Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the authors felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.
Author(s): M. Joye, M. Joye, G. Neven
Series: Cryptology and information security series 2
Publisher: IOS Press
Year: 2009
Language: English
Pages: 273
City: Amsterdam, The Netherlands; Fairfax, VA
Title page......Page 2
Foreword......Page 6
Contents......Page 8
Introduction to Identity-Based Cryptography......Page 10
Pairings on Elliptic Curves......Page 22
Identity-Based Signatures......Page 40
Identity-Based Encryption and Hierarchical Identity-Based Encryption......Page 54
Flexible IBE and Beyond in the Commutative-Blinding Framework......Page 74
Generalized IBE in the Exponent-Inversion Framework......Page 92
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption......Page 109
Identity-Based Identification and Signature Schemes Using Error Correcting Codes......Page 128
Certificateless Encryption......Page 144
Attribute-Based Encryption......Page 165
On Generic Groups and Related Bilinear Problems......Page 178
Software Implementation of Pairings......Page 197
Hardware Implementation of Pairings......Page 216
Implementation Attacks & Countermeasures......Page 235
Bibliography......Page 254
Author Index......Page 272