Cao | New Directions of Modern Cryptography | Buch | 978-1-4665-0138-6 | sack.de

Buch, Englisch, 400 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 720 g

Cao

New Directions of Modern Cryptography


1. Auflage 2012
ISBN: 978-1-4665-0138-6
Verlag: CRC Press

Buch, Englisch, 400 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 720 g

ISBN: 978-1-4665-0138-6
Verlag: CRC Press


Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field.

The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied.

The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography.

This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Cao New Directions of Modern Cryptography jetzt bestellen!

Zielgruppe


Researchers and practitioners in cryptography, computer science, and mathematics, and graduate-level students in cryptography, computer science, and mathematics departments.


Autoren/Hrsg.


Weitere Infos & Material


Introduction. Trust Problem. Ciphertext Access Control Problem. Efficiency Problems in Multi-Message Cryptology. The Challenges from Quantum and Biological Computing. Organization. Proxy Re-Cryptography. Introduction. Proxy Re-Signature. Proxy Re-Encryption. Attribute-Based Cryptography. Universal Definitions. Bounded Ciphertext-Policy Encryption Schemes. Multi-Authority Encryption Schemes. Interval Encryption Schemes. Fuzzy Identity-Based Signature Schemes. Batch Cryptography. Aggregate Signature and Batch Verification. Batch Decryption and Batch Key Agreement. Batch RSA’s Implementation Based on Diophantine Equations. Solving the Diophantine Equations. Noncommutative Cryptography. Braid-Based Cryptography. Z-Modular Method. Using Monomials in Z-Modular Method. Improved Key Exchange over Thompson’s Group. Perspectives. Appendices. Appendix A. Appendix B. Appendix C.


Zhenfu Cao is with Shanghai Jiao Tong University, P.R. of China



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.