Download Information Security Applications: 8th International by Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji PDF

By Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto (auth.), Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.)

The eighth foreign Workshop on info protection purposes (WISA 2007) used to be hung on Jeju Island, Korea in the course of August 27–29, 2007. The workshop was once subsidized through the Korea Institute of data safety and Cryptology (KIISC), the Electronics and Telecommunications study Institute (ETRI) and the Ministry of knowledge and verbal exchange (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to provide their paintings and to replace principles. The workshop covers all technical features of safeguard functions, together with cryptographic and non-cryptographic concepts. We have been more than happy and commemorated to function this system Committee Co-chairs of WISA 2007. this system Committee got ninety five papers from 20 nations, and accredited 27 papers for the whole presentation music. The papers have been chosen after an in depth and cautious refereeing method during which every one paper used to be reviewed through at the very least 3 individuals of this system Committee. as well as the contributed papers, the workshop had 3 detailed talks. Moti Yung gave an instructional speak, entitled “Somebody you recognize: The Fourth issue of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day assault defense” and “Securing Biometric T- plates,” respectively. many of us deserve our gratitude for his or her beneficiant contributions to the good fortune of the workshop. we want to thank all of the humans keen on the technical application and in organizing the workshop. we're very thankful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and choosing the accredited papers. We additionally exhibit our distinct because of the Organizing Committee participants for his or her exertions in organizing the workshop.

Show description

Read or Download Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers PDF

Similar international conferences and symposiums books

Virtual Systems and Multimedia: 13th International Conference, VSMM 2007, Brisbane, Australia, September 23-26, 2007, Revised Selected Papers (Lecture ... Applications, incl. Internet/Web, and HCI)

This e-book constitutes the completely refereed post-conference court cases of the thirteenth foreign convention on digital structures and Multimedia, VSMM 2007, held in Brisbane, Australia, in September 2007. The 18 revised complete papers offered have been conscientiously reviewed and chosen from ninety seven preliminary submissions in the course of rounds of reviewing and development.

Practical Aspects of Declarative Languages: 4th International Symposium, PADL 2002 Portland, OR, USA, January 19–20, 2002 Proceedings

Declarative languages construct on sound theoretical bases to supply beautiful frameworks for software improvement. those languages were succe- absolutely utilized to a wide selection of real-world events together with database m- agement, lively networks, software program engineering, and decision-support platforms.

FM 2005: Formal Methods: International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005. Proceedings

This quantity includes the complaints of Formal equipment 2005, the thirteenth InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, in the course of July 18–22, 2005. Formal equipment Europe (FME, www. fmeurope. org) is an self sustaining organization which goals to stimulate using, and examine on, formal equipment for approach improvement.

The Failure of the American Baptist culture: A symposium

Publication through James B. , Ed. Jordan

Additional info for Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Sample text

Keywords: Secret signature, signature privacy, public provability, key agreement, anonymity, public auction. 1 Introduction Digital signature, first proposed by Diffie and Hellman in 1976 [11], is an electronic version of handwritten signatures for digital documents. A digital signature on some message, m, is generated by a signer, A, using a secret signing key, skA . The correctness of the generated signature is verified using the corresponding public key, pkA . It provides authentication and non-repudiation in a public way, in the sense that anyone can verify the validity of the digital signature, since pkA is public information.

KRF-2005003-D00375. The views and opinions expressed in this paper are those of the author and do not reflect those of the Australian Government or the Australian Institute of Criminology. This research was not undertaken as part of the author’s work at the Australian Institute of Criminology. S. Kim, M. -W. ): WISA 2007, LNCS 4867, pp. 30–47, 2007. c Springer-Verlag Berlin Heidelberg 2007 Secret Signatures: How to Achieve Business Privacy Efficiently? 31 Signature Privacy. In this paper, we consider a business scenario where both the sender (signer) and the receiver (verifier) wish to keep their exchanged signatures private – we term this signature privacy.

With the additional information, W , anyone can verify that (U, V ) is a correct signature of the signer A for the message m and W . If only message proving is required, it is very efficient. (2) Receiver proving. If the receiver information needs to be proven, reveal W and prove its correctness with respect to the receiver’s public key. Its validity can be proven by the signer or the receiver either non-anonymously (using the general proof) or anonymously (using the anonymous proof) which will be described in Section 4.

Download PDF sample

Rated 4.57 of 5 – based on 14 votes