ABSTRACT

In this chapter, the authors introduce a selection of further topics of interest to cryptographers, including Paillier encryption; identity-based encryption; copyright protection utilizing tracing techniques; and blockchain technology. The use of public-key cryptography requires a mechanism to authenticate public keys. One significant advantage of identity-based cryptography is that it removes the need for certificates. The Boneh-Franklin Identity-based Cryptosystem is an example of pairing-based cryptography, in which a pairing on an elliptic curve is used in the construction of various types of cryptographic schemes. The Paillier Cryptosystem is an RSA-like cryptosystem that has an interesting homomorphic property. Protection against copyright violation is an important, but very difficult, challenge in the Internet age. Digital content can easily be copied and transmitted over computer networks. Hardware-based solutions, such as tamper-resistant hardware, for example, can provide a limited amount of protection. The authors discusses several of the technical aspects of blockchain technology, which is used in cryptocurrencies such as BITCOIN.