Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Financial Cryptography, FC 2003, held in Guadeloupe, French West Indies, in January 2003.

The 17 revised full papers presented together with 5 panel position papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on micropayment and e-cash; security, anonymity, and privacy; attacks; fair exchange; auctions; and cryptographic tools and primitives.

Author(s): Simon N. Foley (auth.), Rebecca N. Wright (eds.)
Series: Lecture Notes in Computer Science 2742
Edition: 1
Publisher: Springer Berlin Heidelberg
Year: 2003

Language: English
Pages: 348
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Using Trust Management to Support Transferable Hash-Based Micropayments....Pages 1-14
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks....Pages 15-33
On the Anonymity of Fair Offline E-cash Systems....Pages 34-50
Retrofitting Fairness on the Original RSA-Based E-cash....Pages 51-68
Does Anyone Really Need MicroPayments?....Pages 69-76
The Case Against Micropayments....Pages 77-83
On the Economics of Anonymity....Pages 84-102
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes....Pages 103-121
How Much Security Is Enough to Stop a Thief?....Pages 122-137
Cryptanalysis of the OTM Signature Scheme from FC’02....Pages 138-148
“Man in the Middle” Attacks on Bluetooth....Pages 149-161
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)....Pages 162-181
Economics, Psychology, and Sociology of Security....Pages 182-189
Timed Fair Exchange of Standard Signatures....Pages 190-207
Asynchronous Optimistic Fair Exchange Based on Revocable Items....Pages 208-222
Fully Private Auctions in a Constant Number of Rounds....Pages 223-238
Secure Generalized Vickrey Auction Using Homomorphic Encryption....Pages 239-249
Trusted Computing Platforms: The Good, the Bad, and the Ugly....Pages 250-254
On TCPA....Pages 255-269
On The Computation-Storage Trade-Offs of Hash Chain Traversal....Pages 270-285
Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures....Pages 286-302
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making....Pages 303-320
Back Matter....Pages -