Cargando…

Cryptography : protocols, design, and applications /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Lek, Kamol, Rajapakse, Naruemol
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hauppauge, N.Y. : Nova Science Publishers, [2012]
Colección:Cryptography, steganography and data security.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY; Abstract; 1. Introduction; 1.1. Historical Background; 1.2. Quantum Information Theory; 1.3. Emerging Quantum Influences ; 2. Private Communication on the Quantum Channel; 2.1. The Private Quantum Channel; 2.2. The Private Capacity of a Quantum Channel; 2.3. The Non-additivity of Private Information; 3. Quantum Bit Commitment.
  • 3.1. History of Quantum Bit Commitment3.2. Description of Quantum Bit Commitment; 3.3. Security of the Bit Commitment Protocol; 4. Quantum Oblivious Transfer; 4.1. History of Quantum Oblivious Transfer; 5. Quantum Fingerprinting; 5.1. History of Quantum Fingerprinting; 5.2. Description of Quantum Fingerprinting; 6. Quantum Digital Signatures; 6.1. History of Quantum Digital Signatures; 6.2. Description of Quantum Digital Signatures; 7. Quantum Authentication; 7.1. Description of Quantum Authentication; 8. Uncloneable Quantum Encryption and QuantumAuthentication.
  • 8.1. Description of Uncloneable Quantum Encryption8.2. Security of the Uncloneable Quantum Encryption Scheme; 9. Quantum Secret Sharing; 9.1. Description of Quantum Secret Sharing; 9.2. Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. The Quantum Public Key Scheme; 10.1. History of Quantum Public Key Scheme; 10.2. Description of Quantum Public Key Scheme; 10.3. Security of the Quantum Public Key Protocol; 10.4. Eve's Attack on the Quantum Public Key Method; 10.5. Behind the Security of the Quantum Public Key Protocol.
  • 11. Quantum Money11.1. History of Quantum Money; 11.2. Description of Quantum Money; 11.3. New Models of Quantum Money; 12. Conclusions; 13. Further Reading; Author Biographies; References; Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS; Introduction; Lightweight Mutual Authentication Protocols; The Karthikeyan and Nesterenko Protocol; The Duc et al. Protocol; The Chien and Chen Protocol; The Li et al. Protocol; The Chien and Huang Protocol; The Chen and Deng Protocol; The Qingling et al. Protocol; The Sun and Ting Protocol; Ultralightweight Mutual Authentication Protocols.
  • The M2AP, EMAP, and LMAP ProtocolsThe Strong Authentication and Strong Integrity (SASI) Protocol; The Gossamer Protocol; Associated Protocols; Summary; References; Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES; Abstract; 1. Introduction; 2. Related Works; 2.1. (2, 2) VSSM Schemes; 2.2. (k, n)-m-VSSM Schemes; 3. Encryption Algorithm; 3.1. (2, 2)-2-VSSM Schemes; 3.2. Refine the Recovered Images; 4. Implementation Results and Security Analysis; 4.1. Performance Evaluations; 4.2. Security Analysis; 4.3. Comparison with Previous Approach; 5. Conclusion; References.