Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms
Autor Laila El Aimanien Limba Engleză Hardback – 6 noi 2017
This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 626.28 lei 43-57 zile | |
Springer International Publishing – 25 aug 2018 | 626.28 lei 43-57 zile | |
Hardback (1) | 632.26 lei 43-57 zile | |
Springer International Publishing – 6 noi 2017 | 632.26 lei 43-57 zile |
Preț: 632.26 lei
Preț vechi: 790.32 lei
-20% Nou
Puncte Express: 948
Preț estimativ în valută:
121.00€ • 125.69$ • 100.51£
121.00€ • 125.69$ • 100.51£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319681115
ISBN-10: 3319681117
Pagini: 145
Ilustrații: XX, 148 p. 34 illus., 5 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.41 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319681117
Pagini: 145
Ilustrații: XX, 148 p. 34 illus., 5 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.41 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.
Notă biografică
Laila El Aimani is researcher in cryptology and assistant professor at Cadi Ayyad University, Morocco.
In 2011, she graduated from Universität Bonn (Germany) as a Dr.rer.nat under the supervision of Joachim von zur Gathen. A good part of her PhD research was dedicated to the design and analysis of privacy-preserving mechanisms (e.g. undeniable/confirmer signatures, signcryption).
Later, she joined the Security Labs of Technicolor (France) as a research engineer in security and privacy. After a short sojourn in Gemalto (France) in 2013, she joined the computer science department of Cadi Ayyad University (Morocco) as a researcher and assistant professor.
Laila filed three patents on applied cryptology, and co-authored several research papers on cryptology/security.
Textul de pe ultima copertă
This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.
This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
Caracteristici
This book gives a thorough treatment of the celebrated compositions of signature and encryption The text takes an instructive approach to analyze and explain the shortcomings of the existing paradigms used to build many cryptographic primitives The author endeavors to gradually supplement and reinforce the security model in which the primitives are being analyzed