Identity-Based Encryption
Seiten
2011
Springer-Verlag New York Inc.
978-1-4419-9382-3 (ISBN)
Springer-Verlag New York Inc.
978-1-4419-9382-3 (ISBN)
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Introduction.- Definitions and Notations.- A Brief Background on Elliptic Curves and Pairings.- Boneh-Franklin IBE and its Variants.- Selective-Identity Model.- Security Against Adaptive Chosen Ciphertext Attacks.- IBE in Adaptive-Identity Model Without Random Oracles.- Further IBE Constructions.- IBEWithout Pairing.- Applications, Extensions and Related Primitives.- Avoiding Key Escrow.- Products and Standards.- Bibliography.- Index
Zusatzinfo | XI, 180 p. |
---|---|
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Mathematik ► Algebra | |
ISBN-10 | 1-4419-9382-7 / 1441993827 |
ISBN-13 | 978-1-4419-9382-3 / 9781441993823 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Wie Geheimdienste und Kriminelle uns im Netz infiltrieren
Buch | Hardcover (2023)
Wiley-VCH (Verlag)
24,99 €
eine praktische Einführung
Buch | Softcover (2023)
Springer Vieweg (Verlag)
44,99 €
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
19,99 €