Dir gefällt dieses Produkt? Sag's weiter!
Practitioners and engineers who have to implement real-world IBE schemes, and need a proper understanding of the basic IBE techniques, will find this book a valuable asset
Covers Elliptic Curves and Pairings, obtaining security against chosen Ciphertext Attacks, standards and more
Peter Wild, Editor and Chief of Springer’s Journal Designs Codes and Cryptography, remarks “This is a very active area, and it would be useful to have a reference text and to provide a common basis for the study of these systems. This would be a pioneering contribution in book form.”
"The book gives an overview of the most important Identity-Based Encryption (IBE) schemes. ... For most of the considered IBE methods the authors provide also proofs of security reductions. The book has an extensive bibliography and can be used as an introduction to IBE in post-graduate courses." (Jaak Henno, Zentralblatt MATH, Vol. 1218, 2011)
"This book addresses a variety of approaches to identity-based encryption (IBE), along with their constructions and security aspects. ... The book could also serve as a textbook for a course on IBE. For new researchers, the book is a good survey of IBE. Professionals who are trying to design an encryption solution will find it to be a good source on the underlying mathematics." (Maulik A. Dave, ACM Computing Reviews, July, 2012)
This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.