Introduction to Certificateless Cryptography

Regular price €102.99
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Athanasios V. Vasilakos
A01=Hu Xiong
A01=Zhen Qin
Adversary A1
Age Group_Uncategorized
Age Group_Uncategorized
Author_Athanasios V. Vasilakos
Author_Hu Xiong
Author_Zhen Qin
automatic-update
Bilinear Pairing
Category1=Non-Fiction
Category=PBW
Category=URY
CDH Assumption
CDH Problem
certificateless encryption protocol applications
Challenge Ciphertext
computational
COP=United States
cryptographic security models
Delivery_Delivery within 10-20 working days
diffie-hellman
Discrete Logarithm Problem
elliptic curve cryptography
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Existential Unforgeability
graduate level cryptography
Hash Function H1
IBE
Identity Id
identity-based encryption systems
key
Key Agreement Protocol
Key Escrow Problem
Language_English
Master Secret Key
mathematical proof techniques
model
oracle
PA=Available
partial
Partial Private Key
Price_€50 to €100
private
Private Key
problem
PS=Active
public
Public Key
Public Key Encryption Scheme
public key infrastructure
random
Random Oracle
Random Oracle Model
Secret Key
Session Key
softlaunch
Super Type
User Secret Key
User's Public Key
User’s Public Key
WBAN

Product details

  • ISBN 9781482248609
  • Weight: 630g
  • Dimensions: 156 x 234mm
  • Publication Date: 23 Aug 2016
  • Publisher: Taylor & Francis Inc
  • Publication City/Country: US
  • Product Form: Hardback
  • Language: English
Secure checkout Fast Shipping Easy returns

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

More from this author