mizanur Rahman, and Lutfar Rahman
    Bangladesh

Session 4T:    Secure Electronic Commerce

A Security and Payment Scheme for Cooperative Distributed Search Engines

    Kan Wang and Ahmed Patel
    Ireland


An English Auction Scheme in the Secure Network Environment

    Tzer-Shyong Chen,
Kuo-Hsuan Huang, Jen-Yan Huang, and Tzer-Lung Chen
    Taiwan


Secure Multiple Mobile Payment Protocol

    Shinyoung Lim and Youjin Song
    Korea

Session 5T:    Cryptographic Applications

Usage of LCG/CLC Numbers for Electronic Gambling Applications

    Anders Knutsson
    Sweden

Zero-knowledge Proof System vs Asymmetric Cryptosystem, Symmetric Cryptosystem
    Chunming Tang, Zhuojun Liu, and Mingsheng Wang
    China

A Stronger Rule Description Language than Snort’s

    Dihua Liu, Jiali Song, Feng Liu, and Miao Li
    China

Session 6T:    Invited Speech

Implementation of Virtual-Optics Encryption with a DSP Scheme
    Xiang Peng, Peng Zhang, Xiaofeng Li, and Hanben Niu
    China

Session 7T:    Intrusion Detection and Prevention

Intrusion  Prevention: Modelling and Simulation for Fast Detection of DDoS Attacks

    M.W. David, S. Chatterjee, P. Sarkar, and K. Sakurai
    Singapore / Japan

An Intelligent Model of Intrusion Detection and Response using Mobile Agent
    Jianbiao Zhang and Chuangbai Xiao
    China

Probe into Firewall Technology

    Yanfeng Suo, Yanchun Feng, and Shiyao Ma
    China

Session 8T:    Security Framework

A Framework for Network Security Assurance
    Chunfang Jiang
    China

A Framework of Consolidated Authorization Management in e-SCM

     Seung-Phil Hong, Myung-Chul Kim, Kwangjo Kim, and Jinho Kim
    Korea


A Method for Analyzing and Evaluating PKI Products and Their Technology
    Gang Lian, Teemupekka Virtanen, and Ronja Addams-Moring
    Finland

Session 9T:    Digital Right Management

A Novel System for Content Protection in Home Environment
    Zheng Yan and Peng Zhang
    Finland

CodeMeter: Digital Rights Management for Protection and Measurment of Use of Software
    Oliver Winzenried and Hailiang Li
    Germany / China