Practical Signcryption
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, an...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Information Security and Cryptography,
|
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Security Models for Signcryption
- Security for Signcryption: The Two-User Model
- Security for Signcryption: The Multi-User Model
- Signcryption Schemes
- Signcryption Schemes Based on the Diffie-Hellman Problem
- Signcryption Schemes Based on Bilinear Maps
- Signcryption Schemes Based on the RSA Problem
- Construction Techniques
- Hybrid Signcryption
- Concealment and Its Applications to Authenticated Encryption
- Parallel Signcryption
- Extensions of Signcryption
- Identity-Based Signcryption
- Key Establishment Using Signcryption Techniques
- Applications of Signcryption.