当前位置:首页  教学科研

学术讲座【Threshold Cryptography: Non-Homomorphic Cases】

时间:2013-07-24浏览:450设置

时间:2013年7月25日(周四)下午16:00

地点:仓山校区成功楼603室

主讲:新加坡南洋理工大学 王华雄教授

主办:数学与计算机科学学院

专家简介:Wang Huaxiong graduated from Fujian Normal University with a BSc in 1984 and a Master in 1989, both in Mathematics.  He then received a PhD in Mathematics from University of Haifa, Israel in 1996 and a PhD in Computer Science from University of Wollongong, Australia in 2001. He joined Nanyang Technological University in 2006 and is currently an associate professor in the Division of Mathematical Sciences. Prior to that, he held positions in several universities, including Macquarie University, Australia; City University, Hong Kong; University of Wollongong, Australia; National University of Singapore; Kobe University, Japan; Fujian Normal University, China.

    His research interests include cryptography, information security, coding theory, combinatorics and theoretical computer science. He was on the editorial boards of Designs, Codes and Cryptography (2006 -2011),  and is currently on the editorial boards of International Journal of Foundations of Computer Science, Journal of Communications (JCM) and Journal of Communications and Networks. He was the Program Co-Chair of 9th Australasian Conference on Information Security and Privacy (ACISP'04), Sydney, Australia, 2004 and 4th International Conference on Cryptology and Network Security (CANS05), Xiamen, China, 2005. He received the inaugural Award of Best Research Contribution awarded by the Computer Science Association of Australasia in 2004.

报告摘要:In threshold cryptography the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this talk we look at the application of threshold cryptography to symmetric primitives, and in particular the pseudo-random functions, the encryption or decryption of a symmetric key block cipher.

返回原图
/