Identity-based cryptography /

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-b...

Full description

Saved in:
Bibliographic Details
Other Authors: Joye, Marc, 1969-, Neven, Gregory.
Format: eBook
Language:English
Published: Amsterdam ; Boston : IOS Press, ©2009.
Series:Cryptology and information security series ; v. 2.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 05181cam a2200649Ia 4500
001 mig00005406026
003 OCoLC
005 20210517060823.9
006 m o d
007 cr cn|||||||||
008 081220s2009 ne a ob 001 0 eng d
010 |z  2008940895 
019 |a 191037344  |a 318062615  |a 437122425  |a 491253321  |a 613309588  |a 613708758  |a 697516216  |a 712982422  |a 722712072  |a 728054637  |a 961555259  |a 962676747  |a 988453383  |a 991990578  |a 1037937355  |a 1038604354  |a 1045481321  |a 1055380523  |a 1066560324  |a 1081216059  |a 1153525901  |a 1228550833 
020 |a 9781607503897 
020 |a 1607503891 
020 |a 9781441605528  |q (electronic bk.) 
020 |a 1441605525  |q (electronic bk.) 
020 |a 9781597345903  |q (electronic bk.) 
020 |a 1597345903  |q (electronic bk.) 
020 |z 1586039474 
020 |z 9781586039479 
035 |a (OCoLC)646807197  |z (OCoLC)191037344  |z (OCoLC)318062615  |z (OCoLC)437122425  |z (OCoLC)491253321  |z (OCoLC)613309588  |z (OCoLC)613708758  |z (OCoLC)697516216  |z (OCoLC)712982422  |z (OCoLC)722712072  |z (OCoLC)728054637  |z (OCoLC)961555259  |z (OCoLC)962676747  |z (OCoLC)988453383  |z (OCoLC)991990578  |z (OCoLC)1037937355  |z (OCoLC)1038604354  |z (OCoLC)1045481321  |z (OCoLC)1055380523  |z (OCoLC)1066560324  |z (OCoLC)1081216059  |z (OCoLC)1153525901  |z (OCoLC)1228550833 
035 0 0 |a ocm00000001wrldshrocn646807197 
037 |a 978-1-58603-947-9  |b IOS Press  |n http://www.iospress.nl 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d IOSPR  |d EBLCP  |d IDEBK  |d OCLCQ  |d YDXCP  |d N$T  |d CDX  |d OCLCQ  |d FVL  |d OCLCQ  |d ALAUL  |d OCLCQ  |d OCLCF  |d OCLCQ  |d DEBSZ  |d MERUC  |d OCLCQ  |d OCLCA  |d OCLCQ  |d AZK  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d OCLCQ  |d JBG  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d WRM  |d VTS  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d UKCRE  |d AJS 
049 |a TXMM 
050 4 |a QA76.9.A25  |b I3394 2009eb 
082 0 4 |a 005.8/2  |2 22 
245 0 0 |a Identity-based cryptography /  |c edited by Marc Joye and Gregory Neven. 
260 |a Amsterdam ;  |a Boston :  |b IOS Press,  |c ©2009. 
300 |a 1 online resource (viii, 263 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Cryptology and information security series,  |x 1871-6431 ;  |v v. 2 
504 |a Includes bibliographical references (pages 245-262) and index. 
505 0 |a Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others]. 
520 |a Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description. 
588 0 |a Print version record. 
590 |a EBSCO eBook Academic Comprehensive Collection North America 
650 0 |a Data encryption (Computer science) 
650 0 |a Public key cryptography. 
650 0 |a Computer security. 
650 0 |a Computer science. 
700 1 |a Joye, Marc,  |d 1969- 
700 1 |a Neven, Gregory. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |t Identity-based cryptography.  |d Amsterdam ; Boston : IOS Press, ©2009  |w (DLC) 2008940895 
830 0 |a Cryptology and information security series ;  |v v. 2.  |x 1871-6431 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=269152  |z CONNECT  |3 EBSCO  |t 0 
907 |a 4680624  |b 05-23-21  |c 07-02-20 
998 |a wi  |b 05-23-21  |c m  |d z   |e -  |f eng  |g ne   |h 0  |i 2 
994 |a 92  |b TXM 
999 f f |i 8da21e35-2fa5-4e31-8bc7-81433a20ad65  |s c6385c6c-dbc1-43c7-af80-8e3ada6560d1  |t 0 
952 f f |t 1  |e QA76.9.A25 I3394 2009eb  |h Library of Congress classification 
856 4 0 |3 EBSCO  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=269152  |z CONNECT