Crypto topics and applications II


Autoria(s): Seberry, Jennifer; Charnes, Chris; Pieprzyk, Josef; Safavi-Naini, Rei
Contribuinte(s)

Atallah, Mikhail J.

Blanton, Marina

Data(s)

2010

Resumo

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Identificador

http://eprints.qut.edu.au/70088/

Publicador

Chapman & Hall/CRC

Relação

http://dl.acm.org/citation.cfm?id=1882736

Seberry, Jennifer, Charnes, Chris, Pieprzyk, Josef, & Safavi-Naini, Rei (2010) Crypto topics and applications II. In Atallah, Mikhail J. & Blanton, Marina (Eds.) Algorithms and Theory of Computation Handbook : Special Topics and Techniques [2nd edition]. Chapman & Hall/CRC, Boca Raton, Fla., pp. 13-1.

Direitos

Chapman & Hall/CRC ©2010

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Book Chapter