Fr. 180.00

New Directions of Modern Cryptography

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Zhenfu Cao is with Shanghai Jiao Tong University, P.R. of China Zusammenfassung Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems. Inhaltsverzeichnis Introduction. Trust Problem. Ciphertext Access Control Problem. Efficiency Problems in Multi-Message Cryptology. The Challenges from Quantum and Biological Computing. Organization. Proxy Re-Cryptography. Introduction. Proxy Re-Signature. Proxy Re-Encryption. Attribute-Based Cryptography. Universal Definitions. Bounded Ciphertext-Policy Encryption Schemes. Multi-Authority Encryption Schemes. Interval Encryption Schemes. Fuzzy Identity-Based Signature Schemes. Batch Cryptography. Aggregate Signature and Batch Verification. Batch Decryption and Batch Key Agreement. Batch RSA’s Implementation Based on Diophantine Equations. Solving the Diophantine Equations. Noncommutative Cryptography. Braid-Based Cryptography. Z-Modular Method. Using Monomials in Z-Modular Method. Improved Key Exchange over Thompson’s Group. Perspectives. Appendices. Appendix A. Appendix B. Appendix C. ...

Product details

Authors Zhenfu Cao, Cao Zhenfu
Publisher Taylor & Francis Ltd.
 
Languages English
Product format Hardback
Released 06.12.2012
 
EAN 9781466501386
ISBN 978-1-4665-0138-6
No. of pages 400
Subjects Natural sciences, medicine, IT, technology > IT, data processing > General, dictionaries

MATHEMATICS / Logic, Coding theory & cryptology, Mathematical logic, Coding theory and cryptology

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.