Normal view MARC view ISBD view

Introduction to certificateless cryptography

By: Xiong, Hu
Title By: Qin, Zhen, 1982- | Vasilakos, Athanasios V
Material type: BookPublisher: Boca Raton : CRC Press, c2017.Description: xxiii, 314 p. : ill. ; 24 cm.ISBN: 9781482248609Subject(s): Public key infrastructure (Computer security) | Public key cryptography | Identification | Data encryption (Computer science) | Computer networks -- Security measuresDDC classification: 005.8/2 Online resources: Location Map
Summary:
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.82 XI IN (Browse shelf) Available T0055042
Total holds: 0

Includes bibliographical references and index.

Setting the Stage Avoiding key escrow Mathematical concepts and properties CL-PKC without Random Oracles Concrete constructions of CLE Generic construction of CLE CLS secure in the standard model CL-PKC in the Random Oracle Models The random oracle model CLE, CLS and CL-AKE secure in the random oracle model CL-PKC without parings Applications, Extensions and Related Primitives Applications of CL-PKC Extensions of CL-PKC Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC Future Directions Perspectives.

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Powered by Koha