Identity-Based Cryptography

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the authors felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.

Author(s): M. Joye, M. Joye, G. Neven
Series: Cryptology and information security series 2
Publisher: IOS Press
Year: 2009

Language: English
Pages: 273
City: Amsterdam, The Netherlands; Fairfax, VA

Title page......Page 2
Foreword......Page 6
Contents......Page 8
Introduction to Identity-Based Cryptography......Page 10
Pairings on Elliptic Curves......Page 22
Identity-Based Signatures......Page 40
Identity-Based Encryption and Hierarchical Identity-Based Encryption......Page 54
Flexible IBE and Beyond in the Commutative-Blinding Framework......Page 74
Generalized IBE in the Exponent-Inversion Framework......Page 92
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption......Page 109
Identity-Based Identification and Signature Schemes Using Error Correcting Codes......Page 128
Certificateless Encryption......Page 144
Attribute-Based Encryption......Page 165
On Generic Groups and Related Bilinear Problems......Page 178
Software Implementation of Pairings......Page 197
Hardware Implementation of Pairings......Page 216
Implementation Attacks & Countermeasures......Page 235
Bibliography......Page 254
Author Index......Page 272