Identity-based cryptography /
Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-b...
Saved in:
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Amsterdam ; Boston :
IOS Press,
©2009.
|
Series: | Cryptology and information security series ;
v. 2. |
Subjects: | |
Online Access: | CONNECT CONNECT |
LEADER | 05181cam a2200649Ia 4500 | ||
---|---|---|---|
001 | mig00005406026 | ||
003 | OCoLC | ||
005 | 20210517060823.9 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 081220s2009 ne a ob 001 0 eng d | ||
010 | |z 2008940895 | ||
019 | |a 191037344 |a 318062615 |a 437122425 |a 491253321 |a 613309588 |a 613708758 |a 697516216 |a 712982422 |a 722712072 |a 728054637 |a 961555259 |a 962676747 |a 988453383 |a 991990578 |a 1037937355 |a 1038604354 |a 1045481321 |a 1055380523 |a 1066560324 |a 1081216059 |a 1153525901 |a 1228550833 | ||
020 | |a 9781607503897 | ||
020 | |a 1607503891 | ||
020 | |a 9781441605528 |q (electronic bk.) | ||
020 | |a 1441605525 |q (electronic bk.) | ||
020 | |a 9781597345903 |q (electronic bk.) | ||
020 | |a 1597345903 |q (electronic bk.) | ||
020 | |z 1586039474 | ||
020 | |z 9781586039479 | ||
035 | |a (OCoLC)646807197 |z (OCoLC)191037344 |z (OCoLC)318062615 |z (OCoLC)437122425 |z (OCoLC)491253321 |z (OCoLC)613309588 |z (OCoLC)613708758 |z (OCoLC)697516216 |z (OCoLC)712982422 |z (OCoLC)722712072 |z (OCoLC)728054637 |z (OCoLC)961555259 |z (OCoLC)962676747 |z (OCoLC)988453383 |z (OCoLC)991990578 |z (OCoLC)1037937355 |z (OCoLC)1038604354 |z (OCoLC)1045481321 |z (OCoLC)1055380523 |z (OCoLC)1066560324 |z (OCoLC)1081216059 |z (OCoLC)1153525901 |z (OCoLC)1228550833 | ||
035 | 0 | 0 | |a ocm00000001wrldshrocn646807197 |
037 | |a 978-1-58603-947-9 |b IOS Press |n http://www.iospress.nl | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d IOSPR |d EBLCP |d IDEBK |d OCLCQ |d YDXCP |d N$T |d CDX |d OCLCQ |d FVL |d OCLCQ |d ALAUL |d OCLCQ |d OCLCF |d OCLCQ |d DEBSZ |d MERUC |d OCLCQ |d OCLCA |d OCLCQ |d AZK |d AGLDB |d MOR |d PIFAG |d ZCU |d OCLCQ |d JBG |d OCLCQ |d U3W |d OCLCA |d STF |d WRM |d VTS |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d DKC |d OCLCQ |d M8D |d OCLCQ |d UKCRE |d AJS | ||
049 | |a TXMM | ||
050 | 4 | |a QA76.9.A25 |b I3394 2009eb | |
082 | 0 | 4 | |a 005.8/2 |2 22 |
245 | 0 | 0 | |a Identity-based cryptography / |c edited by Marc Joye and Gregory Neven. |
260 | |a Amsterdam ; |a Boston : |b IOS Press, |c ©2009. | ||
300 | |a 1 online resource (viii, 263 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Cryptology and information security series, |x 1871-6431 ; |v v. 2 | |
504 | |a Includes bibliographical references (pages 245-262) and index. | ||
505 | 0 | |a Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others]. | |
520 | |a Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description. | ||
588 | 0 | |a Print version record. | |
590 | |a EBSCO eBook Academic Comprehensive Collection North America | ||
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Public key cryptography. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer science. | |
700 | 1 | |a Joye, Marc, |d 1969- | |
700 | 1 | |a Neven, Gregory. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |t Identity-based cryptography. |d Amsterdam ; Boston : IOS Press, ©2009 |w (DLC) 2008940895 |
830 | 0 | |a Cryptology and information security series ; |v v. 2. |x 1871-6431 | |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=269152 |z CONNECT |3 EBSCO |t 0 |
907 | |a 4680624 |b 05-23-21 |c 07-02-20 | ||
998 | |a wi |b 05-23-21 |c m |d z |e - |f eng |g ne |h 0 |i 2 | ||
994 | |a 92 |b TXM | ||
999 | f | f | |i 8da21e35-2fa5-4e31-8bc7-81433a20ad65 |s c6385c6c-dbc1-43c7-af80-8e3ada6560d1 |t 0 |
952 | f | f | |t 1 |e QA76.9.A25 I3394 2009eb |h Library of Congress classification |
856 | 4 | 0 | |3 EBSCO |t 0 |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=269152 |z CONNECT |