Linkable Group Signature for Auditing Anonymous Communication

Author(s):  
Haibin Zheng ◽  
Qianhong Wu ◽  
Bo Qin ◽  
Lin Zhong ◽  
Shuangyu He ◽  
...  
Author(s):  
Haojia Zhu ◽  
Can Cui ◽  
Fengyin Li ◽  
Zhongxing Liu ◽  
Quanxin Zhang

2012 ◽  
Vol 3 (5) ◽  
pp. 82-84
Author(s):  
Reshna Wilson ◽  
◽  
Biju Balakrishnan

2011 ◽  
Vol 22 (10) ◽  
pp. 2358-2371 ◽  
Author(s):  
Lu ZHANG ◽  
Jun-Zhou LUO ◽  
Ming YANG ◽  
Gao-Feng HE

2010 ◽  
Vol 20 (7) ◽  
pp. 1977-1985
Author(s):  
Ling-Bo WEI ◽  
Chuan-Kun WU ◽  
Ting-Ge ZHU

2011 ◽  
Vol 31 (3) ◽  
pp. 790-792
Author(s):  
Yan YUAN ◽  
Guang-xing CAI

Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Author(s):  
Huiying Hou ◽  
Jianting Ning ◽  
Yunlei Zhao ◽  
Robert Deng

Sign in / Sign up

Export Citation Format

Share Document