Cargando…

Practical Signcryption

In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dent, Alexander W. (Editor ), Zheng, Yuliang (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Information Security and Cryptography,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-89411-7
003 DE-He213
005 20220115193104.0
007 cr nn 008mamaa
008 101111s2010 gw | s |||| 0|eng d
020 |a 9783540894117  |9 978-3-540-89411-7 
024 7 |a 10.1007/978-3-540-89411-7  |2 doi 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a GPF  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
082 0 4 |a 003.54  |2 23 
245 1 0 |a Practical Signcryption  |h [electronic resource] /  |c edited by Alexander W. Dent, Yuliang Zheng. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a XVIII, 274 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Security and Cryptography,  |x 2197-845X 
505 0 |a Security Models for Signcryption -- Security for Signcryption: The Two-User Model -- Security for Signcryption: The Multi-User Model -- Signcryption Schemes -- Signcryption Schemes Based on the Diffie-Hellman Problem -- Signcryption Schemes Based on Bilinear Maps -- Signcryption Schemes Based on the RSA Problem -- Construction Techniques -- Hybrid Signcryption -- Concealment and Its Applications to Authenticated Encryption -- Parallel Signcryption -- Extensions of Signcryption -- Identity-Based Signcryption -- Key Establishment Using Signcryption Techniques -- Applications of Signcryption. 
520 |a In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the "encrypt-then-sign" method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Computer networks . 
650 1 4 |a Data Structures and Information Theory. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Dent, Alexander W.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Zheng, Yuliang.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540894094 
776 0 8 |i Printed edition:  |z 9783540894735 
776 0 8 |i Printed edition:  |z 9783642265938 
830 0 |a Information Security and Cryptography,  |x 2197-845X 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-89411-7  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)