Control and Cybernetics Contemporary Cryptology

نویسندگان

  • Dario Catalano
  • Ronald Cramer
  • Ivan Damgard
  • Giovanni Di Crescenzo
  • David Pointcheval
  • Tsuyoshi Takagi
چکیده

The book here reviewed consists of several articles written by different authors. We provide below short characteristics of each of the articles in the book. 1. Efficient distributed computation modulo a shared secret (Dario Catalano) The article concerns the subject of distributed computation. This is realized by the secret sharing protocols. The author presents several kinds of such protocols: additive sharing over Z or Z q , and polynomial sharing over Z or Z q. The mutual conversions among different secret sharing methods are presented. Then, the author considers the distributed modular reduction applying the Newton iteration method. These methods allow for approximating 1/p, where p is a prime number, in a distributive manner. Moreover, the conventional arithmeti-cal operations, such as adding and multiplication, are performed in a distributive manner. By combining the above ideas, the modular powering, inversion and computation a(mod p) is made through distributive computation. The joint generation of random values and the modular distributive arithmetic constitute, therefore, a sufficient background for applying the Miller-Rabin probabilistic primality tests, in order to generate the prime numbers in a distributive manner. This is the way, in which cryptographic systems might be generated in a distributive model. Consider, for example, the RSA cryptosystem. If two random primes are generated, we are able to compute their product. Then the encryption and decryption exponents are generated-the first one as a random shared secret and the other as the inverse in the modular arithmetic. In this manner the RSA system could be realized in a distributed way. In the similar manner other public key cryptosystems could be incorporated in distributive computational model. The distributive model for the RSA cryptosystem was realized for the first time by Boneh and Franklin in 1997. Catalano's article represents a good and elementary introduction in this area. Moreover, what is also important, the efficiency, communication costs and computational bounds for the presented protocols are considered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Special Issue on Cybernetics and Cognitive Informatics

—The three greatest theories in science and engineering developed in the 1940s are cybernetics, information theory, and systems theory. Cybernetics is the science of communication and control in humans, machines, organizations, and societies across the reductive hierarchy of neural, cognitive, functional, and logical levels. A contemporary form of cybernetics, known as cognitive informatics (CI...

متن کامل

The simple ideal cipher system

1 Prof. and Head of Department of appl. math and cybernetics Siberian State University of Telecommunication and Computer Science Head of Laboratory of data protection Institute of Computational Technology Siberian Branch of Russian Academy of Science Address : Siberian State University of Telecommunication and Computer Science Kirov str.86 Novosibirsk, 630102, Russia Tel: 007 383 2284938 Fax: 0...

متن کامل

Norbert Wiener's Cybernetic Critique of the Information Society -

In 1948 Norbert Wiener published his path-breaking book 'Cybernetics or Control and Communication in the Animal and the Machine' . This paper focusses on the chapter on 'information language and society'. The inderdependance betweeen communication, transmission of information and power becomes ever more important in the recent boost of the so-called information society. To appreciate the contin...

متن کامل

A NOTE ON THE AVERAGING METHOD FOR DIFFERENTIAL EQUATIONS WITH MAXIMA

Substantiation of the averaging method for differential equations with maxima is presented. Two theorems on substantiates for differential equations with maxima are established.

متن کامل

Reflexivity in Social Systems: the Theories of George Soros

George Soros’s reflexivity theory is quite compatible with second order cybernetics. Indeed his work shows how to apply ideas in second order cybernetics to economics, finance, and political science. This paper briefly reviews three theories of reflexivity in cybernetics. It provides an introduction to Soros’s version of reflexivity theory and reviews applications in economics and finance. Soro...

متن کامل

بررسی میزان کاربست مؤلفه‌های الگوی سایبرنتیک در مدیریت دانشگاه علوم پزشکی اصفهان در سال تحصیلی 1389– 1388

Introduction: Today, the universities leadership to adapt or adjust with complex and unknown phenomena are need until in its shadow, organizations to conduct by appropriate. The purpose of this research was to study the extent of application of cybernetic model indices at Isfahan University of Medical Sciences. Methods: A Research method was descriptive-survey that population consisted of all ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008