This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006.
The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on authentication and fraud detection, privacy, reputation and mix-nets, conditional financial cryptography, payment systems, and efficient protocols.
Author(s): Bryan Parno, Cynthia Kuo, Adrian Perrig (auth.), Giovanni Di Crescenzo, Avi Rubin (eds.)
Series: Lecture Notes in Computer Science 4107 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 327
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Phoolproof Phishing Prevention....Pages 1-19
A Protocol for Secure Public Instant Messaging....Pages 20-35
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions....Pages 36-51
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption....Pages 52-64
A Private Stable Matching Algorithm....Pages 65-80
Private Policy Negotiation....Pages 81-95
Uncheatable Reputation for Distributed Computation Markets....Pages 96-110
An Efficient Publicly Verifiable Mix-Net for Long Inputs....Pages 111-125
Auditable Privacy: On Tamper-Evident Mix Networks....Pages 126-141
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation....Pages 142-147
Defeating Malicious Servers in a Blind Signatures Based Voting System....Pages 148-153
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng....Pages 154-159
Credit Transfer for Market-Based Infrastructure....Pages 160-165
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions....Pages 166-170
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones ....Pages 171-176
A Generic Construction for Token-Controlled Public Key Encryption....Pages 177-190
Timed-Release and Key-Insulated Public Key Encryption....Pages 191-205
Conditional Encrypted Mapping and Comparing Encrypted Numbers....Pages 206-220
Revisiting Oblivious Signature-Based Envelopes....Pages 221-235
Provably Secure Electronic Cash Based on Blind Multisignature Schemes....Pages 236-250
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings....Pages 251-265
Privacy-Protecting Coupon System Revisited....Pages 266-280
Efficient Broadcast Encryption Scheme with Log-Key Storage....Pages 281-295
Efficient Correlated Action Selection....Pages 296-310
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination....Pages 311-325
Back Matter....Pages -