By Daniel J. Bernstein, Tanja Lange
Africacrypt 2010, the 3rd overseas convention on Cryptology in Africa, happened might 3-6, 2010 in Stellenbosch, South Africa. the overall Chairs, Riaal Domingues from the South African Communications and safety organization and Christine Swart from the collage of Cape city, have been regularly a excitement to paintings with and did an exceptional activity with the neighborhood preparations. we're deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months discover after unanticipated occasions pressured a metamorphosis of position. The Africacrypt 2010 submission cut-off date used to be cut up into . Authors s- mitting paperswererequiredto registertitles andabstractsby the rstdeadline, January five. a complete of 121 submissions were obtained through this cut-off date, - notwithstanding a few have been withdrawn sooner than assessment. Authors have been allowed to proceed engaged on their papers until eventually the second one closing date, January 10. Submissions have been evaluated in 3 levels over a interval of approximately months. the choice part all started on January five: application Committee m- bers begun comparing abstracts and volunteering to address numerous papers. We assigned a group of individuals to every paper. The evaluation section began on January eleven: software Committee participants got entry to the complete papers and - gan in-depth reports of eighty two submissions. lots of the reports have been accomplished via February7, thebeginningofthediscussionphase.ProgramCommitteemembers got entry to different reports and outfitted consensus of their reviews of the submissions. finally the discussions integrated 285 complete stories and 203 - ditional reviews. The submissions, reports, and next discussions have been dealt with easily by means of iChair.
Read or Download Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Lecture Notes in Computer Science) PDF
Best cryptography books
As a result of the speedy progress of electronic verbal exchange and digital information alternate, details defense has develop into a very important factor in undefined, enterprise, and management. sleek cryptography presents crucial thoughts for securing info and preserving info. within the first half, this e-book covers the major techniques of cryptography on an undergraduate point, from encryption and electronic signatures to cryptographic protocols.
This e-book constitutes the refereed court cases of the seventh foreign Workshop on conception and perform in Public Key Cryptography, PKC 2004, held in Singapore in March 2004. The 32 revised complete papers awarded have been rigorously reviewed and chosen from 106 submissions. All present matters in public key cryptography are addressed starting from theoretical and mathematical foundations to a wide number of public key cryptosystems.
This ebook makes a really obtainable advent to an important modern program of quantity concept, summary algebra, and chance. It includes various computational examples all through, giving inexperienced persons the chance to use, perform, and payment their realizing of key options. KEY issues insurance starts off from scratch in treating likelihood, entropy, compression, Shannon¿s theorems, cyclic redundancy tests, and error-correction.
- Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings (Lecture Notes in Computer Science)
- WiFi Security, 1st Edition
- Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Lecture Notes in Computer Science)
- Block Ciphers And Cryptanalysis
- Hacking Exposed. Web 2.0: Security Secrets and Solutions
Extra info for Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Lecture Notes in Computer Science)
They require that each user of the blind signature scheme has to register before being able to obtain signatures. We also discuss the relation to our model. Contribution. We propose a novel security model, which is a generalization of the well-studied models of Juels, Luby, and Ostrovsky  and Pointcheval and Stern  for blind signatures, the model of Abe and Ohkubo  for fair blind signatures, and that of Abe and Fujisaki  for partially blind signatures. With our model for fair partially blind signatures, we provide a uniﬁed framework that can be used to instantiate blind, fair blind, and partially blind signature schemes under a strong security model.
For both weaknesses, two diﬀerent countermeasures have been proposed, namely, fair blind and partially blind signatures. de). Dominique Schr¨ oder was supported by the Emmy Noether Program Fi 940/2-1 of the German Research Foundation (DFG). J. Bernstein and T. ): AFRICACRYPT 2010, LNCS 6055, pp. 34–51, 2010. c Springer-Verlag Berlin Heidelberg 2010 Fair Partially Blind Signatures 35 Fair blind signatures, suggested by Stadler, Piveteau, and Camenisch , involve a trusted third party, which is able to revoke blindness in case of a dispute between signer and user.
Chen, K. ) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444–459. : Fully anonymous group signatures without random oracles. In: Kurosawa, K. ) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164–180. : Homomorphic trapdoor commitments to group elements. : Eﬃcient non-interactive proof systems for bilinear groups. P. ) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. : On the anonymity of fair oﬄine e-cash systems. N. ) FC 2003. LNCS, vol. 2742, pp. 34–50. : Fair blind signatures revisited. , Okamoto, T. ) Pairing 2007.