Text
New directions of modern cryptography
Contents:
1 Introduction
1.1 Trust problem
1.2 Ciphertext access control problem
1.3 Efficiency problem in multi-message cryptology
1.4 The challenges from quantum and biological computing
1.5 Organization
2 Proxy re-cryptography
2.1 Introduction
2.2 Proxy re cryptography
2.3 Proxy re-encryption
3 Attribute-based cryptography
3.1 Introduction
3.2 Universal definitions
3.3 Bounded ciphertext-policy encryption schemes
3.4 Multi-authority encryption schemes
3.5 Interval encryption schemes
3.6 Fuzzy identity-based signature schemes
3.7 Notes
4 Batch cryptography
4.1 Introduction
4.2 Aggregate signature and batch verification
4.3 Batch decryption and batch key agreement
4.4 Batch RSA’s implementation based on Diophantine equations
4.5 Solving the Diophantine equations
4.6 Notes
5 Noncommutative cryptography
5.1 Introduction
5.2 Braid-based cryptography
5.3 Z-modular method
5.4 Using monomials in z-modular method
5.5 Improved key exchange over Thompson’s group
5.6 Notes
6 Perspectives
6.1 On proxy re-cryptography
6.2 On attribute-based cryptography
6.3 On batch cryptography
6.4 On noncommutative cryptography
Appendixes
References
Index
No other version available