Talk about the IT industry, analyze the frontier technology of Information security

Source: Internet
Author: User


Now answer this question from the theory and technique of biased public key cryptography. But for other things, you can find some direction from the conference proceedings I have provided. If you want to know all the latest research advances in cryptography, you can refer to the conference and journal papers in the top conferences and periodicals recommended by the Chinese Computer Society (CCF), which correspond to the network and Information Security section. Thank you for your ideas website:http://www.ijiami.cn/appprotect_encrypt_way


The latest research direction of cryptography theory can be reflected in the papers of the three major cryptography conferences, and the three meetings are Crypto,eurocrypt and Asiacrypt respectively. Next, depending on the theoretical direction there are different top-level conferences, such as the TCC of the Pure Cryptography theory (Theory of cryptography), the PKC (Public key cryptography), the application of cryptography Esorics, Fast encrypted FSE, physical security Acsac and so on.
The top conferences for cryptography applications are ccs,security and privacy and Usenix Security. According to different application requirements, there are also security-related papers in conferences in different computer fields. such as the Infocom,mobicom,sigcomm in the field of communications, the three major conferences, database SIGMOD,VLDB,ICDE and so on. After all, information security is all-encompassing, the field of computer-related data has gradually appeared the research direction of security class.
Back to the point: the research direction of public key cryptography and representative figures. The basic theory of public-key cryptography is now largely monopolized by several people, and they have all kinds of cooperation with each other. I am not going to introduce the basic concepts of various fields here, because it is too cumbersome and abstract to define. I only give nouns, interested friends can expand to search.
Traditional public-key cryptography, known as Rsa,elgamal encryption and signatures, has been the result of research 30 years ago. The current research content of traditional public key cryptography is mainly focused on the construction of cryptographic schemes of choosing ciphertext security (chosen ciphertext). The Huang in this area are Cramer and Shoup. Subsequently, a variety of security solutions to meet such requirements were raised. Recently, about 2007 onwards, scholars are selective opening security's public key cryptography scheme. Because there is no authoritative translation of this noun, I dare not turn it over. The authority of this field is Bellare. It is noteworthy that in this field, Chinese scholar Junzuo Lai published a paper on the Eurocrypt 2014, which is a very important thing to celebrate in the National Cryptography circle.
Next is the function encryption (functional encryption). The previous basis for function encryption is the dual-line response (bilinear map), which has now been extended, which I'll say later. The leader of function cryptography is Professor Boneh of Stanford University, which I admire very much. Boneh basically dominates public-key cryptography, and many of the representatives behind it are his students or students. He first proposed the identity-based encryption (identity-based encryption), and then he and his students worked together on a number of cryptographic schemes with multiple functions, eventually unifying them and defining them for function encryption. In function encryption, an interesting encryption scheme is attribute-based encryption (attribute-based encryption), which is a kind of encryption scheme which is more practical in the security of existing cloud storage, so it is listed separately. The representative character of this sub-field is waters.
Previous respondents said searchable encryption (searchable encryption). This encryption is divided into single-key searchable encryption and public-key searchable encryption. I don't know much about single-key, public-key searchable encryption is a special case of function encryption, called ciphertext properties hidden encryption (ciphertext attribute hiding encryption), so I'm not a single-column direction. It is important to note that the Boneh is also the author of the public key searchable encryption.
This is followed by homomorphic encryption. This is a cryptographic mode that may change the development of a computer. The author of Homomorphic cryptography is gentry, a student of Boneh, but I feel he has pupil surpasses. Homomorphic cryptography is now based on lattice cryptography (lattice based cryptography). Now, on the one hand, the researcher further constructs the more efficient homomorphic encryption scheme, and on the other hand, turns to the new cryptography tool: The structure and application of the multi-linear pair (Multilinear map). This is the hottest research direction for public-key cryptography now. Some people will say why not mention the signature (signature)? Now the signature scheme has been fused into function encryption. In fact, there are already general constructs of the signature scheme based on function cryptography. The function encryption which satisfies the condition can be converted into the equivalent signature scheme.

Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

Talk about the IT industry, analyze the frontier technology of Information security

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.