Financial Cryptography

4th International Conference, FC 2000 Anguilla, British West Indies, February 20–24, 2000 Proceedings

  • Yair Frankel

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1962)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Digital Rights Management

    1. Moni Naor, Benny Pinkas
      Pages 1-20
  3. Invited Lecture (I)

  4. Payment Systems

    1. Birgit Pfitzmann, Ahmad-Reza Sadeghi
      Pages 42-52
    2. Tomas Sander, Amnon Ta-Shma, Moti Yung
      Pages 53-71
    3. Giovanni Di Crescenzo
      Pages 72-89
  5. Financial Cryptography Tools (I)

    1. Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern
      Pages 90-104
  6. Electronic Postcards

    1. Leon A. Pintsov, Scott A. Vanstone
      Pages 105-120
    2. David Naccache, Jacques Stern
      Pages 121-135
  7. Panel (I)

    1. Mori Yung
      Pages 136-139
  8. Abuses of Systems

    1. Els Van Herreweghen
      Pages 140-156
    2. Jean-Sébasticn Coron, Paul Kocher, David Naccache
      Pages 157-173
    3. Vitaly Shmatikov, John C. Mitchell
      Pages 174-191
    4. David M’Raïhi, David Naccache, Michael Tunstall
      Pages 192-201
  9. Financial Crypto Policies and Issues

  10. Anonymity

    1. David Pointcheval
      Pages 259-275
    2. Stuart G. Stubblebine, Paul F. Syverson
      Pages 276-294

About these proceedings

Introduction

Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20– 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the 21 accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers. This year’s program also included two invited lectures, two panel sessions, and a rump session. The invited talks were given by Kevin McCurley prese- ing “In the Search of the Killer App” and Pam Samuelson presenting “Towards a More Sensible Way of Regulating the Circumvention of Technical Protection Systems”. For the panel sessions, Barbara Fox and Brian LaMacchia mod- ated “Public-Key Infrastructure: PKIX, Signed XML, or Something Else” and Moti Yung moderated “Payment Systems: The Next Generation”. Stuart Haber organized the informal rump session of short presentations. This was the ?rst year that the conference accepted submissions electro- cally as well as by postal mail. Many thanks to George Davida, the electronic submissions chair, for maintaining the electronic submissions server. A majority of the authors preferred electronic submissions with 65 of the 68 submissions provided electronically.

Keywords

Authentication Cryptology Digital Payment Systems Digital Signature Systems Electronic Cash Financial Transactions Key Enscrowment Public-Key Infrastructure Secure Communication cryptography tools

Editors and affiliations

  • Yair Frankel
    • 1
  1. 1.NJUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45472-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42700-1
  • Online ISBN 978-3-540-45472-4
  • Series Print ISSN 0302-9743
  • About this book