buchspektrum Internet-Buchhandlung

Neuerscheinungen 2014

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Sanjit Chatterjee, Palash Sarkar (Beteiligte)

Identity-Based Encryption


2011. 2014. xi, 180 S. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER US; SPRINGER 2014
ISBN: 1-489-99697-4 (1489996974)
Neue ISBN: 978-1-489-99697-8 (9781489996978)

Preis und Lieferzeit: Bitte klicken


This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Introduction.- Definitions and Notations.- A Brief Background on Elliptic Curves and Pairings.- Boneh-Franklin IBE and its Variants.- Selective-Identity Model.- Security Against Adaptive Chosen Ciphertext Attacks.- IBE in Adaptive-Identity Model Without Random Oracles.- Further IBE Constructions.- IBEWithout Pairing.- Applications, Extensions and Related Primitives.- Avoiding Key Escrow.- Products and Standards.- Bibliography.- Index
From the reviews:

"The book gives an overview of the most important Identity-Based Encryption (IBE) schemes. ... For most of the considered IBE methods the authors provide also proofs of security reductions. The book has an extensive bibliography and can be used as an introduction to IBE in post-graduate courses." (Jaak Henno, Zentralblatt MATH, Vol. 1218, 2011)

"This book addresses a variety of approaches to identity-based encryption (IBE), along with their constructions and security aspects. ... The book could also serve as a textbook for a course on IBE. For new researchers, the book is a good survey of IBE. Professionals who are trying to design an encryption solution will find it to be a good source on the underlying mathematics." (Maulik A. Dave, ACM Computing Reviews, July, 2012)