Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GPS scheme. We show both of them can not provide backward privacy in Juels and Weis privacy model, which allows the adversary to know whether the reader authenticates the tag successfully or not. In addition, we present a new protocol, called Challenge-Hiding GPS, based on the Schnorr identification scheme. The challenge is hidden from the eavesdropping through the technique of Diffie-Hellman key agreement protocol. The new protocol can satisfy backward privacy, and it has less communication overheads and almost the same computation, compared with the two schemes analyzed.
ABOUT THE CONFERENCE
CRYPTO 2012 is the 32nd International Cryptology Conference. It is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Computer Science Department of UCSB. The conference started in 1981 and has attracted a wide international audience from both the academic and industrial communities.
The conference program covers a broad spectrum of topics in cryptology, and it is organized as a 4-day event featuring:
-- two invited talks
-- one tutorial
-- 48 technical presentations
-- "The End of Crypto", by Jonathan Zittrain, Harvard University
-- "Recent Advances and Existing Research Questions in Platform Security", by Ernie Brickell, Intel Corporation
-- "Pinning Down 'Privacy' in Statistical Databases", by Adam Smith, Pennsylvania State University
DETAILED CONFERENCE PROGRAM
With funding support from the NSF and our industry sponsors, we are now able to award a second round of stipends to student attendees, both domestic and international. Application deadline: July 27th, 2012. http://www.iacr.org/conferences/crypto2012/stipends-2012.html
CRYPTO 2012 SPONSORS
Google, Microsoft Research, Qualcomm, RIM, Voltage Security
Then we use this new version of LWE problem, which we call matrix LWE problem to build new cryptographic schemes, which include a new scalable key distribution scheme, a new key exchanges scheme and a new simple identity-based encryption scheme.