By Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto (auth.), Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.)
The eighth foreign Workshop on info protection purposes (WISA 2007) used to be hung on Jeju Island, Korea in the course of August 27–29, 2007. The workshop was once subsidized through the Korea Institute of data safety and Cryptology (KIISC), the Electronics and Telecommunications study Institute (ETRI) and the Ministry of knowledge and verbal exchange (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to provide their paintings and to replace principles. The workshop covers all technical features of safeguard functions, together with cryptographic and non-cryptographic concepts. We have been more than happy and commemorated to function this system Committee Co-chairs of WISA 2007. this system Committee got ninety five papers from 20 nations, and accredited 27 papers for the whole presentation music. The papers have been chosen after an in depth and cautious refereeing method during which every one paper used to be reviewed through at the very least 3 individuals of this system Committee. as well as the contributed papers, the workshop had 3 detailed talks. Moti Yung gave an instructional speak, entitled “Somebody you recognize: The Fourth issue of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day assault defense” and “Securing Biometric T- plates,” respectively. many of us deserve our gratitude for his or her beneficiant contributions to the good fortune of the workshop. we want to thank all of the humans keen on the technical application and in organizing the workshop. we're very thankful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and choosing the accredited papers. We additionally exhibit our distinct because of the Organizing Committee participants for his or her exertions in organizing the workshop.
Read or Download Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers PDF
Similar international conferences and symposiums books
This e-book constitutes the completely refereed post-conference court cases of the thirteenth foreign convention on digital structures and Multimedia, VSMM 2007, held in Brisbane, Australia, in September 2007. The 18 revised complete papers offered have been conscientiously reviewed and chosen from ninety seven preliminary submissions in the course of rounds of reviewing and development.
Declarative languages construct on sound theoretical bases to supply beautiful frameworks for software improvement. those languages were succe- absolutely utilized to a wide selection of real-world events together with database m- agement, lively networks, software program engineering, and decision-support platforms.
This quantity includes the complaints of Formal equipment 2005, the thirteenth InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, in the course of July 18–22, 2005. Formal equipment Europe (FME, www. fmeurope. org) is an self sustaining organization which goals to stimulate using, and examine on, formal equipment for approach improvement.
Publication through James B. , Ed. Jordan
- Data Integration in the Life Sciences: 5th International Workshop, DILS 2008, Evry, France, June 25-27, 2008. Proceedings
- Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006, Revised Papers ... Computer Science and General Issues)
- Euro-Par 2001 Parallel Processing: 7th International Euro-Par Conference Manchester, UK, August 28–31, 2001 Proceedings
- Pattern Recognition: 23rd DAGM Symposium Munich, Germany, September 12–14, 2001 Proceedings
Additional info for Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Keywords: Secret signature, signature privacy, public provability, key agreement, anonymity, public auction. 1 Introduction Digital signature, ﬁrst proposed by Diﬃe and Hellman in 1976 , is an electronic version of handwritten signatures for digital documents. A digital signature on some message, m, is generated by a signer, A, using a secret signing key, skA . The correctness of the generated signature is veriﬁed using the corresponding public key, pkA . It provides authentication and non-repudiation in a public way, in the sense that anyone can verify the validity of the digital signature, since pkA is public information.
KRF-2005003-D00375. The views and opinions expressed in this paper are those of the author and do not reﬂect those of the Australian Government or the Australian Institute of Criminology. This research was not undertaken as part of the author’s work at the Australian Institute of Criminology. S. Kim, M. -W. ): WISA 2007, LNCS 4867, pp. 30–47, 2007. c Springer-Verlag Berlin Heidelberg 2007 Secret Signatures: How to Achieve Business Privacy Eﬃciently? 31 Signature Privacy. In this paper, we consider a business scenario where both the sender (signer) and the receiver (veriﬁer) wish to keep their exchanged signatures private – we term this signature privacy.
With the additional information, W , anyone can verify that (U, V ) is a correct signature of the signer A for the message m and W . If only message proving is required, it is very eﬃcient. (2) Receiver proving. If the receiver information needs to be proven, reveal W and prove its correctness with respect to the receiver’s public key. Its validity can be proven by the signer or the receiver either non-anonymously (using the general proof) or anonymously (using the anonymous proof) which will be described in Section 4.