Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Algebraic curves in cryptography - MaRDI portal

Algebraic curves in cryptography (Q2839869)

From MaRDI portal





scientific article; zbMATH DE number 6187989
Language Label Description Also known as
English
Algebraic curves in cryptography
scientific article; zbMATH DE number 6187989

    Statements

    0 references
    0 references
    0 references
    15 July 2013
    0 references
    Algebraic curves
    0 references
    higher genus
    0 references
    cryptography
    0 references
    Elliptic curves
    0 references
    secret sharing schemes
    0 references
    authentication codes
    0 references
    frameproof codes
    0 references
    key distribution schemes
    0 references
    broadcast encryption
    0 references
    and sequences
    0 references
    Algebraic curves in cryptography (English)
    0 references
    This is a self-contained book intended for researchers and graduate students in mathematics and computer science interested in different topics in cryptography involving algebraic curves, although the lack of exercises makes this book more suitable for researchers.NEWLINENEWLINEAlgebraic curves are the main ingredient in elliptic curve cryptography (ECC), which is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization.NEWLINENEWLINEMost of the literature involving both algebraic curves and cryptography is focused on ECC , but algebraic curves goes far beyond elliptic curve or public key cryptography. The authors of this book make an exhaustive review on some other topics where algebraic curves, mainly in higher genus, are important as well. After three introductory chapters, they address the problems in secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. It is worthwhile to mention that algebraic curves come up essentially (but not only) as an application of algebraic geometric codes to every topic.NEWLINENEWLINETable of contents:NEWLINENEWLINE1) \textit{Introduction to Algebraic Curves}; 1.1) Plane Curves. 1.2) Algebraic Curves and Their Function Fields. 1.3) Smooth Curves. 1.4) Riemann-Roch Theorem. 1.5) Rational Points and Zeta Functions.NEWLINENEWLINENEWLINE2) \textit{Introduction to Error-Correcting Codes}: 2.1) Introduction. 2.2) Linear Codes. 2.3) Bounds. 2.4) Algebraic Geometry Codes. 2.5) Asymptotic Behavior of Codes.NEWLINENEWLINE 3) \textit{Elliptic Curves and Their Applications to Cryptography}: 3.1) Basic Introduction. 3.2) Maps between Elliptic Curves. 3.3) The Group \(E(\mathbb F_q)\) and Its Torsion Subgroups. 3.4) Computational Considerations on Elliptic Curves. 3.5) Pairings on an Elliptic Curve. 3.6) Elliptic Curve CryptographyNEWLINENEWLINENEWLINE4) \textit{Secret Sharing Schemes}: 4.1) The Shamir Threshold Scheme. 4.2) Other Threshold Schemes. 4.3) General Secret Sharing Schemes. 4.4) Information Rate. 4.5) Quasi-Perfect Secret Sharing Schemes. 4.6) Linear Secret Sharing Schemes. 4.7) Multiplicative Linear Secret Sharing Schemes. 4.8) Secret Sharing from Error-Correcting Codes. 4.9) Secret Sharing from Algebraic Geometry CodesNEWLINENEWLINENEWLINE5) \textit{Authentication Codes}: 5.1) Authentication Codes. 5.2) Bounds of A-Codes. 5.3) A-Codes and Error-Correcting Codes. 5.4) Universal Hash Families and A-Codes. 5.5) A-Codes from Algebraic Curves. 5.6) Linear Authentication CodesNEWLINENEWLINENEWLINE6) \textit{Frameproof Codes}: 6.1) Introduction. 6.2) Constructions of Frameproof Codes without Algebraic Geometry. 6.3) Asymptotic Bounds and Constructions from Algebraic Geometry. 6.4) Improvements to the Asymptotic BoundNEWLINENEWLINENEWLINE7) \textit{Key Distribution Schemes}: 7.1) Key Predistribution. 7.2) Key Predistribution Schemes with Optimal Information Rates. 7.3) Linear Key Predistribution Schemes. 7.4) Key Predistribution Schemes from Algebraic Geometry. 7.5) Key Predistribution Schemes from Cover-Free Families. 7.6) Perfect Hash Families and Algebraic GeometryNEWLINENEWLINENEWLINE8) \textit{Broadcast Encryption and Multicast Security}: 8.1) One-Time Broadcast Encryption. 8.2) Multicast Re-Keying Schemes. 8.3) Re-Keying Schemes with Dynamic Group ControllersNEWLINENEWLINE8.4) Some Applications from Algebraic GeometryNEWLINENEWLINENEWLINE9) \textit{Sequences}: 9.1) Introduction. 9.2) Linear Feedback Shift Register Sequences. 9.3) Constructions of Almost Perfect Sequences. 9.4) Constructions of Multisequences. 9.5) Sequences with Low Correlation and Large Linear Complexity.
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references