As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each.
Table Of Contents
Introduction - Modern Cryptography. Cloud Computing. Digital Identity, Authentication, and Access Control. Privacy-Enhancing Technologies. Outline.; Fundamentals - Number Theory. Rings, Groups, Fields, and Lattices. Coding. Computational Complexity. Cryptographic Primitives and Security Models.; Protection of Identifying Information - Privacy Preserving Authentication. Anonymous Credential Systems. Privacy Preserving Disclosure of Data. Privacy Preserving Access to Resources.; Privacy-Enhancing Encryption - Access Control through Encryption. Computing on Encrypted Data.; Remote Data Storage - Remote Data Checking. Secure Data Deduplication. Searchable Encryption. Availability in the Cloud.; Practical Issues - The Role and Limits of Cryptography. Implementations and Standardization. Selected Clouds. Outlook.;