Introduction to Security Reduction

Author:   Fuchun Guo ,  Willy Susilo ,  Yi Mu
Publisher:   Springer Nature Switzerland AG
Edition:   Softcover reprint of the original 1st ed. 2018
ISBN:  

9783030065744


Pages:   253
Publication Date:   30 January 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $362.22 Quantity:  
Add to Cart

Share |

Introduction to Security Reduction


Add your own review!

Overview

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Full Product Details

Author:   Fuchun Guo ,  Willy Susilo ,  Yi Mu
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   Softcover reprint of the original 1st ed. 2018
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783030065744


ISBN 10:   303006574
Pages:   253
Publication Date:   30 January 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Notions, Definitions and Models.- Identity-Based Encryption.- Foundations of Group-Based Cryptography.- Foundations of Security Reduction.- Digital Signatures With Random Oracles.- Digital Signatures Without Random Oracles.- Public Key Encryption With Random Oracles.- Public Key Encryption Without Random Oracles.- Identity-Based Encryption With Random Oracles.- Identity-Based Encryption Without Random Oracles.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List