41 Crypto Topics and Applications Ii
نویسندگان
چکیده
In this chapter we continue our exposition of the crypto topics which was begun in the previous chapter. This chapter covers: Secret Sharing, Threshold Cryptography, Signature Schemes, and nally Quantum Key Distribution and Quantum Cryptography. As in the previous chapter, we have focussed only on the essentials of each topic. We have included in the bibliography suucient items which can be consulted for further details. First we give a synopsis of the topics which are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only pre-designated collections of individuals are able to recreate the secret by collectively combining the parts of the secret which were allocated to them. There are numerous applications of secret sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only speciied collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality such as auditing if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed amongst a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying (electronic) signatures for documents. A sub-class of signature schemes is concerned with the shared-generation and shared
منابع مشابه
Crypto Topics And Applications II
In this chapter we continue our exposition of the crypto topics which was begun in the previous chapter. This chapter covers: Secret Sharing, Threshold Cryptography, Signature Schemes, and finally Quantum Key Distribution and Quantum Cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have included in the bibliography sufficient items which can be ...
متن کاملCrypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems
In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age. To locate the issue in a historical perspective and in line with this strand of thought, we consid...
متن کاملHOST Physical Unclonable Functions II ECE 495 / 595
PUFs: "Innovative circuit primitives that extract secrets from physical characteristics of ICs" Most proposed PUFs based on exploiting inherent delay characteristics of wires and transistors that differ from chip to chip because of manufacturing process variations Popular applications include low-cost authentication and generation of volatile secret key for crypto Typical applications of PUFs l...
متن کاملAn Embedded Sensor Node Microcontroller with Crypto-Processors
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, ...
متن کاملFlexible Cryptographic Component Design for Secure Web Applications
Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations have been presented: Hardware and Software implementations of cryptographic algorithms. Hardware implementations of cryptographic algorithms provide much faster than software implementations. However, Software implemen...
متن کامل