Progress in Cryptology - INDOCRYPT 2003

We present a survey of recent work on the linear complexity, the linear complexity profile, and the k-error linear complexity of sequences and on the joint linear complexity of multisequences. We also establish a new enumeration theorem on multisequences and state several open problems. The material is of relevance for the assessment of keystreams in stream ciphers.

[1]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[2]  M. Kasahara,et al.  A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[3]  Ueli Maurer,et al.  Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.

[4]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[5]  Nigel P. Smart,et al.  An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing , 2002, IACR Cryptol. ePrint Arch..

[6]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[7]  Stefan Droste,et al.  New Results on Visual Cryptography , 1996, CRYPTO.

[8]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[9]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[10]  Hiroki Koga,et al.  New Constructions of the Lattice-Based Visual Secret Sharing Scheme Using Mixture of Colors , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Alfredo De Santis,et al.  Constructions and Bounds for Visual Cryptography , 1996, ICALP.

[12]  Eric R. Verheul,et al.  Self-Blindable Credential Certificates from the Weil Pairing , 2001, ASIACRYPT.

[13]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[14]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[15]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[16]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[17]  Hirosuke Yamamoto,et al.  Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images , 1998 .

[18]  Hirosuke Yamamoto,et al.  An Analytic Construction of the Visual Secret Sharing Scheme for Color Images , 2001 .

[19]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.