Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Dahlia Malkhi and Ofer Margo and Elan Pavlov. E-Voting Without 'Cryptography'. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 1-15. Springer, 2002. [  paper | publisher ]
[2] Jun Furukawa and Hiroshi Miyauchi and Kengo Mori and Satoshi Obana and Kazue Sako. An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 16-30. Springer, 2002. [  paper | publisher ]
[3] Markus Jakobsson. Financial Instruments in Recommendation Mechanisms. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 31-43. Springer, 2002. [  paper | publisher ]
[4] Koutarou Suzuki and Makoto Yokoo. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 44-56. Springer, 2002. [  paper | publisher ]
[5] Kazumasa Omote and Atsuko Miyaji. A Second-price Sealed-bid Auction with the Discriminant of the p$_{\mbox{0}}$-th Root. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 57-71. Springer, 2002. [  paper | publisher ]
[6] Ari Juels and Michael Szydlo. A Two-Server, Sealed-Bid Auction Protocol. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 72-86. Springer, 2002. [  paper | publisher ]
[7] Helger Lipmaa and N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 87-101. Springer, 2002. [  paper | publisher ]
[8] Don Coppersmith and Markus Jakobsson. Almost Optimal Hash Sequence Traversal. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 102-119. Springer, 2002. [  paper | publisher ]
[9] Philippe Golle and Stanislaw Jarecki and Ilya Mironov. Cryptographic Primitives Enforcing Communication and Storage Complexity. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 120-135. Springer, 2002. [  paper | publisher ]
[10] Pierre-Alain Fouque and Jacques Stern and Jan-Geert Wackers. CryptoComputing with Rationals. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 136-146. Springer, 2002. [  paper | publisher ]
[11] Rebecca N. Wright and L. Jean Camp and Ian Goldberg and Ronald L. Rivest and Graham Wood. Privacy Tradeoffs: Myth or Reality? Panel. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 147-151. Springer, 2002. [  paper | publisher ]
[12] Takeshi Okamoto and Mitsuru Tada and Atsuko Miyaji. An Improved Fast Signature Scheme without Online Multiplication. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 152-167. Springer, 2002. [  paper | publisher ]
[13] Juan A. Garay and Markus Jakobsson. Timed Release of Standard Digital Signatures. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 168-182. Springer, 2002. [  paper | publisher ]
[14] Giuseppe Ateniese and Dawn Xiaodong Song and Gene Tsudik. Quasi-Efficient Revocation in Group Signatures. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 183-197. Springer, 2002. [  paper | publisher ]
[15] Shouhuai Xu and Moti Yung. The Dark Side of Threshold Cryptography. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 198-219. Springer, 2002. [  paper | publisher ]
[16] Daniel E. Geer Jr. and Moti Yung. Split-and-Delegate: Threshold Cryptography for the Masses. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 220-237. Springer, 2002. [  paper | publisher ]
[17] Yvo Desmedt and Reihaneh Safavi-Naini and Huaxiong Wang. Redistribution of Mechanical Secret Shares. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 238-252. Springer, 2002. [  paper | publisher ]
[18] Roger Dingledine and Paul F. Syverson. Reliable MIX Cascade Networks through Reputation. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 253-268. Springer, 2002. [  paper | publisher ]
[19] Dennis K{\"u}gler and Holger Vogt. Offline Payments with Auditable Tracing. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 269-281. Springer, 2002. [  paper | publisher ]
[20] John Ioannidis and Sotiris Ioannidis and Angelos D. Keromytis and Vassilis Prevelakis. Fileteller: Paying and Getting Paid for File Storage. In Matt Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 282-299. Springer, 2002. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.