Identity-based cryptography /

Saved in:
Bibliographic Details
Imprint:Amsterdam ; Boston : IOS Press, ©2009.
Description:1 online resource (viii, 263 pages) : illustrations
Language:English
Series:Cryptology and information security series, 1871-6431 ; v. 2
Cryptology and information security series ; v. 2.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11218631
Hidden Bibliographic Details
Other authors / contributors:Joye, Marc, 1969-
Neven, Gregory.
ISBN:9781607503897
1607503891
9781441605528
1441605525
9781597345903
1597345903
1586039474
9781586039479
Digital file characteristics:data file
Notes:Includes bibliographical references (pages 245-262) and index.
Print version record.
Summary:Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description.
Other form:Print version: Identity-based cryptography. Amsterdam ; Boston : IOS Press, ©2009
Table of Contents:
  • Introduction to identity-based cryptography / Antoine Joux
  • Pairings on elliptic curves / Frederik Vercauteren
  • Identity-based signatures / Eike Kiltz, Gregory Neven
  • Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar
  • Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen
  • Generalized IBE in the exponent-inversion framework / Xavier Boyen
  • Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others]
  • Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault
  • Certificateless encryption / Sherman S.M. Chow
  • Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu
  • On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent
  • Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott
  • Hardware implementation of pairings / Maurice Keller [and others]
  • Implementation attacks & countermeasures / Claire Whelan [and others].