New Directions of Modern Cryptography

New Directions of Modern Cryptography

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$104.95
ISBN 9781466501386
Cat# K14392
Add to cart
eBook (VitalSource)
$104.95 $73.47
ISBN 9781466501409
Cat# KE15827
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:
 
 

Features

  • Introduces the latest modern cryptographies: proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography
  • Emphasizes the core idea that cryptography is born and developed for the application requirements
  • Presents the applications of the latest modern cryptographies to show its practical value in everyday life
  • Explores challenges in the future of cryptography

Summary

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field.

The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied.

The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography.

This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Table of Contents

Introduction
Trust Problem
Trusted Domains Transfer Problem
Trusted Server Problem
Ciphertext Access Control Problem
Efficiency Problems in Multi-Message Cryptology
The Challenges from Quantum and Biological Computing
Organization
Proxy Re-Cryptography
Introduction
Proxy Re-Signature
Properties and Definition
Related Work
Security Model: the AH Model
Multiuse, Private Proxy and Bidirectional Scheme
Incompleteness of the AH Model
AH+ Model
Proxy Re-Encryption
Properties and Definition
Related Work
Security Models
Single-use, Unidirectional Scheme
Attribute-Based Cryptography
Universal Definitions
Bounded Ciphertext-Policy Encryption Schemes
Definitions
Security Models
Basic BCPABE Scheme BCP1
Security Proof of BCP1
Extended BCPABE Scheme BCP2
Security Proof of BCP2
Comparisons
Multi-Authority Encryption Schemes
Security Models
Construction
Security Analysis
Security Proofs
Interval Encryption Schemes
Definitions
Security Models
Binary Tree Encryption and Forward Secure Encryption
A Generic Transformation from BTE to Interval Encryption
Basic Construction: A Concrete Instantiation Based on HIBE
Discussion on Efficiency and Security
Extension Work
Fuzzy Identity-Based Signature Schemes
Definitions
Security Models
Construction
Security Proofs
Applications to Biometric Authentication

Batch Cryptography
Aggregate Signature and Batch Verification
Definitions
Aggregate Signature
Identity-Based Aggregate Signature
Batch Decryption and Batch Key Agreement
Review of RSA
Batch RSA
Batch Key Agreement
Batch RSA’s Implementation Based on Diophantine Equations
Implementation Based on Plus-Type Equations
A Concrete Example Based on Plus-Type Equations
Implementation Based on Minus-Type Equations
A Concrete Example Based on Minus-Type Equations
Solving the Diophantine Equations
Plus-Type Equations
Minus-Type Equations
Noncommutative Cryptography
Braid-Based Cryptography
Basic Definitions
Conjugacy and Related Problems
Key Exchange, Encryption and Authentication
Braid-Based Signatures
One-More Like Assumptions and Provable Security
New Cryptographic Problems in Braid Groups
Z-Modular Method
Z-Modular Method over Noncommutative Rings
New Problems over Noncommutative Rings
Diffie-Hellman-Like Key Agreement Protocol
ElGamal-Like Encryption Scheme
Instantiation and Illustration (I)
Z-Modular Method over Noncommutative Groups/Semigroups
Instantiation and Illustration (II)
Using Monomials in Z-Modular Method
Conjugate Left Self-Distributed System (Conj-LD)
New Assumptions in Conj-LD Systems
Cryptosystems from Conj-LD Systems
Security and Efficiency Issues on Fat (b)
Improved Key Exchange over Thompson’s Group
Thompson’s Group and Decomposition Problem
Analysis of SU05 Protocol
Analysis of RST07 Attack
Tests and Improvements
Perspectives
On Proxy Re-Cryptography
On Attribute-Based Cryptography
On Batch Cryptography
On Noncommutative Cryptography
Appendices
Appendix A
Appendix B
Appendix C

Author Bio(s)

Zhenfu Cao is with Shanghai Jiao Tong University, P.R. of China

Recommended For You

 
 
Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us