Abstract
This paper presents a discussion and summary of results obtained jointly with K.Culik [1] and M.Nivat [2].
The idea of public key systems as applicable to information systems is reviewed. The development of information systems based on the new concept of encryption triple is outlined. Although the construction of encryption triples using number-theoretic tools is possible, systems of encryption triples obtained that way do not possess all properties desirable for designing information systems. As first step towards an alternative approach, regular bijections i.e. bijections definable by a-transducers are investigated, and a complete characterization of such bijections is given.
Preview
Unable to display preview. Download preview PDF.
References
Culik II, K. and Maurer, H.A., Secure information storage and retrieval using new results in cryptography. Information Processing Letters (to appear), also: Report 16, IIG Graz (1978).
Maurer, H.A. and Nivat, M., Rational bijections of rational sets. Report 29, IIG Graz (1979).
Diffie, W. and Hellman, M., New directions in cryptography. IEEE Transactions on Information Theory (1976), 644–654.
Rivest, R., Shamir, A. and Adelman, L., A method for obtaining digital signatures and public-key cryptosystems. C.ACM 21 (1978), 120–126.
Rivest, R., Private communication. (1978).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1979 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maurer, H.A. (1979). On some developments in cryptography and their applications to computer science. In: Bečvář, J. (eds) Mathematical Foundations of Computer Science 1979. MFCS 1979. Lecture Notes in Computer Science, vol 74. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-09526-8_9
Download citation
DOI: https://doi.org/10.1007/3-540-09526-8_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-09526-2
Online ISBN: 978-3-540-35088-0
eBook Packages: Springer Book Archive