To order through AMS contact the AMS Customer Services Department, P.O. Box 6248, Providence, Rhode Island 02940-6248 USA. For Visa, Mastercard, Discover, and American Express orders call 1-800-321-4AMS.
You may also visit the AMS Bookstore and order directly from there. DIMACS does not distribute or sell these books.
The first item in these proceedings is a technical report containing a summary of the open questions raised during informal discussions, short abstracts of the formal presentations, names and addresses of the participants, and a bibliograpy. The rest of the proceedings consists of fifteen papers based on talks presented at the workshop and two additional contributed papers on related topics. (The two papers that were not presented at the workshop are "Formal Definitions for Secure Distributed Protocols," by Donald Beaver, and "On expected polynomial time simulation of zero knowledge protocols," by Uriel Feige and Adi Shamir.) These are unrefereed papers, many of which describe ongoing research; we expect authors to write longer, more formal papers on some of these projects for refereed journals.
We would like to thank the DIMACS executive committee for sponsoring the Workshop and all of the participants for making it so successful and enjoyable.
Preface vii
Foreword ix
Open Questions, Talk Abstracts, and Summary of Discussions
Joan Feigenbaum and Michael Merritt 1
Formal Definitions for Secure Distributed Protocols
Donald Beaver 47
Perfect Privacy For Two-Party Protocols
Donald Beaver 65
On the Structure of Secret Key Exchange Protocols
Mihir Bellare, Lenore Cowen, and Shafi Goldwasser 79
Privacy-Enhanced Electronic Mail
Matt Bishop 93
Program Result Checking against Adaptive Programs and in
Cryptographic Settings
Manuel Blum, Michael Luby, and Ronitt Rubinfeld 107
The Scope of a Logic of Authentication
Michael Burrows, Martin Abadi, and Roger Needham 119
Secure Policy Enforcement in Internetworks
Deborah Estrin and Gene Tsudik 127
On Expected Polynomial Time Simulation of Zero Knowledge
Protocols
Uriel Feige and Adi Shamir 155
Cryptographic Protection of Databases and Software
Joan Feigenbaum, Mark Y. Liberman,
and Rebecca N. Wright 161
Secret Bit Transmission Using a Random Deal of Cards
Michael J. Fischer, Michael S. Paterson,
and Charles Rackoff 173
Security against Replay Chosen-Ciphertext Attack
Zvi Galil, Stuart Haber, and Moti Yung 183
New Directions In Testing
Richard J. Lipton 191
Towards a Theory of Cryptographic Systems: A Critique of
Crypto-Complexity
Michael Merritt 203
Feeback in Discrete Communication
Alon Orlitsky 213
On Necessary Conditions for Secure Distributed Computation
Rafail Ostrovsky and Moti Yung 229
Secure IX Network
Jim Reeds 235
Reasoning about Cryptographic Protocols
Marie-Jeanne Toussaint and Pierre Wolper 245
Index of Volumes