Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Bryan Parno and Cynthia Kuo and Adrian Perrig. Phoolproof Phishing Prevention. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 1-19. Springer, 2006. [  paper | publisher ]
[2] Mohammad Mannan and Paul C. van Oorschot. A Protocol for Secure Public Instant Messaging. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 20-35. Springer, 2006. [  paper | publisher ]
[3] C. Corzo and F. Corzo S. and N. Zhang and A. Carpenter. Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 36-51. Springer, 2006. [  paper | publisher ]
[4] Adam Barth and Dan Boneh and Brent Waters. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 52-64. Springer, 2006. [  paper | publisher ]
[5] Philippe Golle. A Private Stable Matching Algorithm. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 65-80. Springer, 2006. [  paper | publisher ]
[6] Klaus Kursawe and Gregory Neven and Pim Tuyls. Private Policy Negotiation. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 81-95. Springer, 2006. [  paper | publisher ]
[7] Bogdan Carbunar and Radu Sion. Uncheatable Reputation for Distributed Computation Markets. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 96-110. Springer, 2006. [  paper | publisher ]
[8] Jun Furukawa and Kazue Sako. An Efficient Publicly Verifiable Mix-Net for Long Inputs. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 111-125. Springer, 2006. [  paper | publisher ]
[9] Jong Youl Choi and Philippe Golle and Markus Jakobsson. Auditable Privacy: On Tamper-Evident Mix Networks. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 126-141. Springer, 2006. [  paper | publisher ]
[10] Peter Bogetoft and Ivan Damg{\aa}rd and Thomas P. Jakobsen and Kurt Nielsen and Jakob Pagter and Tomas Toft. A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 142-147. Springer, 2006. [  paper | publisher ]
[11] S{\'e}bastien Canard and Matthieu Gaud and Jacques Traor{\'e}. Defeating Malicious Servers in a Blind Signatures Based Voting System. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 148-153. Springer, 2006. [  paper | publisher ]
[12] Yvo Desmedt and Tanja Lange. Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 154-159. Springer, 2006. [  paper | publisher ]
[13] Tyler Close. Credit Transfer for Market-Based Infrastructure. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 160-165. Springer, 2006. [  paper | publisher ]
[14] Michael Szydlo. A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 166-170. Springer, 2006. [  paper | publisher ]
[15] Gwena{\"e}lle Martinet and Guillaume Poupard and Philippe Sola. Cryptanalysis of a Partially Blind Signature Scheme or How to Make \$100 Bills with \$1 and \$2 Ones. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 171-176. Springer, 2006. [  paper | publisher ]
[16] David Galindo and Javier Herranz. A Generic Construction for Token-Controlled Public Key Encryption. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 177-190. Springer, 2006. [  paper | publisher ]
[17] Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov. Timed-Release and Key-Insulated Public Key Encryption. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 191-205. Springer, 2006. [  paper | publisher ]
[18] Ian F. Blake and Vladimir Kolesnikov. Conditional Encrypted Mapping and Comparing Encrypted Numbers. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 206-220. Springer, 2006. [  paper | publisher ]
[19] Samad Nasserian and Gene Tsudik. Revisiting Oblivious Signature-Based Envelopes. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 221-235. Springer, 2006. [  paper | publisher ]
[20] Yoshikazu Hanatani and Yuichi Komano and Kazuo Ohta and Noboru Kunihiro. Provably Secure Electronic Cash Based on Blind Multisignature Schemes. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 236-250. Springer, 2006. [  paper | publisher ]
[21] Xiaofeng Chen and Fangguo Zhang and Yi Mu and Willy Susilo. Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 251-265. Springer, 2006. [  paper | publisher ]
[22] Lan Nguyen. Privacy-Protecting Coupon System Revisited. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 266-280. Springer, 2006. [  paper | publisher ]
[23] Yong Ho Hwang and Pil Joong Lee. Efficient Broadcast Encryption Scheme with Log-Key Storage. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 281-295. Springer, 2006. [  paper | publisher ]
[24] Mikhail J. Atallah and Marina Blanton and Keith B. Frikken and Jiangtao Li. Efficient Correlated Action Selection. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 296-310. Springer, 2006. [  paper | publisher ]
[25] Aggelos Kiayias and Moti Yung. Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. In Giovanni Di Crescenzo and Aviel D. Rubin, editor, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 311-325. Springer, 2006. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.