ebook img

Handbook of financial cryptography and security PDF

612 Pages·2011·16.074 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook of financial cryptography and security

(cid:105) (cid:105) “main˙fm” — 2010/6/16 — 16:50 — page ii — #2 (cid:105) (cid:105) HANDBOOK OF FINANCIAL CRYPTOGRAPHY AND SECURITY (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main˙fm” — 2010/6/16 — 16:50 — page iv — #4 (cid:105) (cid:105) CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY Series Editor Douglas R. Stinson Published Titles Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography Antoine Joux, Algorithmic Cryptanalysis M. Jason Hinek, Cryptanalysis of RSA and Its Variants Burton Rosenberg, Handbook of Financial Cryptography and Security Forthcoming Titles Maria Isabel Vasco, Spyros Magliveras, and Rainer Steinwandt, Group Theoretic Cryptography Shiu-Kai Chin and Susan Beth Older, Access Control, Security and Trust: A Logical Approach (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main˙fm” — 2010/6/16 — 16:50 — page vi — #6 (cid:105) (cid:105) Chapman & Hall/CRC CRYPTOGRAPHY AND NETWORK SECURITY HANDBOOK OF FINANCIAL CRYPTOGRAPHY AND SECURITY Edited by Burton Rosenberg (cid:105) (cid:105) (cid:105) (cid:105) Chapman & Hall/CRC Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Chapman & Hall/CRC is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4200-5982-3 (Ebook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid- ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti- lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy- ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com (cid:105) (cid:105) “main” — 2010/6/29 — 17:06 — page v — #2 (cid:105) (cid:105) About the Editor Burton Rosenberg received a BS in electrical engineering from the Massachusetts Insti- tuteofTechnology,Cambridge,MA,anMSincomputersciencefromColumbiaUniversity, NewYork,andanMAandPhDincomputersciencefromPrincetonUniversity,NewJersey. He has taught at Dartmouth College, Hanover, NH, and is currently an associate professor of computer science at the University of Miami, Coral Gables, FL. He has worked both in academia and industry, including a consultant position at the Mus´ee National d’Art Moderne in Paris. His PhD is also in the field of computational geometry. v (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main” — 2010/6/29 — 17:06 — page vi — #3 (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main” — 2010/6/29 — 17:06 — page vii — #4 (cid:105) (cid:105) List of Contributors Mauro Barni Margaret Jackson DipartimentodiIngegneriadell’Informazione Graduate School of Business Universit`a di Siena RMIT University Siena, Italy Melbourne, Australia Mira Belenkiy Markus Jakobsson Microsoft Research Palo Alto Research Center Redmond, WA Palo Alto, CA Felix Brandt Stefan Katzenbeisser LFE Theoretische Informatik Security Engineering Group Ludwig-Maximillians-Universit¨at Mu¨nchen Technische Universit¨at Darmstadt Munich, Germany Darmstadt, Gemany Lynne Coventry Aggelos Kiayias School of Psychology and Sport Sciences Department of Informatics and Telecom Northumbria University National and Kapodistrian University of Newcastle, UK Athens Athens, Greece George Danezis Microsoft Research Cambridge Sjouke Mauw Cambridge, UK Facult´e des Sciences, de la Technologie et de la Communication Mohammad Torabi Dashti Universit´e du Luxembourg Informationssicherheit/ZISC Luxembourg Eidgeno¨ssische Technische Hochschule Zu¨rich, Switzerland R´obert P´arhonyi Inter Access B.V. Claudia Diaz Hilversum, The Netherlands ESAT/COSIC Katholieke Universiteit Leuven Leuven, Belgium Serdar Pehlivanoglu Division of Mathematical Sciences Carl Ellison Nanyang Technological University New York Singapore vii (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main” — 2010/6/29 — 17:06 — page viii — #5 (cid:105) (cid:105) viii Ahmad-Reza Sadeghi Sid Stamm Department of Electrical Engineering and Mozilla Information Sciences Mountain View, CA Ruhr-University Bochum Bochum, Germany Paul Syverson U.S. Naval Research Laboratory Reihaneh Safavi-Naini Washington, D.C. Department of Computer Science University of Calgary Michael Szydlo Calgary, Canada Akamai Cambridge, MA Nicholas Paul Sheppard Christian Wachsmann Department of Computer Science Chair for System Security University of Calgary Ruhr-University Bochum Calgary, Canada Bochum, Germany Radu Sion Robin Wilton Department of Computer Science Future Identity Ltd. Stony Brook University Westbury, UK Stony Brook, NY Marianne Winslett Sean Smith Department of Computer Science Department of Computer Science University of Illinois Dartmouth College Urbana, IL Hanover, NH Jianying Zhou Chris Soghoian Institute for Infocomm Research School of Informatics and Computing Agency for Science, Technology and Indiana University Bloomington Research Bloomington, IN Singapore (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “main” — 2010/6/29 — 17:06 — page ix — #6 (cid:105) (cid:105) Contents Preface xix Burton Rosenberg Cryptography, Commerce, and Culture. . . . . . . . . . . . . . . . . . . . . . . . xix Overview of Chapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Required Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi In Closing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv I Protocols and Theory 1 1 E-Cash 3 Mira Belenkiy 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.1 E-Cash Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1.2 Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.1.3 Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2 Chaum’s E-Cash. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.2.1 Overview of the Chaum, Fiat, Naor Construction . . . . . . . . . . 10 1.2.2 Blind Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.2.3 CFN E-Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.2.4 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.2.5 Preventing Alice from Being Framed . . . . . . . . . . . . . . . . . 14 1.2.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.3 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.3.1 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.3.2 Balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 1.3.3 Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 1.3.4 Exculpability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 1.4 Brands’ E-Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 1.4.1 Sigma Protocols and the Discrete Log Representation Problem . . 21 1.4.2 Restrictive Blind Signatures . . . . . . . . . . . . . . . . . . . . . . 23 1.4.3 Detecting Double-Spenders via Secret Sharing . . . . . . . . . . . . 24 1.4.4 Brands’ E-Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 1.4.5 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 1.4.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 1.5 CHL: Compact E-Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 1.5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 1.5.2 Zero-Knowledge Proof of Knowledge . . . . . . . . . . . . . . . . . 29 ix (cid:105) (cid:105) (cid:105) (cid:105)

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.