Advances in Cryptology — ASIACRYPT 2000

6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

  • Tatsuaki Okamoto
Conference proceedings ASIACRYPT 2000

DOI: 10.1007/3-540-44448-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1976)

Table of contents (47 papers)

  1. Front Matter
    Pages I-XII
  2. Cryptanalysis I

    1. Why Textbook ElGamal and RSA Encryption Are Insecure
      Dan Boneh, Antoine Joux, Phong Q. Nguyen
      Pages 30-43
    2. Cryptanalysis of the TTM Cryptosystem
      Louis Goubin, Nicolas T. Courtois
      Pages 44-57
    3. Attacking and Repairing Batch Verification Schemes
      Colin Boyd, Chris Pavlovski
      Pages 58-71
  3. IACR Distinguished Lecture

    1. Cryptography Everywhere
      Thomas A. Berson
      Pages 72-72
  4. Digital Signatures

    1. Security of Signed ElGamal Encryption
      Claus Peter Schnorr, Markus Jakobsson
      Pages 73-89
    2. From Fixed-Length to Arbitrary-Length RSA Padding Schemes
      Jean-Sébastien Coron, Francois Koeune, David Naccache
      Pages 90-96
    3. Towards Signature-Only Signature Schemes
      Adam Young, Moti Yung
      Pages 97-115
    4. A New Forward-Secure Digital Signature Scheme
      Michel Abdalla, Leonid Reyzin
      Pages 116-129
    5. Unconditionally Secure Digital Signature Schemes Admitting Transferability
      Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
      Pages 130-142
  5. Protocols I

    1. Efficient Secure Multi-party Computation
      Martin Hirt, Ueli Maurer, Bartosz Przydatek
      Pages 143-161
    2. Mix and Match: Secure Function Evaluation via Ciphertexts
      Markus Jakobsson, Ari Juels
      Pages 162-177
    3. A Length-Invariant Hybrid Mix
      Miyako Ohkubo, Masayuki Abe
      Pages 178-191
    4. Attack for Flash MIX
      Masashi Mitomo, Kaoru Kurosawa
      Pages 192-204
    5. Distributed Oblivious Transfer
      Moni Naor, Benny Pinkas
      Pages 205-219
  6. Number Theoretic Algorithms

About these proceedings


ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - operation with the Institute of Electronics, Information, and Communication Engineers (IEICE). The ?rst conference with the name ASIACRYPT took place in 1991, and the series of ASIACRYPT conferences were held in 1994, 1996, 1998, and 1999, in cooperation with IACR. ASIACRYPT 2000 was the ?rst conference in the series to be sponsored by IACR. The conference received 140 submissions (1 submission was withdrawn by the authors later), and the program committee selected 45 of these for presen- tion. Extended abstracts of the revised versions of these papers are included in these proceedings. The program also included two invited lectures by Thomas Berson (Cryptography Everywhere: IACR Distinguished Lecture) and Hideki Imai (CRYPTREC Project – Cryptographic Evaluation Project for the Japanese Electronic Government). Abstracts of these talks are included in these proce- ings. The conference program also included its traditional “rump session” of short, informal or impromptu presentations, kindly chaired by Moti Yung. Those p- sentations are not re?ected in these proceedings. The selection of the program was a challenging task as many high quality submissions were received. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryptography. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection.


Cryptography RSA algorithms calculus cryptanalysis cryptographic protocools cryptology data encryption data security digital payment information security privacy security systems security verification

Editors and affiliations

  • Tatsuaki Okamoto
    • 1
  1. 1.NTT LaboratoriesNippon Telegraph and Telephone CorporationKanagawa-kenJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41404-9
  • Online ISBN 978-3-540-44448-0
  • Series Print ISSN 0302-9743