Kefei Chen9781402079863, 1402079869
Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao’s former and current students.
Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Table of contents :
Cover……Page 1
Contents……Page 8
Foreword……Page 12
Preface……Page 14
Randomness and Discrepancy Transforms……Page 18
Legendre Sequences and Modified Jacobi Sequences……Page 26
Resilient Functions with Good Cryptographic Properties……Page 34
Differential Factoring for Integers……Page 42
Simple and Efficient Systematic A-codes from Error Correcting Codes……Page 50
On Coefficients of Binary Expression of Integer Sums……Page 62
A new publicly verifiable proxy signcryption scheme……Page 70
Some New Proxy Signature Schemes from Pairings……Page 76
Construction of Digital Signature Schemes Based on DLP……Page 84
DLP-based blind signatures and their application in E-Cash systems……Page 90
A Group of Threshold Group-Signature Schemes with Privilege Subsets……Page 98
A New Group Signature Scheme with Unlimited Group Size……Page 106
Identity Based Signature Scheme Based on Quadratic Residues……Page 114
New Signature Scheme Based on Factoring and Discrete Logarithms……Page 124
New Transitive Signature Scheme based on Discreted Logarithm Problem……Page 130
Blind signature schemes based on GOST signature……Page 140
One-off Blind Public Key……Page 146
Analysis on the two classes of Robust Threshold Key Escrow Schemes……Page 154
Privacy-Preserving Approximately Equation Solving over Reals……Page 162
An Authenticated Key Agreement Protocol Resistant to DoS attack……Page 168
A comment on a multi-signature scheme……Page 174
Cryptanalysis of LKK Proxy Signature……Page 178
Attack on Identity-Based Broadcasting Encryption Schemes……Page 182
Differential-Linear Cryptanalysis of Camellia……Page 190
Security Analysis of EV-DO System……Page 198
A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem……Page 204
Quantum cryptographic algorithm for classical binary information……Page 212
Practical Quantum Key Distribution Network……Page 218
A Survey of P2P Network Security Issues based on Protocol Stack……Page 226
DDoS Scouter: A simple IP traceback scheme……Page 234
A Method of Digital Data Transformation¨CBase91……Page 246
An approach to the formal analysis of TMN protocol……Page 252
Reviews
There are no reviews yet.