<p>Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβdetailing its pros and cons. Next, it examines new attack vect
Identity-Based Cryptography
β Scribed by M. Joye, M. Joye, G. Neven
- Publisher
- IOS Press
- Year
- 2009
- Tongue
- English
- Leaves
- 273
- Series
- Cryptology and information security series 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the authors felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.
β¦ Table of Contents
Title page......Page 2
Foreword......Page 6
Contents......Page 8
Introduction to Identity-Based Cryptography......Page 10
Pairings on Elliptic Curves......Page 22
Identity-Based Signatures......Page 40
Identity-Based Encryption and Hierarchical Identity-Based Encryption......Page 54
Flexible IBE and Beyond in the Commutative-Blinding Framework......Page 74
Generalized IBE in the Exponent-Inversion Framework......Page 92
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption......Page 109
Identity-Based Identification and Signature Schemes Using Error Correcting Codes......Page 128
Certificateless Encryption......Page 144
Attribute-Based Encryption......Page 165
On Generic Groups and Related Bilinear Problems......Page 178
Software Implementation of Pairings......Page 197
Hardware Implementation of Pairings......Page 216
Implementation Attacks & Countermeasures......Page 235
Bibliography......Page 254
Author Index......Page 272
π SIMILAR VOLUMES
<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the
<P>This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.</P> <P></P> <P>As well as exploring the basic mathematical background
<p><p>This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the mai