

I acknowledge the partial financial support provided by Microsoft Research Labs, India. I would also like to thank the submitting authors, the Program Committee members, the external reviewers, and the local Organizing Committee consisting of Mr. Next, Springer for publishing the proceedings in the Lecture Notes in Computer Science series.
PIPENET 1.8.1 PC
Based on a discussion and subsequent voting among the PC members, the Best Paper Award for this year’s Asiacrypt was conferred to Pascal Paillier and Damien Vergnaud for the paper entitled “Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.” I would like to thank the following people.

In addition we were fortunate to have Prof. The proceedings contain the revised versions of the accepted papers. At the end of the reviewing process 37 papers were accepted and were presented at the conference. This first phase of review by the PC members was followed by a detailed discussion on the papers. Each paper was blind reviewed by at least three members of the Program Committee and papers co-authored by the PC members were reviewed by at least six members. The submissions covered all areas of cryptographic research representing the current state of work in the crypto community worldwide. This year a total of 237 papers were submitted to Asiacrypt 2005. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with the Indian Institute of Technology (IIT), Chennai. Asiacrypt 2005 was held during December 4–8, 2005, at Hotel Taj Coromandel, Chennai, India. Preface Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Springer is a part of Springer Science+Business Media © International Association for Cryptologic Research 2005 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11593447 06/3142 543210

Violations are liable to prosecution under the German Copyright Law. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Library of Congress Control Number: 2005936460 CR Subject Classification (1998): E.3, D.4.6, F.2.1-2, K.6.5, C.2, J.1, G.2 ISSN ISBN-10 ISBN-13Ġ302-9743 4-6 Springer Berlin Heidelberg New York 978-4-9 Springer Berlin Heidelberg New York Volume Editor Bimal Roy Indian Statistical Institute, Applied Statistics Unit 203 B.T. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, GermanyĪdvances in Cryptology – ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security Chennai, India, December 4-8, 2005 Proceedings Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C.
PIPENET 1.8.1 SERIES
Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van LeeuwenĮditorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M.
