Jump to ratings and reviews
Rate this book

Financial Cryptography: 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers

Rate this book
E-voting without 'Cryptography'.- An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling.- Financial Instruments in Recommendation Mechanisms.- Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing.- A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root.- A Two-Server, Sealed-Bid Auction Protocol.- Secure Vickrey Auctions without Threshold Trust.- Almost Optimal Hash Sequence Traversal.- Cryptographic Primitives Enforcing Communication and Storage Complexity.- CryptoComputing with Rationals.- Privacy Myth or Reality?.- An Improved Fast Signature Scheme without Online Multiplication.- Timed Release of Standard Digital Signatures.- Quasi-Efficient Revocation of Group Signatures.- The Dark Side of Threshold Cryptography.- Threshold Cryptography for the Masses.- Redistribution of Mechanical Secret Shares.- Reliable MIX Cascade Networks through Reputation.- Offline Payments with Auditable Tracing.- Paying and Getting Paid for File Storage.

312 pages, Paperback

Published October 8, 2014

About the author

Matt Blaze

6 books1 follower
Matt Blaze (Ph.D., Computer Science; Princeton University, 1993; M.A., Computer Sciecne, Princeton, 1989; M.S., Computer Science, Columbia University, 1988; B.S., City University of New York (Hunter College), 1986) is a computer security, cryptography, network communication, and surveillance technology researcher and holds the McDevitt Chair of Computer Science and Law at Georgetown University. Previously he was an associate professor of computer and information science at the University of Pennsylvania in Philadelphia, where he served as director of the Distributed Computing Laboratory. Prior to joining the faculty at Penn, he was for 12 years a member of the research staff at AT&T Labs (previously known as AT&T Bell Labs) in New Jersey.

A focus of his research is on the properties and capabilities of surveillance technology (both lawful and illicit) in the context of modern digital systems and communications networks. He has testified before the U.S. Congress on related matters, and, in 1994, discovered weaknesses in the NSA's "Clipper" key escrow encryption system that led to that system's abandonment before it was widely deployed.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.