CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
041607 `An E cient Electronic Payment System Protecting Privacy'<br />
JL Camenisch, JM Piveteau, MA Stadler, ESORICS 94 pp 207{215<br />
The authors propose a payment system based on anonymous accounts; customers<br />
can set up new accounts under pseudonyms, and transfer money between accounts<br />
under their control. This gives most of the practical advantages of digital cash, without<br />
requiring the bank to store large amounts of data on coins in issue.<br />
041608 `Conditionally Secure Secret Sharing Schemes with Disenrollment<br />
Capability'<br />
C Charnes, J Pieprzyk, R Safavi-Naini, Fairfax 94 pp 89{95<br />
The authors describe a variant of Shamir's secret sharing scheme, which has been<br />
given a disenrollment capability. Users have two shadows related by discrete logarithm<br />
modulo a Mersenne prime.<br />
041609 `Oblivious Signatures'<br />
LD Chen, ESORICS 94 pp 161{172<br />
Two signature schemes are proposed. In one of them, the recipient can choose to<br />
get one message out of n signed, and in the other she can choose to get a message signed<br />
with one out of n keys; in neither case will be signer know which was chosen. Both<br />
of these schemes are quite e cient and are based on the Chaum-Pedersen signature<br />
scheme.<br />
041610 `Optimisation, tness and the knapsack cipher'<br />
A Clark, E Dawson, H Bergen, ISITA 94 pp 257{261<br />
This paper considers applying combinatorial optimization to cryptanalysis, and in<br />
particular, using simulated annealing, genetic algorithms or tabu search tobreaking<br />
knapsack ciphers. The conclusion is that such techniques are not suitable for large<br />
knapsacks; although the search space might be reduced, they are slower in practice<br />
than the alternatives.<br />
041611 `On public-key cryptosystems based on linear codes: e ciency<br />
and weakness'<br />
EM Gabidulin, Cirencester 93 pp 17{31<br />
The author had proposed a public key cryptosystem based on rank codes, but it<br />
was broken by Gibson. In this paper, he proposes a modi cation which is claimed to<br />
defeat the attack.<br />
041612 `Modi ed key agreement protocol based on the digital signature<br />
standard'<br />
L Harn, Electronics Letters v 31 no 6 (16/3/95) pp 448{449<br />
The author proposes a Di e Hellman variant with inbuilt DSS authentication. It<br />
avoids the Nyberg-Rueppel attack byexchanging two keys at once and signing their<br />
sum.<br />
041613 `Meta-ElGamal signature schemes'<br />
P Horster, H Petersen, M Michels, Fairfax 94 pp 96{107<br />
The authors systematically enumerate a numberofvariants of the ElGamal signature<br />
scheme. They present a total of thirty variants, a similar numberofschemes for<br />
signing two messages at once, and six schemes for three messages. A similar analysis for<br />
DSA shows ve variants which are e cient for signature validation and eight which are<br />
e cient for veri cation; only one scheme | already proposed by Nyberg and Rueppel<br />
| is common to both of these lists.<br />
041614 `Meta Message Recovery and Meta Blind Signature Schemes<br />
Based on the Discrete Logarithm Problem and Their Applications'<br />
P Horster, H Petersen, M Michels, Asiacrypt 94 pp 185{196<br />
Existing techniques to add message recovery to El-Gamal based signature schemes<br />
39