Financial Cryptography: 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers / Edition 1

Financial Cryptography: 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers / Edition 1

by Matt Blaze
     
 

ISBN-10: 354000646X

ISBN-13: 9783540006466

Pub. Date: 04/28/2003

Publisher: Springer Berlin Heidelberg

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Financial Cryptography, FC 2002, held in Southampton, Bermuda, in March 2002. The 19 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on voting and recommending,

…  See more details below

Overview

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Financial Cryptography, FC 2002, held in Southampton, Bermuda, in March 2002. The 19 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on voting and recommending, auctions, cryptography, digital signature schemes, thresholds and secret sharing, and anonymity and digital payment systems.

Product Details

ISBN-13:
9783540006466
Publisher:
Springer Berlin Heidelberg
Publication date:
04/28/2003
Series:
Lecture Notes in Computer Science Series, #2357
Edition description:
2003
Pages:
302
Product dimensions:
6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

E-voting without ‘Cryptography’.- An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling.- Financial Instruments in Recommendation Mechanisms.- Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing.- A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root.- A Two-Server, Sealed-Bid Auction Protocol.- Secure Vickrey Auctions without Threshold Trust.- Almost Optimal Hash Sequence Traversal.- Cryptographic Primitives Enforcing Communication and Storage Complexity.- CryptoComputing with Rationals.- Privacy Tradeoffs: Myth or Reality?.- An Improved Fast Signature Scheme without Online Multiplication.- Timed Release of Standard Digital Signatures.- Quasi-Efficient Revocation of Group Signatures.- The Dark Side of Threshold Cryptography.- Split-and-Delegate: Threshold Cryptography for the Masses.- Redistribution of Mechanical Secret Shares.- Reliable MIX Cascade Networks through Reputation.- Offline Payments with Auditable Tracing.- Fileteller: Paying and Getting Paid for File Storage.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >