Identity-based cryptography

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam IOS Press ©2009
Schriftenreihe:Cryptology and information security series v. 2
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV043078732
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2009 xx o|||| 00||| eng d
020 |a 1441605525  |c electronic bk.  |9 1-4416-0552-5 
020 |a 1586039474  |9 1-58603-947-4 
020 |a 1607503891  |9 1-60750-389-1 
020 |a 9781441605528  |c electronic bk.  |9 978-1-4416-0552-8 
020 |a 9781586039479  |9 978-1-58603-947-9 
020 |a 9781607503897  |9 978-1-60750-389-7 
035 |a (OCoLC)646807197 
035 |a (DE-599)BVBBV043078732 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8/2  |2 22 
245 1 0 |a Identity-based cryptography  |c edited by Marc Joye and Gregory Neven 
264 1 |a Amsterdam  |b IOS Press  |c ©2009 
300 |a 1 Online-Ressource (viii, 263 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Cryptology and information security series  |v v. 2 
500 |a Includes bibliographical references (pages 245-262) and index 
500 |a Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others] 
500 |a Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description 
650 7 |a COMPUTERS / Security / Cryptography  |2 bisacsh 
650 7 |a Computer science  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Public key cryptography  |2 fast 
650 4 |a Informatik 
650 4 |a Data encryption (Computer science) 
650 4 |a Public key cryptography 
650 4 |a Computer security 
650 4 |a Computer science 
700 1 |a Joye, Marc  |e Sonstige  |4 oth 
700 1 |a Neven, Gregory  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028502924 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295365514395648
any_adam_object
building Verbundindex
bvnumber BV043078732
collection ZDB-4-EBA
ctrlnum (OCoLC)646807197
(DE-599)BVBBV043078732
dewey-full 005.8/2
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8/2
dewey-search 005.8/2
dewey-sort 15.8 12
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03833nam a2200553zcb4500</leader><controlfield tag="001">BV043078732</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1441605525</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4416-0552-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586039474</subfield><subfield code="9">1-58603-947-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607503891</subfield><subfield code="9">1-60750-389-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441605528</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4416-0552-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586039479</subfield><subfield code="9">978-1-58603-947-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607503897</subfield><subfield code="9">978-1-60750-389-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646807197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043078732</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity-based cryptography</subfield><subfield code="c">edited by Marc Joye and Gregory Neven</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 263 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 245-262) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks &amp; countermeasures / Claire Whelan [and others]</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joye, Marc</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neven, Gregory</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=269152</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028502924</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=269152</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=269152</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043078732
illustrated Not Illustrated
indexdate 2024-12-24T04:41:04Z
institution BVB
isbn 1441605525
1586039474
1607503891
9781441605528
9781586039479
9781607503897
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028502924
oclc_num 646807197
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (viii, 263 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher IOS Press
record_format marc
series2 Cryptology and information security series
spelling Identity-based cryptography edited by Marc Joye and Gregory Neven
Amsterdam IOS Press ©2009
1 Online-Ressource (viii, 263 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Cryptology and information security series v. 2
Includes bibliographical references (pages 245-262) and index
Introduction to identity-based cryptography / Antoine Joux -- Pairings on elliptic curves / Frederik Vercauteren -- Identity-based signatures / Eike Kiltz, Gregory Neven -- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar -- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen -- Generalized IBE in the exponent-inversion framework / Xavier Boyen -- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao [and others] -- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault -- Certificateless encryption / Sherman S.M. Chow -- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu -- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent -- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott -- Hardware implementation of pairings / Maurice Keller [and others] -- Implementation attacks & countermeasures / Claire Whelan [and others]
Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description
COMPUTERS / Security / Cryptography bisacsh
Computer science fast
Computer security fast
Data encryption (Computer science) fast
Public key cryptography fast
Informatik
Data encryption (Computer science)
Public key cryptography
Computer security
Computer science
Joye, Marc Sonstige oth
Neven, Gregory Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152 Aggregator Volltext
spellingShingle Identity-based cryptography
COMPUTERS / Security / Cryptography bisacsh
Computer science fast
Computer security fast
Data encryption (Computer science) fast
Public key cryptography fast
Informatik
Data encryption (Computer science)
Public key cryptography
Computer security
Computer science
title Identity-based cryptography
title_auth Identity-based cryptography
title_exact_search Identity-based cryptography
title_full Identity-based cryptography edited by Marc Joye and Gregory Neven
title_fullStr Identity-based cryptography edited by Marc Joye and Gregory Neven
title_full_unstemmed Identity-based cryptography edited by Marc Joye and Gregory Neven
title_short Identity-based cryptography
title_sort identity based cryptography
topic COMPUTERS / Security / Cryptography bisacsh
Computer science fast
Computer security fast
Data encryption (Computer science) fast
Public key cryptography fast
Informatik
Data encryption (Computer science)
Public key cryptography
Computer security
Computer science
topic_facet COMPUTERS / Security / Cryptography
Computer science
Computer security
Data encryption (Computer science)
Public key cryptography
Informatik
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=269152
work_keys_str_mv AT joyemarc identitybasedcryptography
AT nevengregory identitybasedcryptography