My Account Log in

1 option

Identity-Based Encryption / by Sanjit Chatterjee, Palash Sarkar.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Chatterjee, Sanjit, author.
Sarkar, Palash, 1969- author.
Contributor:
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Language:
English
Subjects (All):
Data structures (Computer science).
Data encryption (Computer science).
Software engineering.
Coding theory.
Information theory.
Computer science--Mathematics.
Computer science.
Algebra.
Data Structures and Information Theory.
Cryptology.
Software Engineering.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Local Subjects:
Data Structures and Information Theory.
Cryptology.
Software Engineering.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Algebra.
Physical Description:
1 online resource (XI, 180 pages)
Edition:
First edition 2011.
Contained In:
Springer eBooks
Place of Publication:
New York, NY : Springer US : Imprint: Springer, 2011.
System Details:
text file PDF
Summary:
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Contents:
Introduction
Definitions and Notations
A Brief Background on Elliptic Curves and Pairings
Boneh-Franklin IBE and its Variants
Selective-Identity Model
Security Against Adaptive Chosen Ciphertext Attacks
IBE in Adaptive-Identity Model Without Random Oracles
Further IBE Constructions
IBEWithout Pairing
Applications, Extensions and Related Primitives
Avoiding Key Escrow
Products and Standards
Bibliography
Index.
Other Format:
Printed edition:
ISBN:
978-1-4419-9383-0
9781441993830
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account