The third Financial Cryptography conference was held in February 1999, once again at Anguilla in the British West Indies. The number of attendees continues to increase from year to year, as do the number and quality of the technical submissions. The Program Committee did a great job selecting the technical program. I thank them for all of their eo rt’s. We were helped by a number of outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi, Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and Francis Zane. I apologize for any omissions. Adi Shamir gave an excellent invited talk that forecast the future of crypt- raphy and electronic commerce. On-line certic ate revocation was the subject of a panel led by Michael Myers, following up on the success of his panel on the same topic at last year’s conference. Joan Feigenbaum moderated a lively panel on fair use, intellectual property, and the information economy, and I thank her for pulling together from that discussion a paper for these proceedings. A s- cessful Rump Session allowed participants to present new results in an informal setting, superbly chaired by Avi Rubin.
Table of Contents
Electronic Commerce.- Experimenting with Electronic Commerce on the PalmPilot.- Blinding of Credit Card Numbers in the SET Prool.- Anonymity Control.- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems.- Fraud Management.- Risk Management for E-Cash Systems with Partial Real-Time Audit.- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash.- Public-Key Certificates.- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys.- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance.- Steganography.- Playing ‘Hide and Seek’ with Stored Keys.- On Channel Capacity and Modulation of Watermarks in Digital Still Images.- Content Distribution.- Towards Making Broadcast Encryption Practical.- Conditional Access Concepts and Principles.- Fair Use, Intellectual Property, and the Information Economy.- Anonymity Mechanisms.- Anonymous Authentication of Membership in Dynamic Groups.- Some Open Issues and New Directions in Group Signatures.- Auctions and Markets.- Anonymous Investing: Hiding the Identities of Skholders.- Fair On-Line Auctions without Special Trusted Parties.- Auctions and Markets.- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control”.- Improved Magic Ink Signatures Using Hints.