Cantitate/Preț
Produs

Introduction to Certificateless Cryptography

Autor Hu Xiong, Zhen Qin, Athanasios V Vasilakos
en Limba Engleză Hardback – 23 aug 2016
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
Citește tot Restrânge

Preț: 49617 lei

Preț vechi: 75531 lei
-34% Nou

Puncte Express: 744

Preț estimativ în valută:
8780 10296$ 7711£

Comandă specială

Livrare economică 19 ianuarie-02 februarie 26

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781482248609
ISBN-10: 1482248603
Pagini: 340
Ilustrații: 43
Dimensiuni: 157 x 234 x 23 mm
Greutate: 0.57 kg
Ediția:1
Editura: CRC Press

Public țintă

Academic and Professional Practice & Development

Cuprins

Setting the Stage. Avoiding key escrow Mathematical concepts and properties. CL-PKC without Random Oracles. Concrete constructions of CLE Generic construction of CLE. CLS secure in the standard model. CL-PKC in the Random Oracle Models. The random oracle model. CLE, CLS and CL-AKE secure in the random oracle model. CL-PKC without parings. Applications, Extensions and Related Primitives. Applications of CL-PKC. Extensions of CL-PKC. Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC. Future Directions. Perspectives.

Notă biografică

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

Descriere

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.