Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20–24, 2000 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20– 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the 21 accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers. This year’s program also included two invited lectures, two panel sessions, and a rump session. The invited talks were given by Kevin McCurley prese- ing “In the Search of the Killer App” and Pam Samuelson presenting “Towards a More Sensible Way of Regulating the Circumvention of Technical Protection Systems”. For the panel sessions, Barbara Fox and Brian LaMacchia mod- ated “Public-Key Infrastructure: PKIX, Signed XML, or Something Else” and Moti Yung moderated “Payment Systems: The Next Generation”. Stuart Haber organized the informal rump session of short presentations. This was the ?rst year that the conference accepted submissions electro- cally as well as by postal mail. Many thanks to George Davida, the electronic submissions chair, for maintaining the electronic submissions server. A majority of the authors preferred electronic submissions with 65 of the 68 submissions provided electronically.

Author(s): Moni Naor, Benny Pinkas (auth.), Yair Frankel (eds.)
Series: Lecture Notes in Computer Science 1962
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2001

Language: English
Pages: 384
Tags: Data Encryption; Management of Computing and Information Systems; Operating Systems; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Business Information Systems

Efficient Trace and Revoke Schemes....Pages 1-20
Efficient Watermark Detection and Collusion Security....Pages 21-32
Towards More Sensible Anti-circumvention Regulations....Pages 33-41
Self-Escrowed Cash against User Blackmailing....Pages 42-52
Blind, Auditable Membership Proofs....Pages 53-71
Private Selective Payment Protocols....Pages 72-89
Sharing Decryption in the Context of Voting or Lotteries....Pages 90-104
Postal Revenue Collection in the Digital Age....Pages 105-120
Signing on a Postcard....Pages 121-135
Payment Systems: The Next Generation....Pages 136-139
Non-repudiation in SET: Open Issues....Pages 140-156
Statistics and Secret Leakage....Pages 157-173
Analysis of Abuse-Free Contract Signing....Pages 174-191
Asymmetric Currency Rounding....Pages 192-201
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel....Pages 202-224
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers....Pages 225-244
A Response to “Can We Eliminate Certificate Revocation Lists?”....Pages 245-258
Self-Scrambling Anonymizers....Pages 259-275
Authentic Attributes with Fine-Grained Anonymity Protection....Pages 276-294
Resource-Efficient Anonymous Group Identification....Pages 295-312
Secret Key Authentication with Software-Only Verification....Pages 313-326
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?....Pages 327-331
Financial Cryptography in 7 Layers....Pages 332-348
Capability-Based Financial Instruments....Pages 349-378