𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Identity-Based Cryptography

✍ Scribed by M. Joye, M. Joye, G. Neven


Publisher
IOS Press
Year
2009
Tongue
English
Leaves
273
Series
Cryptology and information security series 2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the authors felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.

✦ Table of Contents


Title page......Page 2
Foreword......Page 6
Contents......Page 8
Introduction to Identity-Based Cryptography......Page 10
Pairings on Elliptic Curves......Page 22
Identity-Based Signatures......Page 40
Identity-Based Encryption and Hierarchical Identity-Based Encryption......Page 54
Flexible IBE and Beyond in the Commutative-Blinding Framework......Page 74
Generalized IBE in the Exponent-Inversion Framework......Page 92
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption......Page 109
Identity-Based Identification and Signature Schemes Using Error Correcting Codes......Page 128
Certificateless Encryption......Page 144
Attribute-Based Encryption......Page 165
On Generic Groups and Related Bilinear Problems......Page 178
Software Implementation of Pairings......Page 197
Hardware Implementation of Pairings......Page 216
Implementation Attacks & Countermeasures......Page 235
Bibliography......Page 254
Author Index......Page 272


πŸ“œ SIMILAR VOLUMES


Security for Wireless Sensor Networks us
✍ Patil, H.K. and Szygenda, S.A. πŸ“‚ Library πŸ“… 2012 πŸ› Taylor & Francis 🌐 English

<p>Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβ€”detailing its pros and cons. Next, it examines new attack vect

Security for wireless sensor networks us
✍ Patil, Kupwade Harsh;, Szygenda A(Stephen) πŸ“‚ Library πŸ“… 2013;2016 πŸ› CRC Press 🌐 English

<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the

Group-based cryptography
✍ Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov πŸ“‚ Library πŸ“… 2008 πŸ› BirkhΓ€user Verlag 🌐 English
Guide to pairing-based cryptography
✍ El Mrabet, Nadia; Joye, Marc πŸ“‚ Library πŸ“… 2017 πŸ› Chapman and Hall/CRC 🌐 English

<P>This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.</P> <P></P> <P>As well as exploring the basic mathematical background

Grobner bases, coding, and cryptography
✍ Massimiliano Sala (auth.), Massimiliano Sala, Shojiro Sakata, Teo Mora, Carlo Tr πŸ“‚ Library πŸ“… 2009 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English
QC-LDPC Code-Based Cryptography
✍ Marco Baldi (auth.) πŸ“‚ Library πŸ“… 2014 πŸ› Springer International Publishing 🌐 English

<p><p>This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the mai