Fr. 199.00

Introduction to Security Reduction

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions.
This book is suitable for researchers and graduate students engaged with public-key cryptography.

List of contents

Notions, Definitions and Models.- Identity-Based Encryption.- Foundations of Group-Based Cryptography.- Foundations of Security Reduction.- Digital Signatures With Random Oracles.- Digital Signatures Without Random Oracles.- Public Key Encryption With Random Oracles.- Public Key Encryption Without Random Oracles.- Identity-Based Encryption With Random Oracles.- Identity-Based Encryption Without Random Oracles.

Summary

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions.
This book is suitable for researchers and graduate students engaged with public-key cryptography.

Product details

Authors Fuchu Guo, Fuchun Guo, Yi Mu, Will Susilo, Willy Susilo
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2019
 
EAN 9783030065744
ISBN 978-3-0-3006574-4
No. of pages 253
Dimensions 155 mm x 14 mm x 235 mm
Weight 421 g
Illustrations XV, 253 p.
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

B, Security, computer science, data protection, Systems and Data Security, Data and Information Security, Data Structures and Information Theory, Network Security, Computer security, Information theory, Data structures (Computer science)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.