Introduction to Certificateless Cryptography
Autor Hu Xiong, Zhen Qin, Athanasios V Vasilakosen Limba Engleză Hardback – 23 aug 2016
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
Preț: 496.17 lei
Preț vechi: 755.31 lei
-34% Nou
Puncte Express: 744
Preț estimativ în valută:
87.80€ • 102.96$ • 77.11£
87.80€ • 102.96$ • 77.11£
Comandă specială
Livrare economică 19 ianuarie-02 februarie 26
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781482248609
ISBN-10: 1482248603
Pagini: 340
Ilustrații: 43
Dimensiuni: 157 x 234 x 23 mm
Greutate: 0.57 kg
Ediția:1
Editura: CRC Press
ISBN-10: 1482248603
Pagini: 340
Ilustrații: 43
Dimensiuni: 157 x 234 x 23 mm
Greutate: 0.57 kg
Ediția:1
Editura: CRC Press
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Setting the Stage. Avoiding key escrow Mathematical concepts and properties. CL-PKC without Random Oracles. Concrete constructions of CLE Generic construction of CLE. CLS secure in the standard model. CL-PKC in the Random Oracle Models. The random oracle model. CLE, CLS and CL-AKE secure in the random oracle model. CL-PKC without parings. Applications, Extensions and Related Primitives. Applications of CL-PKC. Extensions of CL-PKC. Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC. Future Directions. Perspectives.
Notă biografică
Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Descriere
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.