Fr. 135.00

Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.
This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

List of contents

Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.

About the author










Laila El Aimani is researcher in cryptology and assistant professor at Cadi Ayyad University, Morocco.

In 2011, she graduated from Universität Bonn (Germany) as a Dr.rer.nat under the supervision of Joachim von zur Gathen. A good part of her PhD research was dedicated to the design and analysis of privacy-preserving mechanisms (e.g. undeniable/confirmer signatures, signcryption).

Later, she joined the Security Labs of Technicolor (France) as a research engineer in security and privacy. After a short sojourn in Gemalto (France) in 2013, she joined the computer science department of Cadi Ayyad University (Morocco) as a researcher and assistant professor.


Laila filed three patents on applied cryptology, and co-authored several research papers on cryptology/security.

Summary

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.
This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

Product details

Authors Laila El Aimani
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2018
 
EAN 9783319885513
ISBN 978-3-31-988551-3
No. of pages 148
Dimensions 155 mm x 9 mm x 235 mm
Weight 266 g
Illustrations XX, 148 p. 34 illus., 5 illus. in color.
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

B, computer science, Data Structures and Information Theory, Mathematics of Computing, Information theory, Mathematical theory of computation, Computer science—Mathematics, Maths for computer scientists, Data structures (Computer science)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.