Identity-based cryptography:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
©2009
|
Schriftenreihe: | Cryptology and information security series
v. 2 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (pages 245-262) and index Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others] Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description |
Beschreibung: | 1 Online-Ressource (viii, 263 pages) |
ISBN: | 1441605525 1586039474 1607503891 9781441605528 9781586039479 9781607503897 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043078732 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1441605525 |c electronic bk. |9 1-4416-0552-5 | ||
020 | |a 1586039474 |9 1-58603-947-4 | ||
020 | |a 1607503891 |9 1-60750-389-1 | ||
020 | |a 9781441605528 |c electronic bk. |9 978-1-4416-0552-8 | ||
020 | |a 9781586039479 |9 978-1-58603-947-9 | ||
020 | |a 9781607503897 |9 978-1-60750-389-7 | ||
035 | |a (OCoLC)646807197 | ||
035 | |a (DE-599)BVBBV043078732 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 22 | |
245 | 1 | 0 | |a Identity-based cryptography |c edited by Marc Joye and Gregory Neven |
264 | 1 | |a Amsterdam |b IOS Press |c ©2009 | |
300 | |a 1 Online-Ressource (viii, 263 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 2 | |
500 | |a Includes bibliographical references (pages 245-262) and index | ||
500 | |a Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others] | ||
500 | |a Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer science |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Public key cryptography |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Public key cryptography | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer science | |
700 | 1 | |a Joye, Marc |e Sonstige |4 oth | |
700 | 1 | |a Neven, Gregory |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028502924 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175468880986112 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043078732 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)646807197 (DE-599)BVBBV043078732 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03829nmm a2200553zcb4500</leader><controlfield tag="001">BV043078732</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1441605525</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4416-0552-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586039474</subfield><subfield code="9">1-58603-947-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607503891</subfield><subfield code="9">1-60750-389-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441605528</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4416-0552-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586039479</subfield><subfield code="9">978-1-58603-947-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607503897</subfield><subfield code="9">978-1-60750-389-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646807197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043078732</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity-based cryptography</subfield><subfield code="c">edited by Marc Joye and Gregory Neven</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 263 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 245-262) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others]</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joye, Marc</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neven, Gregory</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028502924</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043078732 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:46Z |
institution | BVB |
isbn | 1441605525 1586039474 1607503891 9781441605528 9781586039479 9781607503897 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028502924 |
oclc_num | 646807197 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (viii, 263 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Identity-based cryptography edited by Marc Joye and Gregory Neven Amsterdam IOS Press ©2009 1 Online-Ressource (viii, 263 pages) txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 2 Includes bibliographical references (pages 245-262) and index Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others] Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Informatik Data encryption (Computer science) Public key cryptography Computer security Computer science Joye, Marc Sonstige oth Neven, Gregory Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 Aggregator Volltext |
spellingShingle | Identity-based cryptography COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Informatik Data encryption (Computer science) Public key cryptography Computer security Computer science |
title | Identity-based cryptography |
title_auth | Identity-based cryptography |
title_exact_search | Identity-based cryptography |
title_full | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_fullStr | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_full_unstemmed | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_short | Identity-based cryptography |
title_sort | identity based cryptography |
topic | COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Informatik Data encryption (Computer science) Public key cryptography Computer security Computer science |
topic_facet | COMPUTERS / Security / Cryptography Computer science Computer security Data encryption (Computer science) Public key cryptography Informatik |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 |
work_keys_str_mv | AT joyemarc identitybasedcryptography AT nevengregory identitybasedcryptography |