Financial Cryptography: Second International Conference, FC '98 Anguilla, British West Indies February 23–25, 1998 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998.
The 28 revised papers presented were carefully selected and improved beyond the versions presented at the meeting. The book presents the state of the art in research and development in financial cryptography and addresses all current topics such as electronic payment systems, digital cash, electronic commerce, digital signatures, payment transactions, revocation and validation, WWW commerce, trust management systems, and watermarking.

Author(s): Richard J. Lipton, Rafail Ostrovsky (auth.), Rafael Hirchfeld (eds.)
Series: Lecture Notes in Computer Science 1465
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998

Language: English
Pages: 320
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Business Information Systems

Micro-payments via efficient coin-flipping....Pages 1-15
X-Cash: Executable digital cash....Pages 16-27
Distributed Trustees and revocability: A framework for internet payment....Pages 28-42
A platform for privately defined currencies, loyalty credits, and play money....Pages 43-57
Assessment of threats for smart card based electronic cash....Pages 58-72
Using a high-performance, programmable secure coprocessor....Pages 73-89
Secure group barter: Multi-party fair exchange with semi-trusted neutral parties....Pages 90-102
A payment scheme using vouchers....Pages 103-121
A formal specification of requirements for payment transactions in the SET protocol....Pages 122-140
On assurance structures for WWW commerce....Pages 141-157
Certificate revocation: Mechanics and meaning....Pages 158-164
Revocatoin: Options and challenges....Pages 165-171
On certificate revocation and validation....Pages 172-177
Can we eliminate certificate revocation lists?....Pages 178-183
Group blind digital signatures: A scalable solution to electronic cash....Pages 184-197
Curbing junk e-mail via secure classification....Pages 198-213
Publicly verifiable lotteries: Applications of delaying functions....Pages 214-226
Robustness and security of digital watermarks....Pages 227-240
Beyond identity: Warranty-based digital signature transactions....Pages 241-253
Compliance checking in the PolicyMaker trust management system....Pages 254-274
An efficient fair off-line electronic cash system with extensions to checks and wallets with observers....Pages 275-295
A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem....Pages 296-308
Cryptanalysis of SPEED....Pages 309-310