Financial Cryptography: 6th International Conference, FC 2002 Southampton, Bermuda, March 2002 Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit­ ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening "rump session" was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights.

Author(s): Dahlia Malkhi, Ofer Margo, Elan Pavlov (auth.), Matt Blaze (eds.)
Series: Lecture Notes in Computer Science 2357
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 302
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Electronic Commerce/e-business; Finance /Banking

E-voting without ‘Cryptography’....Pages 1-15
An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling....Pages 16-30
Financial Instruments in Recommendation Mechanisms....Pages 31-43
Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing....Pages 44-56
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0 -th Root....Pages 57-71
A Two-Server, Sealed-Bid Auction Protocol....Pages 72-86
Secure Vickrey Auctions without Threshold Trust....Pages 87-101
Almost Optimal Hash Sequence Traversal....Pages 102-119
Cryptographic Primitives Enforcing Communication and Storage Complexity....Pages 120-135
CryptoComputing with Rationals....Pages 136-146
Privacy Tradeoffs: Myth or Reality?....Pages 147-151
An Improved Fast Signature Scheme without Online Multiplication....Pages 152-167
Timed Release of Standard Digital Signatures....Pages 168-182
Quasi-Efficient Revocation of Group Signatures....Pages 183-197
The Dark Side of Threshold Cryptography....Pages 198-219
Split-and-Delegate: Threshold Cryptography for the Masses....Pages 220-237
Redistribution of Mechanical Secret Shares....Pages 238-252
Reliable MIX Cascade Networks through Reputation....Pages 253-268
Offline Payments with Auditable Tracing....Pages 269-281
Fileteller: Paying and Getting Paid for File Storage....Pages 282-299