The?fthFinancialCryptographyconferencewasheldFebruary19-22,2001. Afterhalfadecade,wemovedbeyondourAnguillanoriginstoGrandCayman, BWI. Thevenuechangedbutthefocusoftheprogramremainedtopresentthe bestresearchinsecuringelectronic?nancialtransactionsandelectronicc- merce. Asinthepastfewyears,mostofthecontributedpapersfocusedonthe technicalcryptographicandsecurityaspectsof?nancialcryptography,whilethe ?nancialaspectsarere?ectedprimarilyininvitedtalksandpanels. (Andinthe informaldiscussion. )Thisyear,inadditiontothesubmittedpapers,wehada provocativeinvitedtalkbyRichardRahnonmoneylaunderingaswellaspanels ondigitalrightsmanagementandthebusinessofelectronicvoting. Therewas alsoarumpsession,chairedbyRebeccaWright. Thereweremanyinterestingandmanytechnicallystrongsubmissions. I thanktheprogramcommittee(listedonthenextpage)fortheirhelpinthe di?culttaskofchoosingthosepapersthatmadethestrongestcontributionto theconference. WehadadditionalreviewinghelpfromOlivierBaudron,Paul Fahn,JuanGaray,MarkusJakobsson,GuenterKarjoth,PhongNguyen,David Pointcheval,ThomasPornin,SholomRosen,DawnSong,SusanneWetzel,and RebeccaWright. (MyapologiesifIhaveoverlookedanyone. )Iwouldalsoliketo thankGeorgeDavida,theelectronicsubmissionschair,andhisstudent,Dawn MarieGibson,forsettingupandrunningthesubmissionsprocessattheUniv- sityofWisconsin. AnextrabigthankyoutoYairFrankel,whowasalwaysthere withhisexperienceandadvicethatgreatlyimprovedthejobIdidasprogram chair,aswellasmakingitmoreenjoyable. MattFranklinalsoprovidedvaluable advice. Thankstoallthepeoplewhosubmittedpapers,withoutwhichthere wouldbenoprogram. Authorsweregiventheopportunitytorevisetheirpapers followingtheconference. Thesewerecollectedwithoutfurtherreviewandare includedinthisvolume. ThankstogeneralchairStuartHaberfordoingmanythingsthatnoneofthe attendeesnoticedbecausehedidthemsonicely. HewasablyassistedbyHinde tenBerge. ThankstoHarrisMcCoyforhandlinglocalarrangementsandJason CronkformaintainingtheWebsite. ThankstotheIFCAdirectorsforkeeping FCthriving,toAdamShostackforvenuearrangements,andtoBarbFox,the sponsorshipchair. Thankstoour?nancialsponsors,whoarelistedonthenext page. SpecialthankstoRayHirschfeldwhoseadvicetomeandtotheothersm- tionedherehasbeeninvaluable. Thanks?nallytoattendeeswithoutwhomthere wouldbenoconference. March2001 PaulSyverson VI Preface ProgramCommittee MattBlaze,AT&TLabs-Research YairFrankel,Ecash MattFranklin,UCDavis DavidKravitz,WaveSystemsCorp. ArjenLenstra,Citicorp PhilipMacKenzie,LucentBellLabs AviRubin,AT&TLabs-Research JacquesStern,EcoleNormaleSup'erieure KazueSako,NEC StuartStubblebine,CertCo PaulSyverson(Chair),NavalResearchLab WinTreese,OpenMarket,Inc. DougTygar,UCBerkeley MichaelWaidner,IBMZurichResearchLab MotiYung,CertCo GeneralChair StuartHaber,Intertrust SponsorshipChair BarbFox,Microsoft FinancialCryptography2001wasorganizedbytheInternationalFinancialCr- tographyAssociation(IFCA),andwassponsoredbyBibitInternetPayments, CertCo,Certicom,HushCommunications,IBM,InterTrustSTARLab,- crosoft,nCipher,RSASecurity,andZero-KnowledgeSystems. TableofContents ManagingPaymentTransactionCosts AmortizedE-Cash ...1 MosesLiskov,SilvioMicali O?ineMicropaymentswithoutTrustedHardware...21 MattBlaze,JohnIoannidis,AngelosD. Keromytis Panel(I) ThePracticalProblemsofImplementingMicroMint...41 NickovanSomeren ProtectingDigitalRights ...51 YairFrankel AspectsofDigitalRightsManagementandtheUseofHardwareSecurity Devices...54 DavidW. Kravitz ASolutiontotheNapsterPhenomenon:WhyValueCannotBeCreated AbsenttheTransferofSubjectiveData...59 ScottMoskowitz GoldenTimesforDigitalRightsManagement? ...64 TomasSander ApplicabilityofPublicKeyCryptosystemstoDigitalRightsManagement Applications...75 JeremyWyant TrustandRiskManagement OntheGlobalContentPMI:ImprovedCopy-ProtectedInternetContent Distribution...79 TadayoshiKohno,MarkMcGovern Trust:ACollisionofParadigms...91 L. JeanCamp,HelenNissenbaum,CathleenMcGrath GroupsandAnonymity OntheSecurityofHomageGroupAuthenticationProtocol...106 ' ElianeJaulmes,GuillaumePoupard VIII Table of Contents Anonymitywithout'Cryptography' ...117 DahliaMalkhiandElanPavlov FairTracingwithoutTrustees ...136 DennisKugler,HolgerVogt InvitedTalk WhytheWaronMoneyLaunderingShouldBeAborted...149 RichardW. Rahn Certi?catesandAuthentication ProvablySecureImplicitCerti?cateSchemes...156 DanielR. L. Brown,RobertGallant,ScottA. Vanstone Nonmonotonicity,UserInterfaces,andRiskAssessmentinCerti?cate Revocation ...166 NinghuiLi,JoanFeigenbaum MutualAuthenticationforLow-PowerMobileDevices...178 MarkusJakobsson,DavidPointcheval CreditCardSecurity O?-LineGenerationofLimited-UseCreditCardNumbers...196 AvielD. Rubin,RebeccaN. Wright ASecurityFrameworkforCard-BasedSystems...210 YiannisTsiounis SecureClick:AWebPaymentSystemwithDisposableCreditCard Numbers ...232 AdiShamir Panel(II) TheBusinessofElectronicVoting ...243 EdGerck,C. AndrewNe?,RonaldL. Rivest,AvielD. Rubin, MotiYung MarketsandMultipartyComputation PrivacyfortheStockMarket...269 GiovanniDiCrescenzo SecureDistributedComputinginaCommercialEnvironment...289 PhilippeGolle,StuartStubblebine Table of Contents IX SignaturesinFinancialCryptography MonotoneSignatures...305 DavidNaccache,DavidPointcheval,ChristopheTymen ThePowerofRSAInversionOraclesandtheSecurityofChaum'TLabs-Research JacquesStern,EcoleNormaleSup'erieure KazueSako,NEC StuartStubblebine,CertCo PaulSyverson(Chair),NavalResearchLab WinTreese,OpenMarket,Inc. DougTygar,UCBerkeley MichaelWaidner,IBMZurichResearchLab MotiYung,CertCo GeneralChair StuartHaber,Intertrust SponsorshipChair BarbFox,Microsoft FinancialCryptography2001wasorganizedbytheInternationalFinancialCr- tographyAssociation(IFCA),andwassponsoredbyBibitInternetPayments, CertCo,Certicom,HushCommunications,IBM,InterTrustSTARLab,- crosoft,nCipher,RSASecurity,andZero-KnowledgeSystems. TableofContents ManagingPaymentTransactionCosts AmortizedE-Cash ...1 MosesLiskov,SilvioMicali O?ineMicropaymentswithoutTrustedHardware...21 MattBlaze,JohnIoannidis,AngelosD. Keromytis Panel(I) ThePracticalProblemsofImplementingMicroMint...41 NickovanSomeren ProtectingDigitalRights ...51 YairFrankel AspectsofDigitalRightsManagementandtheUseofHardwareSecurity Devices...54 DavidW. Kravitz ASolutiontotheNapsterPhenomenon:WhyValueCannotBeCreated AbsenttheTransferofSubjectiveData...59 ScottMoskowitz GoldenTimesforDigitalRightsManagement? ...64 TomasSander ApplicabilityofPublicKeyCryptosystemstoDigitalRightsManagement Applications...75 JeremyWyant TrustandRiskManagement OntheGlobalContentPMI:ImprovedCopy-ProtectedInternetContent Distribution...79 TadayoshiKohno,MarkMcGovern Trust:ACollisionofParadigms...91 L. JeanCamp,HelenNissenbaum,CathleenMcGrath GroupsandAnonymity OntheSecurityofHomageGroupAuthenticationProtocol...106 ' ElianeJaulmes,GuillaumePoupard VIII Table of Contents Anonymitywithout'Cryptography' ...117 DahliaMalkhiandElanPavlov FairTracingwithoutTrustees ...136 DennisKugler,HolgerVogt InvitedTalk WhytheWaronMoneyLaunderingShouldBeAborted...149 RichardW. Rahn Certi?catesandAuthentication ProvablySecureImplicitCerti? cateSchemes...156 DanielR. L. Brown,RobertGallant,ScottA. Vanstone Nonmonotonicity,UserInterfaces,andRiskAssessmentinCerti?cate Revocation ...166 NinghuiLi,JoanFeigenbaum MutualAuthenticationforLow-PowerMobileDevices...178 MarkusJakobsson,DavidPointcheval CreditCardSecurity O?-LineGenerationofLimited-UseCreditCardNumbers...196 AvielD. Rubin,RebeccaN. Wright ASecurityFrameworkforCard-BasedSystems...210 YiannisTsiounis SecureClick:AWebPaymentSystemwithDisposableCreditCard Numbers ...232 AdiShamir Panel(II) TheBusinessofElectronicVoting ...243 EdGerck,C. AndrewNe?,RonaldL. Rivest,AvielD. Rubin, MotiYung MarketsandMultipartyComputation PrivacyfortheStockMarket...269 GiovanniDiCrescenzo SecureDistributedComputinginaCommercialEnvironment...289 PhilippeGolle,StuartStubblebine Table of Contents IX SignaturesinFinancialCryptography MonotoneSignatures...305 DavidNaccache,DavidPointcheval,ChristopheTymen ThePowerofRSAInversionOraclesandtheSecurityofChaum's RSA-BasedBlindSignatureScheme...319 MihirBellare,ChanathipNamprempre,DavidPointcheval, MichaelSemanko OptimisticFairExchangewithTransparentSignatureRecovery...339 OlivierMarkowitch,ShahrokhSaeednia Auctions (M+1)st-PriceAuctionProtocol...3 51 HiroakiKikuchi Non-interactivePrivateAuctions...364 OlivierBaudron,JacquesStern AuthorIndex ...379 AmortizedE-Cash 1 2 Moses Liskov and Silvio Micali 1 MITLaboratoryforComputerScience mliskov@theory. lcs. mit. edu 2 MITLaboratoryforComputerScience silvio@lcs. mit. edu Abstract. Wepresentane-cashschemewhichprovidesatrade-o?- tweenanonymityande?ciency,byamortizingthecostofzero-knowledge andsignaturecomputationinthecashgenerationphase. OurworksolvesanopenproblemofOkamotoindivisiblee-cash.
Les mer
Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies in 2002. Papers cover managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security and more.
Les mer
Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without ‘Cryptography’.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.
Les mer
Springer Book Archives
Springer Book Archives
Includes supplementary material: sn.pub/extras
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9783540440796
Publisert
2002-08-14
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, UP, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Heftet

Redaktør