Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.
Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.
Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Author(s): Kefei Chen
Series: The Springer International Series in Engineering and Computer Science
Edition: 1
Publisher: Springer
Year: 2004
Language: English
Pages: 263
Cover......Page 1
Contents......Page 8
Foreword......Page 12
Preface......Page 14
Randomness and Discrepancy Transforms......Page 18
Legendre Sequences and Modified Jacobi Sequences......Page 26
Resilient Functions with Good Cryptographic Properties......Page 34
Differential Factoring for Integers......Page 42
Simple and Efficient Systematic A-codes from Error Correcting Codes......Page 50
On Coefficients of Binary Expression of Integer Sums......Page 62
A new publicly verifiable proxy signcryption scheme......Page 70
Some New Proxy Signature Schemes from Pairings......Page 76
Construction of Digital Signature Schemes Based on DLP......Page 84
DLP-based blind signatures and their application in E-Cash systems......Page 90
A Group of Threshold Group-Signature Schemes with Privilege Subsets......Page 98
A New Group Signature Scheme with Unlimited Group Size......Page 106
Identity Based Signature Scheme Based on Quadratic Residues......Page 114
New Signature Scheme Based on Factoring and Discrete Logarithms......Page 124
New Transitive Signature Scheme based on Discreted Logarithm Problem......Page 130
Blind signature schemes based on GOST signature......Page 140
One-off Blind Public Key......Page 146
Analysis on the two classes of Robust Threshold Key Escrow Schemes......Page 154
Privacy-Preserving Approximately Equation Solving over Reals......Page 162
An Authenticated Key Agreement Protocol Resistant to DoS attack......Page 168
A comment on a multi-signature scheme......Page 174
Cryptanalysis of LKK Proxy Signature......Page 178
Attack on Identity-Based Broadcasting Encryption Schemes......Page 182
Differential-Linear Cryptanalysis of Camellia......Page 190
Security Analysis of EV-DO System......Page 198
A Remedy of Zhu-Lee-Deng's Public Key Cryptosystem......Page 204
Quantum cryptographic algorithm for classical binary information......Page 212
Practical Quantum Key Distribution Network......Page 218
A Survey of P2P Network Security Issues based on Protocol Stack......Page 226
DDoS Scouter: A simple IP traceback scheme......Page 234
A Method of Digital Data Transformation¨CBase91......Page 246
An approach to the formal analysis of TMN protocol......Page 252