+612 9045 4394
 
CHECKOUT
Public Key Cryptography : Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1999, Proceedings - Hideki Imai

Public Key Cryptography

Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1999, Proceedings

By: Hideki Imai (Editor), Yuliang Zheng (Editor)

Paperback

Published: 17th February 1999
Ships: 5 to 9 business days
5 to 9 business days
$125.05
or 4 easy payments of $31.26 with Learn more

Other Available Formats (Hide)

  • Paperback View Product Published: 24th June 1998
    Ships: 5 to 9 business days
    5 to 9 business days
    $111.05
  • Paperback View Product Published: 5th January 2000
    $169.25

Last,butnotleast,wewouldliketothankallthepeoplewhosubmittedtheir paperstotheconference(includingthosewhosesubmissionswerenotsuccessful), aswellastheworkshopparticipantsfromaroundtheworld,fortheirsupport whichmadethisconferencepossible. March1999 UniversityofTokyo,Japan HidekiImai MonashUniversity,Melbourne,Australia YuliangZheng PKC'99 1999InternationalWorkshop onPracticeandTheory inPublicKeyCryptography KamakuraPrinceHotel,Kamakura,Japan March1-3,1999 Incooperationwith TheTechnicalGrouponInformationSecurity,theInstituteof Electronics,InformationandCommunicationEngineers(IEICE) OrganizingCommittee HidekiImai,Chair (UniversityofTokyo,Japan) TakashiMano (IPA,Japan) KantaMatsuura (UniversityofTokyo,Japan) HidenoriShida (UniversityofTokyo,Japan) YuliangZheng (MonashUniversity,Australia) ProgramCommittee HidekiImai,Co-Chair (UniversityofTokyo,Japan) YuliangZheng,Co-Chair (MonashUniversity,Australia) Chin-ChenChang (NationalChungChengUniversity,Taiwan) YvoDesmedt (UniversityofWisconsin-Milwaukee,USA) KwangjoKim (InformationandCommunicationsUniversity,Korea) MarkusJakobsson (BellLabs,USA) ArjenLenstra (Citibank,USA) TsutomuMatsumoto (YokohamaNationalUniversity,Japan) EijiOkamoto (JAIST,Japan) TatsuakiOkamoto (NTT,Japan) NigelSmart (HPLabsBristol,UK) Contents ANewTypeofMagicInk"Signatures|Towards Transcript-IrrelevantAnonymityRevocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 FengBaoandRobertH. Deng(KentRidgeDigitalLabs,Singapore) ANewAspectofDualBasisforE cientFieldArithmetic . . . . . . . . . . . . . . . . . 12 Chang-HyiLee(SAIT,Korea) Jong-InLim(KoreaUni) OntheSecurityofRandomSources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Jean-S ebastienCoron(ENSandGemplus,France) AnonymousFingerprintingBasedonCommitted ObliviousTransfer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 JosepDomingo-Ferrer(UniRoviraiVirgili,Spain) HowtoEnhancetheSecurityofPublic-Key EncryptionatMinimumCost. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 EiichiroFujisakiandTatsuakiOkamoto(NTT,Japan) EncryptedMessageAuthenticationbyFirewalls. . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 ChandanaGamage,JussipekkaLeiwoand YuliangZheng(MonashUni,Australia) ARelationshipbetweenOne-Waynessand CorrelationIntractability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 SatoshiHadaandToshiakiTanaka(KDD,Japan) MessageRecoveryFairBlindSignature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Hyung-WooLeeandTai-YunKim(KoreaUni) OnQuorumControlledAsymmetricProxyRe-encryption. . . . . . . . . . . . . . . . . 112 MarkusJakobsson(BellLabs,USA) Mini-Cash:AMinimalisticApproachtoE-Commerce. . . . . . . . . . . . . . . . . . . . . 122 MarkusJakobsson(BellLabs,USA) PreservingPrivacyinDistributedDelegation withFastCerti cates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 PekkaNikander(Ericsson,Finland) YkiKortesniemiandJonnaPartanen(HelsinkiUniofTech,Finland) UnknownKey-ShareAttacksontheStation-to-Station(STS)Protocol. . . . 154 SimonBlake-Wilson(Certicom,Canada) AlfredMenezes(UniofWaterloo,Canada) TowardFairInternationalKeyEscrow{AnAttemptbyDistributed TrustedThirdAgencieswithThresholdCryptography{ . . . . . . . . . . . . . . . . . . 171 ShingoMiyazaki(KyushuUniv,Japan) IkukoKuroda(NTT,Japan) KouichiSakurai(KyushuUniv,Japan) HowtoCopyrightaFunction?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 DavidNaccache(Gemplus,France) AdiShamir(WeizmannInstofSci,Israel) JulienP. Stern(UCL,Belgium,andUnideParis-Sud,France) OntheSecurityofRSAScreening. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Jean-S ebastienCoron(ENSandGemplus,France) DavidNaccache(Gemplus,France) TheE ectivenessofL

A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocationp. 1
A New Aspect of Dual Basis for Efficient Field Arithmeticp. 12
On the Security of Random Sourcesp. 29
Anonymous Fingerprinting Based on Committed Oblivious Transferp. 43
How to Enhance the Security of Public-Key Encryption at Minimum Costp. 53
Encrypted Message Authentication by Firewallsp. 69
A Relationship between One-Wayness and Correlation Intractabilityp. 82
Message Recovery Fair Blind Signaturep. 97
On Quorum Controlled Asymmetric Proxy Re-encryptionp. 112
Mini-Cash: A Minimalistic Approach to E-Commercep. 122
Preserving Privacy in Distributed Delegation with Fast Certificatesp. 136
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocolp. 154
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography -p. 171
How to Copyright a Function ?p. 188
On the Security of RSA Screeningp. 197
The Effectiveness of Lattice Attacks Against Low-Exponent RSAp. 204
A Trapdoor Permutation Equivalent to Factoringp. 219
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessorp. 223
Evaluating Differential Fault Analysis of Unknown Cryptosystemsp. 235
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Projectp. 245
Hash Functions and the MAC Using All-or-Nothing Propertyp. 263
Decision Oracles are Equivalent to Matching Oraclesp. 276
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secretp. 290
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchyp. 306
A Secure Pay-per-View Scheme for Web-Based Video Servicep. 315
Author Indexp. 327
Table of Contents provided by Publisher. All Rights Reserved.

ISBN: 9783540656449
ISBN-10: 3540656448
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 326
Published: 17th February 1999
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.8 x 15.65  x 1.83
Weight (kg): 0.41