As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Academic and Professional Practice & Development
Produkt-Hinweis
Fadenheftung
Gewebe-Einband
Illustrationen
43 s/w Abbildungen, 14 s/w Tabellen
14 Tables, black and white; 43 Illustrations, black and white
Maße
Höhe: 234 mm
Breite: 157 mm
Dicke: 23 mm
Gewicht
ISBN-13
978-1-4822-4860-9 (9781482248609)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Autor*in
University of Electronic Science and Technology of China
University of Electronic Science and Technology of China, Chengdu, Sichuan, People's Republic of China
Lulea University of Technology, Sweden
Setting the Stage. Avoiding key escrow Mathematical concepts and properties. CL-PKC without Random Oracles. Concrete constructions of CLE Generic construction of CLE. CLS secure in the standard model. CL-PKC in the Random Oracle Models. The random oracle model. CLE, CLS and CL-AKE secure in the random oracle model. CL-PKC without parings. Applications, Extensions and Related Primitives. Applications of CL-PKC. Extensions of CL-PKC. Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC. Future Directions. Perspectives.