Introduction to certificateless cryptography
By: Xiong, Hu
Title By: Qin, Zhen | Vasilakos, Athanasios V
Material type:![](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.82 XI IN (Browse shelf) | Available | T0055042 |
, Shelving location: Main Collection Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 TU TO Tutorials on the foundations of cryptography : | 005.82 WA MA Mathematical foundations of public key cryptography | 005.82 XI DY Dynamic secrets in communication security / | 005.82 XI IN Introduction to certificateless cryptography | 005.822 ST NE Network security essentials : | 005.823 BE PA Pattern and security requirements : | 005.824 ES SE Essentials of blockchain technology |
Includes bibliographical references and index.
Setting the Stage Avoiding key escrow Mathematical concepts and properties CL-PKC without Random Oracles Concrete constructions of CLE Generic construction of CLE CLS secure in the standard model CL-PKC in the Random Oracle Models The random oracle model CLE, CLS and CL-AKE secure in the random oracle model CL-PKC without parings Applications, Extensions and Related Primitives Applications of CL-PKC Extensions of CL-PKC Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC Future Directions Perspectives.
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.