Cargando…

Practical Signcryption

In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dent, Alexander W. (Editor ), Zheng, Yuliang (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Information Security and Cryptography,
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Security Models for Signcryption
  • Security for Signcryption: The Two-User Model
  • Security for Signcryption: The Multi-User Model
  • Signcryption Schemes
  • Signcryption Schemes Based on the Diffie-Hellman Problem
  • Signcryption Schemes Based on Bilinear Maps
  • Signcryption Schemes Based on the RSA Problem
  • Construction Techniques
  • Hybrid Signcryption
  • Concealment and Its Applications to Authenticated Encryption
  • Parallel Signcryption
  • Extensions of Signcryption
  • Identity-Based Signcryption
  • Key Establishment Using Signcryption Techniques
  • Applications of Signcryption.