Muutke küpsiste eelistusi
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 22-Mar-2011
  • Kirjastus: Springer-Verlag New York Inc.
  • Keel: eng
  • ISBN-13: 9781441993830

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.

Arvustused

From the reviews:

The book gives an overview of the most important Identity-Based Encryption (IBE) schemes. For most of the considered IBE methods the authors provide also proofs of security reductions. The book has an extensive bibliography and can be used as an introduction to IBE in post-graduate courses. (Jaak Henno, Zentralblatt MATH, Vol. 1218, 2011)

This book addresses a variety of approaches to identity-based encryption (IBE), along with their constructions and security aspects. The book could also serve as a textbook for a course on IBE. For new researchers, the book is a good survey of IBE. Professionals who are trying to design an encryption solution will find it to be a good source on the underlying mathematics. (Maulik A. Dave, ACM Computing Reviews, July, 2012)

1 Introduction
1(12)
1.1 Background
1(7)
1.2 Identity-Based Encryption
8(1)
1.3 Plan of the Book
9(4)
2 Definitions and Notations
13(16)
2.1 Public Key Encryption
13(3)
2.2 Identity-Based Encryption
16(3)
2.2.1 Hierarchical Identity-Based Encryption
17(2)
2.3 Security Model for (H)IBE
19(7)
2.3.1 Chosen Ciphertext Attack
20(2)
2.3.2 Chosen Plaintext Attack
22(1)
2.3.3 Selective-ID Model
23(1)
2.3.4 Anonymous (H)IBE
24(1)
2.3.5 Use of Random Oracles
25(1)
2.4 Structure of Security Proofs
26(2)
2.5 Conclusion
28(1)
3 A Brief Background on Elliptic Curves and Pairings
29(20)
3.1 Finite Fields, Elliptic Curves and Tate Pairing
30(14)
3.1.1 Exponentiation in General Cyclic Groups
30(2)
3.1.2 Finite Fields
32(1)
3.1.3 Elliptic Curves
33(6)
3.1.4 Tate Pairing
39(4)
3.1.5 Types of Pairings
43(1)
3.2 Hardness Assumptions
44(4)
3.3 Conclusion
48(1)
4 Boneh-Franklin IBE and its Variants
49(14)
4.1 Boneh-Franklin IBE
49(8)
4.1.1 Security Against Chosen Ciphertext Attacks
54(3)
4.2 Hierarchical Identity-Based Encryption
57(2)
4.3 Boneh-Katz-Wang CPA-Secure IBE
59(1)
4.4 Attrapadung et al's CCA-Secure IBE
60(1)
4.5 Conclusion
61(2)
5 Selective-Identity Model
63(8)
5.1 Boneh-Boyen HIBE
64(3)
5.1.1 Security
65(2)
5.2 Constant Size Ciphertext HIBE
67(2)
5.3 Interpreting Security Models
69(1)
5.4 Conclusion
70(1)
6 Security Against Adaptive Chosen Ciphertext Attacks
71(10)
6.1 A High Level Description
72(1)
6.2 Canetti-Halevi-Katz Transformation
72(4)
6.2.1 One-Time Signatures
73(1)
6.2.2 The Transformation
73(1)
6.2.3 Security
74(2)
6.3 The Boyen-Mei-Waters Transformation
76(4)
6.4 Conclusion
80(1)
7 IBE in Adaptive-Identity Model Without Random Oracles
81(18)
7.1 Boneh-Boyen IBE
82(1)
7.2 Waters IBE
83(10)
7.2.1 Security
84(9)
7.3 Generalisation of Waters IBE
93(1)
7.4 Adaptive-Identity Secure HIBE
93(1)
7.5 Converting to a CCA-Secure HIBE
94(3)
7.6 Further Applications of Waters Technique
97(1)
7.7 Conclusion
98(1)
8 Further IBE Constructions
99(22)
8.1 Gentry's IBE
100(7)
8.1.1 CPA-Secure Construction
101(4)
8.1.2 CCA-Secure Construction
105(1)
8.1.3 Previous and Further Work
106(1)
8.2 Dual System Encryption
107(13)
8.2.1 Extensions
119(1)
8.3 Conclusion
120(1)
9 IBE Without Pairing
121(16)
9.1 IBE Based on Number Theory
122(3)
9.1.1 Cocks' IBE
122(1)
9.1.2 Boneh-Gentry-Hamburg IBE
123(2)
9.2 IBE From Lattices
125(9)
9.2.1 Background on Lattices
125(2)
9.2.2 Pre-Image Sampling
127(1)
9.2.3 Gentry-Peikert-Vaikuntanathan IBE
128(2)
9.2.4 Generalized Pre-Image Sampling
130(1)
9.2.5 Agrawal-Boneh-Boyen IBE
131(3)
9.3 Conclusion
134(3)
10 Applications, Extensions and Related Primitives
137(18)
10.1 Signature Schemes
137(6)
10.1.1 Boneh-Lynn-Shacham Short Signature
137(2)
10.1.2 A Hierarchical Identity-Based Signature
139(4)
10.2 Identity-Based Key Agreement
143(2)
10.3 Broadcast Encryption
145(3)
10.4 Fuzzy Identity-Based Encryption
148(1)
10.5 Public Key Encryption with Keyword Search
149(2)
10.6 Other Applications
151(2)
10.7 Conclusion
153(2)
11 Avoiding Key Escrow
155(8)
11.1 Distributed PKG
155(1)
11.2 Certificate-Less Encryption
156(2)
11.3 Certificate-Based Encryption
158(2)
11.4 Other Approaches
160(1)
11.5 Conclusion
161(2)
12 Products and Standards
163(4)
12.1 Voltage Security
163(1)
12.2 Trend-Micro
164(1)
12.3 IEEE P1363.3/D1 Draft Standard
164(1)
12.4 IETF Memo
165(1)
12.5 Conclusion
165(2)
13 Bibliography
167(10)
References
167(10)
Index 177