Buch, Englisch, 400 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 720 g
Buch, Englisch, 400 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 720 g
ISBN: 978-1-4665-0138-6
Verlag: CRC Press
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field.
The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied.
The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography.
This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.
Zielgruppe
Researchers and practitioners in cryptography, computer science, and mathematics, and graduate-level students in cryptography, computer science, and mathematics departments.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik Mathematik Algebra Zahlentheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
Weitere Infos & Material
Introduction. Trust Problem. Ciphertext Access Control Problem. Efficiency Problems in Multi-Message Cryptology. The Challenges from Quantum and Biological Computing. Organization. Proxy Re-Cryptography. Introduction. Proxy Re-Signature. Proxy Re-Encryption. Attribute-Based Cryptography. Universal Definitions. Bounded Ciphertext-Policy Encryption Schemes. Multi-Authority Encryption Schemes. Interval Encryption Schemes. Fuzzy Identity-Based Signature Schemes. Batch Cryptography. Aggregate Signature and Batch Verification. Batch Decryption and Batch Key Agreement. Batch RSA’s Implementation Based on Diophantine Equations. Solving the Diophantine Equations. Noncommutative Cryptography. Braid-Based Cryptography. Z-Modular Method. Using Monomials in Z-Modular Method. Improved Key Exchange over Thompson’s Group. Perspectives. Appendices. Appendix A. Appendix B. Appendix C.