Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.

Author(s): Feng Bao, Robert H. Deng (auth.)
Series: Lecture Notes in Computer Science 1560
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999

Language: English
Pages: 334
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Management of Computing and Information Systems; Operating Systems

A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation....Pages 1-11
A New Aspect of Dual Basis for Efficient Field Arithmetic....Pages 12-28
On the Security of Random Sources....Pages 29-42
Anonymous Fingerprinting Based on Committed Oblivious Transfer....Pages 43-52
How to Enhance the Security of Public-Key Encryption at Minimum Cost....Pages 53-68
Encrypted Message Authentication by Firewalls....Pages 69-81
A Relationship between One-Wayness and Correlation Intractability....Pages 82-96
Message Recovery Fair Blind Signature....Pages 97-111
On Quorum Controlled Asymmetric Proxy Re-encryption....Pages 112-121
Mini-Cash: A Minimalistic Approach to E-Commerce....Pages 122-135
Preserving Privacy in Distributed Delegation with Fast Certificates....Pages 136-153
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol....Pages 154-170
Toward Fair International Key Escrow....Pages 171-187
How to Copyright a Function?....Pages 188-196
On the Security of RSA Screening....Pages 197-203
The Effectiveness of Lattice Attacks Against Low-Exponent RSA....Pages 204-218
A Trapdoor Permutation Equivalent to Factoring....Pages 219-222
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor....Pages 223-234
Evaluating Differential Fault Analysis of Unknown Cryptosystems....Pages 235-244
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project....Pages 245-262
Hash Functions and the MAC Using All-or-Nothing Property....Pages 263-275
Decision Oracles are Equivalent to Matching Oracles....Pages 276-289
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA’s Secret....Pages 290-305
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy....Pages 306-314
A Secure Pay-per-View Scheme for Web-Based Video Service....Pages 315-326