Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Pro by Paul F. SyversonFinancial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Pro by Paul F. Syverson

Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies…

byPaul F. Syverson

Paperback | August 14, 2002

Pricing and Purchase Info

$125.90 online 
$150.50 list price save 16%
Earn 630 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

ThankstogeneralchairStuartHaberfordoingmanythingsthatnoneofthe attendeesnoticedbecausehedidthemsonicely. HewasablyassistedbyHinde tenBerge. ThankstoHarrisMcCoyforhandlinglocalarrangementsandJason CronkformaintainingtheWebsite. ThankstotheIFCAdirectorsforkeeping FCthriving,toAdamShostackforvenuearrangements,andtoBarbFox,the sponsorshipchair. Thankstoour?nancialsponsors,whoarelistedonthenext page. SpecialthankstoRayHirschfeldwhoseadvicetomeandtotheothersm- tionedherehasbeeninvaluable. Thanks?nallytoattendeeswithoutwhomthere wouldbenoconference. March2001 PaulSyverson VI Preface ProgramCommittee MattBlaze,AT&TLabs-Research YairFrankel,Ecash MattFranklin,UCDavis DavidKravitz,WaveSystemsCorp. ArjenLenstra,Citicorp PhilipMacKenzie,LucentBellLabs AviRubin,AT&TLabs-Research JacquesStern,EcoleNormaleSup´erieure KazueSako,NEC StuartStubblebine,CertCo PaulSyverson(Chair),NavalResearchLab WinTreese,OpenMarket,Inc. DougTygar,UCBerkeley MichaelWaidner,IBMZurichResearchLab MotiYung,CertCo GeneralChair StuartHaber,Intertrust SponsorshipChair BarbFox,Microsoft FinancialCryptography2001wasorganizedbytheInternationalFinancialCr- tographyAssociation(IFCA),andwassponsoredbyBibitInternetPayments, CertCo,Certicom,HushCommunications,IBM,InterTrustSTARLab,- crosoft,nCipher,RSASecurity,andZero-KnowledgeSystems. TableofContents ManagingPaymentTransactionCosts AmortizedE-Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 MosesLiskov,SilvioMicali O?ineMicropaymentswithoutTrustedHardware. . . . . . . . . . . . . . . . . . . . . . 21 MattBlaze,JohnIoannidis,AngelosD. Keromytis Panel(I) ThePracticalProblemsofImplementingMicroMint. . . . . . . . . . . . . . . . . . . . 41 NickovanSomeren ProtectingDigitalRights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 YairFrankel AspectsofDigitalRightsManagementandtheUseofHardwareSecurity Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 DavidW. Kravitz ASolutiontotheNapsterPhenomenon:WhyValueCannotBeCreated AbsenttheTransferofSubjectiveData. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 ScottMoskowitz GoldenTimesforDigitalRightsManagement? . . . . . . . . . . . . . . . . . . . . . . . . 64 TomasSander ApplicabilityofPublicKeyCryptosystemstoDigitalRightsManagement Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 JeremyWyant TrustandRiskManagement OntheGlobalContentPMI:ImprovedCopy-ProtectedInternetContent Distribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 TadayoshiKohno,MarkMcGovern Trust:ACollisionofParadigms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 L. JeanCamp,HelenNissenbaum,CathleenMcGrath GroupsandAnonymity OntheSecurityofHomageGroupAuthenticationProtocol. . . . . . . . . . . . . . 106 ´ ElianeJaulmes,GuillaumePoupard VIII Table of Contents Anonymitywithout'Cryptography' . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 DahliaMalkhiandElanPavlov FairTracingwithoutTrustees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 DennisKu¨gler,HolgerVogt InvitedTalk WhytheWaronMoneyLaunderingShouldBeAborted. . . . . . . . . . . . . . . . 149 RichardW. Rahn Certi?catesandAuthentication ProvablySecureImplicitCerti?cateSchemes. . . . . . . . . . . . . . . . . . . . . . . . . . 156 DanielR. L. Brown,RobertGallant,ScottA. Vanstone Nonmonotonicity,UserInterfaces,andRiskAssessmentinCerti?cate Revocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 NinghuiLi,JoanFeigenbaum MutualAuthenticationforLow-PowerMobileDevices. . . . . . . . . . . . . . . . . . 178 MarkusJakobsson,DavidPointcheval CreditCardSecurity O?-LineGenerationofLimited-UseCreditCardNumbers. . . . . . . . . . . . . . . 196 AvielD. Rubin,RebeccaN. Wright ASecurityFrameworkforCard-BasedSystems. . . . . . . . . . . . . . . . . . . . . . . . 210 YiannisTsiounis SecureClick:AWebPaymentSystemwithDisposableCreditCard Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 AdiShamir Panel(II) TheBusinessofElectronicVoting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 EdGerck,C. AndrewNe?,RonaldL. Rivest,AvielD. Rubin, MotiYung MarketsandMultipartyComputation PrivacyfortheStockMarket. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 GiovanniDiCrescenzo SecureDistributedComputinginaCommercialEnvironment. . . . . . . . . . . . 289 PhilippeGolle,StuartStubblebine Table of Contents IX SignaturesinFinancialCryptography MonotoneSignatures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 DavidNaccache,DavidPointcheval,ChristopheTymen ThePowerofRSAInversionOraclesandtheSecurityofChaum's RSA-BasedBlindSignatureScheme. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 MihirBellare,ChanathipNamprempre,DavidPointcheval, MichaelSemanko OptimisticFairExchangewithTransparentSignatureRecovery. . . . . . . . . . 339 OlivierMarkowitch,ShahrokhSaeednia Auctions (M+1)st-PriceAuctionProtocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 HiroakiKikuchi Non-interactivePrivateAuctions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 OlivierBaudron,JacquesStern AuthorIndex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 AmortizedE-Cash 1 2 Moses Liskov and Silvio Micali 1 MITLaboratoryforComputerScience mliskov@theory. lcs. mit. edu 2 MITLaboratoryforComputerScience silvio@lcs. mit. edu Abstract. Wepresentane-cashschemewhichprovidesatrade-o?- tweenanonymityande?ciency,byamortizingthecostofzero-knowledge andsignaturecomputationinthecashgenerationphase. OurworksolvesanopenproblemofOkamotoindivisiblee-cash.
Title:Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies…Format:PaperbackDimensions:379 pages, 23.5 × 15.5 × 0.07 inPublished:August 14, 2002Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540440798

ISBN - 13:9783540440796

Look for similar items by category:

Reviews

Table of Contents

Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without 'Cryptography'.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.