آہ! پروفیسر ضیاء الحسن فاروقی
پروفیسر ضیاء الحسن فاروقی کے انتقال کی خبر یکم اگست کو ۱۲ بجے شب میں سنی تو یقین نہیں ہوا، علی الصباح جناب عبداللطیف اعظمی کو فون کیا گیا تو انہوں نے بتایا کہ یہ حادثہ جاں کاہ ۳۰؍ جولائی کی شب میں پیش آیا اور ۳۱؍ کو دوپہر بعد تدفین ہوئی، میرے لیے یہ خبر ناقابل برداشت تھی، اپنے دل کا بوجھ ہلکا کرنے کے لیے ان کے دونوں صاحبزادوں کو خطوط لکھے، اس پر بھی تاب لائے نہ بنی تو ۸؍ اگست کو دہلی ان کے دولت کدہ پر تعزیت کے لیے حاضر ہوا، لیکن اب بھی تسکین دلِ محزوں نہیں ہورہی ہے اور بے چینی اور اضطراب کا وہی عالم ہے۔
مجھ سے پوچھو نہ مزاج دل نا شاد ابھی
میرے نغموں میں ہے کچھ تلخی فریاد ابھی
ابھی ۱۸؍ جولائی کو مجلس تحقیقات و نشریات لکھنو کے جلسے میں ان سے ملاقات ہوئی تھی تو میں نے عرض کی تھی کہ اعظم گڈھ تشریف لے چلیں، پہلے تو حسب عادت مسکرائے پھر کہا ۲۰؍ کودہلی واپسی کا ریزرویشن کراچکا ہوں، میں ڈھائی بجے دن میں ان سے رخصت ہونے لگا تو یہ کہہ کر مجھے روکنا چاہا کہ ’’ارے بڑی سخت دھوپ ہے‘‘۔
ٹھہر بھی جا در ساقی پہ دو گھڑی کے لیے
تمام عمر پڑی ہے رداروی کے لیے
مگرمیں یہ اشارہ غیبی نہ سمجھ سکا کہ چند روز بعد کبھی نہ واپس ہونے والے سفر سے ان کا ریزرویشن ہوچکا ہے اور اپنی دھن میں روانہ ہوگیا، مجھے کیا خبر تھی کہ ع انیس دم کا بھروسہ نہیں ٹھہر جاؤ۔ اور بس عالم ناسوت میں یہ ان سے آخری ملاقات ہے، اس کے بعد ان کا روئے روشن اور رخِ زیبا دیکھنا نصیب نہ ہوگا، اور صرف حسرت ہی حسرت رہ جائے گی۔
حیف در چشم...
Abstract By preserving and narrating hadīth, a chain of narrators was started to maintain its authenticity. When the experts of hadīth realized that some unreliable transmitters might try to fabricate Hadīth, this work started more systematically. Even the chain gradually attained such importance that every Muhaddīth was concerned much about it. In the second century of Hijra, when the teaching and learning of hadīth became the standard of honor and great respect, some people devoted their lives to this work. They travelled to many countries of world and obtained the knowledge of Hadīth from prominent scholars of their time. Experts of Asmā-ul-Rijāl awarded them the certificate of holding the highest position of trust and credibility. The chains having such trustworthy transmitters are considered to be of higher rank than others. Among such traditions there is also one "Mālik-an-Nāfi'-an-Ibn-e-Umar". Due to the reliability of its narrators, Imām Bukhāri and many other Muhaddithīn considered it as "golden chain". When some of the Orientalists started raising objections to the Prophetic Hadīth, they criticized the narrators of the Hadīth as well. Especially the narrators who were declared trustworthy and reliable by Muslim scholars. For this, they especially criticized Abu Hūraira from among the companions and Imām Zuhri among the Successors. The chain of hadīth, (Mālik an-Nāfi' an-Ibn e Umar) “golden chain” was also seriously criticized by Joseph Schacht and Juynboll etc. In this article, a comparative study of the viewpoints of the Muhaddithīn and the Orientalists regarding the chain “Mālik an-Nāfi' an-Ibn eUmar” is presented.
Multicast is an efficient means of information dissemination to a set of nodes. It has low utilization of bandwidth and communication resources as compare to unicast. Secure multicast preserves confidentiality and authenticity of information to legitimate group members, adopted in emerging commercialization of wireless applications. Elliptic curves cryptography has promising industrial attraction. National Security Agency (NSA) of USA purchased license of ECC from Certicom. It will use ECC in its cryptographic modernization initiative, which aims to replace about 1.3 million existing security equipments over the next 10 years. Public Key Infrastructure (PKI) is the most popular centralized and hierarchical infrastructure, consists of trusted third parties registration authority and certificate authority and provides solution for proving authenticity of public keys. Multi receiver signcryption ensure confidential and authenticated dissemination of information to multicast group member instead of multi recipient encryption and digital signature. It is attractive for stateful secure multicast to distribute and update session keys and stateless secure multicast to disseminate multicast messages. In this thesis, we proposed six multi-receiver signcryption schemes on elliptic curve in PKI setting. First, multi-receiver signcryption scheme has functionalities of confidential and authenticated multicast session key agreement and instant secure message communication. It is efficient in term of computation and communication cost and suitable for secure multicast communication. Second, multi receiver signcryption with forward secrecy has additional functionality of forward secrecy of messages. It ensures confidentiality even if an attacker has stolen the sender private key. Its low communication overhead could make this construction a better option for use in resource constrained secure multicast communication. xvii Third, multi receiver signcryption for firewalls has additional functionality of encrypted message authentication. It enables firewall to verify encrypted message without disclosing message contents and obtaining any secret parameter from the participants. In case of dispute judge can also verify the authenticity of ciphertext and solve the dispute with obtaining any secret parameter from the participants. Its security attributes and cost effectiveness makes it suitable choice for efficient and secure multicast firewalls applications. Fourth, generalized multi receiver signcryption scheme based on elliptic curves has functionality of digital signature or multi receiver encryption or multi receiver signcryption with single algorithm. Fifth, blind multi receiver signcryption scheme has additional functionality of sender anonymity. It has significance in applications as privacy preserving multicast communication; electronic voting and payment system to protect the sender privacy and guarantees the freedom of thoughts and freedom of opinion. Sixth, proxy multi receiver signcryption scheme has functionality of designated a proxy agent, who makes multicast communication on the behalf of original user. It has applications in privilege delegation mechanism, an essential service in modern enterprises and organizations to extend and operate business via designated agent due to temporal absence, lack of time or processing capability.