Recent Inventions and Challenges
Buch, Englisch, 302 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g
ISBN: 978-3-031-35537-0
Verlag: Springer International Publishing
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-changer for the industry and cloud industry. HE method in cloud computing is presented in this book as a solution to increase the security of the data. Moreover, this book provides details about the set of fundamentals of cryptography, classical HE systems, properties of HE schemes, challenges and opportunities in HE methods, key infrastructure, problem of key management, key sharing, current algorithmic strategies and its limitation in implementation for solving complex problems in financial cryptography, application in blockchain, multivariate cryptosystems based on quadratic equations to avoid the explosion of the coefficients.
Zielgruppe
Graduate
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Finanzsektor & Finanzdienstleistungen: Allgemeines
Weitere Infos & Material
Chapter 1.- Introduction to Homomorphic Encryption for Financial Cryptography.- Chapter 2.- Survey on Homomorphic Encryption for Financial Cryptography Workout.- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication.- Chapter 4 Securing shared data based on Homomorphic encryption schemes.- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography.- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance.- Chapter 7 Enhancing Encryption Security against Cypher Attacks.- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications.- Chapter 9 Financial Cryptography and its application in Blockchain.- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms.- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption.- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme.