15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

041607 `An E cient Electronic Payment System Protecting Privacy'<br />

JL Camenisch, JM Piveteau, MA Stadler, ESORICS 94 pp 207{215<br />

The authors propose a payment system based on anonymous accounts; customers<br />

can set up new accounts under pseudonyms, and transfer money between accounts<br />

under their control. This gives most of the practical advantages of digital cash, without<br />

requiring the bank to store large amounts of data on coins in issue.<br />

041608 `Conditionally Secure Secret Sharing Schemes with Disenrollment<br />

Capability'<br />

C Charnes, J Pieprzyk, R Safavi-Naini, Fairfax 94 pp 89{95<br />

The authors describe a variant of Shamir's secret sharing scheme, which has been<br />

given a disenrollment capability. Users have two shadows related by discrete logarithm<br />

modulo a Mersenne prime.<br />

041609 `Oblivious Signatures'<br />

LD Chen, ESORICS 94 pp 161{172<br />

Two signature schemes are proposed. In one of them, the recipient can choose to<br />

get one message out of n signed, and in the other she can choose to get a message signed<br />

with one out of n keys; in neither case will be signer know which was chosen. Both<br />

of these schemes are quite e cient and are based on the Chaum-Pedersen signature<br />

scheme.<br />

041610 `Optimisation, tness and the knapsack cipher'<br />

A Clark, E Dawson, H Bergen, ISITA 94 pp 257{261<br />

This paper considers applying combinatorial optimization to cryptanalysis, and in<br />

particular, using simulated annealing, genetic algorithms or tabu search tobreaking<br />

knapsack ciphers. The conclusion is that such techniques are not suitable for large<br />

knapsacks; although the search space might be reduced, they are slower in practice<br />

than the alternatives.<br />

041611 `On public-key cryptosystems based on linear codes: e ciency<br />

and weakness'<br />

EM Gabidulin, Cirencester 93 pp 17{31<br />

The author had proposed a public key cryptosystem based on rank codes, but it<br />

was broken by Gibson. In this paper, he proposes a modi cation which is claimed to<br />

defeat the attack.<br />

041612 `Modi ed key agreement protocol based on the digital signature<br />

standard'<br />

L Harn, Electronics Letters v 31 no 6 (16/3/95) pp 448{449<br />

The author proposes a Di e Hellman variant with inbuilt DSS authentication. It<br />

avoids the Nyberg-Rueppel attack byexchanging two keys at once and signing their<br />

sum.<br />

041613 `Meta-ElGamal signature schemes'<br />

P Horster, H Petersen, M Michels, Fairfax 94 pp 96{107<br />

The authors systematically enumerate a numberofvariants of the ElGamal signature<br />

scheme. They present a total of thirty variants, a similar numberofschemes for<br />

signing two messages at once, and six schemes for three messages. A similar analysis for<br />

DSA shows ve variants which are e cient for signature validation and eight which are<br />

e cient for veri cation; only one scheme | already proposed by Nyberg and Rueppel<br />

| is common to both of these lists.<br />

041614 `Meta Message Recovery and Meta Blind Signature Schemes<br />

Based on the Discrete Logarithm Problem and Their Applications'<br />

P Horster, H Petersen, M Michels, Asiacrypt 94 pp 185{196<br />

Existing techniques to add message recovery to El-Gamal based signature schemes<br />

39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!