Introduction to certificateless cryptography:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIII, 314 Seisten |
ISBN: | 9781482248609 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044294913 | ||
003 | DE-604 | ||
005 | 20170606 | ||
007 | t | ||
008 | 170503s2017 xxu |||| 00||| eng d | ||
010 | |a 016016910 | ||
020 | |a 9781482248609 |9 978-1-4822-4860-9 | ||
035 | |a (OCoLC)992494138 | ||
035 | |a (DE-599)BVBBV044294913 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Xiong, Hu |4 aut | |
245 | 1 | 0 | |a Introduction to certificateless cryptography |c Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos |
264 | 1 | |a Boca Raton |b Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc |c [2017] | |
300 | |a XXIII, 314 Seisten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 4 | |a Public key cryptography | |
650 | 4 | |a Identification | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |D s |
689 | 0 | 1 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Qin, Zheng |0 (DE-588)135682231 |4 aut | |
700 | 1 | |a Vasilakos, Athanasios V. |0 (DE-588)1089506503 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029698943&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029698943 |
Datensatz im Suchindex
_version_ | 1804177495981817856 |
---|---|
adam_text | Contents
List of Figures xiii
List of Tables xv
Preface xvii
Acknowledgments xxi
List of Abbreviations xxiii
Section 1 Setting the Stage
Chapter 1 ■ Avoiding Key Escrow 3
1.1 A BRIEF INTRODUCTION TO SYMMETRIC
CRYPTOGRAPHY 3
1.2 SETTING OF ASYMMETRIC PKC 4
1.2.1 Traditional PKC 5
1.2.2 Identity-Based PKC 6
1.3 WHY SHOULD I CARE ABOUT CERTIFICATELESS PKC 8
1.4 PLAN OF THE BOOK 11
Chapter 2 ■ Foundations 13
2.1 INTRODUCTION 13
2.2 MATHEMATICAL CONCEPTS AND PROPERTIES 13
2.2.1 Concepts from Number Theory 13
2.2.1.1 Primes and Divisibility 13
2.2.1.2 Modular Arithmetic 15
vi ■ Contents
2.2.2 Concepts from Abstract Algebra 17
2.2.2.1 Group Theory 17
2.2.2.2 Group ( Z*N, X ) 22
2.2.2.3 Chinese Remainder Theorem 24
2.2.2.4 Cyclic Groups and Generators 27
2.2.3 Elliptic-Curve Groups 29
2.2.4 Bilinear Pairing 35
PUBLIC-KEY CRYPTOGRAPHY 35
2.3.1 Public-Key Encryption Algorithms 37
2.3.1.1 Framework of Public-Key Encryption 37
2.3.1.2 RSA Encryption Scheme 38
2.3.1.3 ElGamal Encryption Scheme 38
2.3.1.4 Framework of ID-Based Encryption
Scheme 39
2.3.1.5 Boneh-Franklin IBE 40
2.3.2 Signature Algorithms 42
2.3.2.1 Framework of Digital Signature 42
2.3.2.2 RSA Signature Scheme 42
2.3.2.3 ElGamal Signature Scheme 43
2.3.2.4 Schnorr Signature Scheme 44
2.3.2.5 Digital Signature Standard 44
2.3.2.6 Framework of ID-Based Signature
Scheme 45
2.3.2.7 Cha-Cheon Identity-Based Signature 46
2.3.2.8 Bellare-Namprempre-Neven IBS 47
PROVABLE SECURITY 48
2.4.1 Public-Key Encryption 49
2.4.1.1 Security against Chosen-Plaintext
Attacks 50
2.4.1.2 Security against Chosen-Ciphertext
Attacks 51
2.4.2 ID-Based Encryption 52
; 2.4.2.1 Security against Chosen-Ciphertext-
and-Identity Attacks 52
Contents ■ vii
2.4.3 Digital Signature 54
2.4.3.1 Security against Chosen-Message
Attacks 54
2.4.4 ID-Based Signature 55
2.4.4.1 Security against Chosen-Message-
and-Identity Attacks 55
Section II CL-PKC without Random Oracles
Chapter 3 ■ CLE Secure in the Standard Model 59
3.1 INTRODUCTION 59
3.2 MODELING CERTIFICATELESS PUBLIC-KEY
ENCRYPTION SCHEMES 59
3.2.1 Al-Riyami and Paterson Formulation 59
3.2.2 Equivalence to the Original Seven-Algorithm
Framework 61
3.2.3 Baek, Safavi-Naini, and Susilo’s Framework 62
3.3 SECURITY DEFINITIONS FOR CERTIFICATE LESS
PUBLIC-KEY ENCRYPTION SCHEMES 63
3.3.1 General Security Model 64
3.3.2 Type I Attackers 66
3.3.2.1 Security against a Normal Type I
Adversary 66
3.3.2.2 Security against a Strong Type I
Adversary 69
3.3.2.3 Security against a Super Type I
Adversary 71
3.3.3 Type II Attackers 73
3.3.4 Malicious-but-Passive KGC Attacks 75
3.4 SURVEYING CERTIFICATELESS PUBLIC-KEY
ENCRYPTION SCHEMES 77
3.4.1 Concrete Constructions of CLE Schemes 77
3.4.2 Generic Constructions of CLE Schemes 81
3.4.3 Pairing-Free Constructions 82
viii ■ Contents
3.4.4 Constructions Secure against Malicious KGC
Attacks 83
3.4.5 Extensions of CLE Schemes 84
3.5 CONCRETE CONSTRUCTION 86
3.5.1 Dent-Libert-Paterson CL-PKE 86
3.5.2 Hwang֊Liu֊Chow CL-PKE 88
3.5.2.1 Security Analysis 89
3.5.3 Huang-Wong CL-PKE 98
Chapter 4 ■ CLS Secure in the Standard Model 101
4.1 MODELING CE RTIFI CATE LESS SIGNATURE (CLS)
SCHEMES 101
4.1.1 Framework of CLS Schemes 101
4.1.2 Equivalence to the Original Seven-Algorithm
Framework 102
4.2 SECURITY DEFINITIONS FOR CLS SCHEMES 103
4.2.1 Adversaries and Oracles 104
4.2.2 Type I Adversaries 105
4.2.2.1 Security against a Normal Type I
Adversary 105
4.2.2.2 Security against a Strong Type I
Adversary 107
4.2.2.3 Security against a Super Type I
Adversary 109
4.2.3 Type II Adversaries 111
4.2.4 Malicious-but-Passive KGC Attack 112
4.3 SURVEYING CLS SCHEMES 113
4.4 CONCRETE CONSTRUCTION 117
4.4.1 Xiong-Qin-Li’s Scheme 117
4.4.1.1 Complexity Assumption 117
4.4.1.2 Concrete Construction 117
4.4.1.3 Security Analysis 119
4.4.2 Yuan-Wang CLS 124
Contents ■ ix
Section III CL-PKC in Random Oracle Models
Chapter 5 ■ Random Oracle Models 129
5.1 RANDOM ORACLE METHODOLOGY 129
5.2 SECURITY PROOFS IN THE RANDOM ORACLE MODEL 131
5.3 CONTROVERSY ABOUT THE RANDOM ORACLE MODEL 133
Chapter 6 ■ CLE, CLS, and CL-AKE Secure in Random
Oracle Models 135
6.1 INTRODUCTION 135
6.2 AL-RIYAMI-PATERSON CLE 135
6.2.1 Concrete Construction 136
6.2.1.1 Basic CLE Scheme 136
6.2.1.2 Pull CLE Scheme 137
6.3 ZHANG-ZHANG CLS 139
6.3.1 Concrete Construction 139
6.3.2 Security Analysis 140
6.4 ZHANG ET AL. S CL-AKA 146
6.4.1 Framework of CL-AKA Protocol 146
6.4.2 Security Definitions 147
6.4.3 Concrete Construction 150
Chapter 7 ■ CL-PKC without Pairings 153
7.1 INTRODUCTION 153
7.2 LAI-KOU CLE 154
s
7.2.1 Concrete Construction 154
7.2.2 Security Analysis 155
7.3 XIONG-WU-CHEN CERTIFiCATELESS AUTHENTICATED
KEY AGREEMENT (CL-AKA) 158
7.3.1 Concrete Construction 159
x ■ Contents
7.3.2 Modular Approach for Security Proof in
Modified Bellare-Rogaway (mBR) Model 160
7.3.2.1 mBR Model 161
7.3.2.2 Kudla and Paterson’s Modular
Approach 162
7.3.2.3 Hard Problems 163
7.3.3 Security Analysis 163
7.3.4 Performance 167
SECTION IV Applications, Extensions, and Related
Paradigms
Chapter 8 ■ Applications of CL-PKC 171
INTRODUCTION 171
ONION ROUTING 171
8.2.1 Motivation 171
8.2.2 Catalano-Fiore-Gennaro Scheme 173
8.2.2.1 Framework of Onion Routing 173
8.2.2.2 Security of Onion Routing 174
8.2.2.3 Building Blocks 176
8.2.2.4 Concrete Construction 177
8.2.2.5 Security Analysis 177
ANONYMOUS REMOTE AUTHENTICATION
FOR WBANs 178
8.3.1 Motivation 178
8.3.2 Xiong’s Protocol 180
8.3.2.1 Notations 180
8.3.2.2 System Model 181
8.3.2.3 Objectives 182
8.3.2.4 Concrete Construction 182
8.3.2.5 Security Analysis 186
8.3.2.6 Comparison with Previous Protocols 192
Contents ■ xi
8.4 SECURE DATA SHARING IN CLOUD COMPUTING 197
8.4.1 Motivation 197
8.4.2 Qin֊Wu-Xiong Scheme 199
8.4.2.1 Formal Definition 199
8.4.2.2 Security Model 201
8.4.2.3 Concrete Construction 204
8.4.2.4 Security Analysis 206
8.4.2.5 Performance Evaluation 207
Chapter 9 ■ Extensions of CL-PKC 213
9.1 INTRODUCTION 213
9.2 CERTIFICATELESS SIGNCRYPTION 213
9.2.1 Related Work 213
9.2.2 Formal Definition 214
9.2.3 Xiong’s Scheme 219
9.2.4 Analysis 222
9.3 CERTIFICATELESS AGGREGATE SIGNATURE 223
9.3.1 Related Work 223
9.3.2 Formal Definition 224
9.3.3 Xiong-Wu-Chen’s Scheme 228
9.3.4 Security Proof 229
9.4 CERTIFICATELESS RING SIGNATURE 237
9.4.1 Related Work 237
9.4.2 Formal Definition 239
9.4.3 Qin et al.’s Scheme 242
9.4.4 Analysis 244
9.5 CERTIFICATELESS THRESHOLD SIGNATURE 254
V
9.5.1 Related Work 254
9.5.2 Formal Definition 255
9.5.3 Xiong-Li-Qin Scheme 259
9.5.4 Analysis 263
xii ■ Contents
Chapter 10 ■ Comparisons between CL-PKC, SGC-PKC,
and CB-PKC 267
Section V Future Directions
Chapter 11· Perspectives__________________________________271
References 273
Index
307
|
any_adam_object | 1 |
author | Xiong, Hu Qin, Zheng Vasilakos, Athanasios V. |
author_GND | (DE-588)135682231 (DE-588)1089506503 |
author_facet | Xiong, Hu Qin, Zheng Vasilakos, Athanasios V. |
author_role | aut aut aut |
author_sort | Xiong, Hu |
author_variant | h x hx z q zq a v v av avv |
building | Verbundindex |
bvnumber | BV044294913 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)992494138 (DE-599)BVBBV044294913 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02012nam a2200481 c 4500</leader><controlfield tag="001">BV044294913</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170606 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170503s2017 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016016910</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482248609</subfield><subfield code="9">978-1-4822-4860-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992494138</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044294913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiong, Hu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to certificateless cryptography</subfield><subfield code="c">Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 314 Seisten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qin, Zheng</subfield><subfield code="0">(DE-588)135682231</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vasilakos, Athanasios V.</subfield><subfield code="0">(DE-588)1089506503</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029698943&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029698943</subfield></datafield></record></collection> |
id | DE-604.BV044294913 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:49:00Z |
institution | BVB |
isbn | 9781482248609 |
language | English |
lccn | 016016910 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029698943 |
oclc_num | 992494138 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XXIII, 314 Seisten |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc |
record_format | marc |
spelling | Xiong, Hu aut Introduction to certificateless cryptography Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos Boca Raton Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc [2017] XXIII, 314 Seisten txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Public key infrastructure (Computer security) Public key cryptography Identification Data encryption (Computer science) Computer networks Security measures Public-Key-Infrastruktur (DE-588)4671762-6 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Public-Key-Infrastruktur (DE-588)4671762-6 s Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Qin, Zheng (DE-588)135682231 aut Vasilakos, Athanasios V. (DE-588)1089506503 aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029698943&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Xiong, Hu Qin, Zheng Vasilakos, Athanasios V. Introduction to certificateless cryptography Public key infrastructure (Computer security) Public key cryptography Identification Data encryption (Computer science) Computer networks Security measures Public-Key-Infrastruktur (DE-588)4671762-6 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4671762-6 (DE-588)4209133-0 |
title | Introduction to certificateless cryptography |
title_auth | Introduction to certificateless cryptography |
title_exact_search | Introduction to certificateless cryptography |
title_full | Introduction to certificateless cryptography Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos |
title_fullStr | Introduction to certificateless cryptography Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos |
title_full_unstemmed | Introduction to certificateless cryptography Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos |
title_short | Introduction to certificateless cryptography |
title_sort | introduction to certificateless cryptography |
topic | Public key infrastructure (Computer security) Public key cryptography Identification Data encryption (Computer science) Computer networks Security measures Public-Key-Infrastruktur (DE-588)4671762-6 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Public key infrastructure (Computer security) Public key cryptography Identification Data encryption (Computer science) Computer networks Security measures Public-Key-Infrastruktur Public-Key-Kryptosystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029698943&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT xionghu introductiontocertificatelesscryptography AT qinzheng introductiontocertificatelesscryptography AT vasilakosathanasiosv introductiontocertificatelesscryptography |