Advertisement

© 2011

Identity-Based Encryption

Book

Table of contents

  1. Front Matter
    Pages i-xi
  2. Sanjit Chatterjee, Palash Sarkar
    Pages 1-11
  3. Sanjit Chatterjee, Palash Sarkar
    Pages 13-28
  4. Sanjit Chatterjee, Palash Sarkar
    Pages 29-48
  5. Sanjit Chatterjee, Palash Sarkar
    Pages 49-62
  6. Sanjit Chatterjee, Palash Sarkar
    Pages 63-70
  7. Sanjit Chatterjee, Palash Sarkar
    Pages 71-80
  8. Sanjit Chatterjee, Palash Sarkar
    Pages 81-98
  9. Sanjit Chatterjee, Palash Sarkar
    Pages 99-120
  10. Sanjit Chatterjee, Palash Sarkar
    Pages 121-135
  11. Sanjit Chatterjee, Palash Sarkar
    Pages 137-153
  12. Sanjit Chatterjee, Palash Sarkar
    Pages 155-161
  13. Sanjit Chatterjee, Palash Sarkar
    Pages 163-165
  14. Sanjit Chatterjee, Palash Sarkar
    Pages 167-175
  15. Back Matter
    Pages 177-180

About this book

Introduction

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Keywords

(identity-based) signature and key agreement protocols Public key cryptography certificate-less and certificate-based encryption dual system encryption hierarchical identity-based encryption identity-based encryption lattice based cryptography pairing based cryptography products and standards for IBE provable security

Authors and affiliations

  1. 1., Department of Computer ScienceIndian Institute of ScienceBangaloreIndia
  2. 2.Applied Statistic Unit, Cryptology Research GroupIndian Statistical InstituteKolkataIndia

Bibliographic information

Industry Sectors
Biotechnology
IT & Software
Telecommunications
Aerospace
Engineering
Finance, Business & Banking
Electronics

Reviews

From the reviews:

“The book gives an overview of the most important Identity-Based Encryption (IBE) schemes. … For most of the considered IBE methods the authors provide also proofs of security reductions. The book has an extensive bibliography and can be used as an introduction to IBE in post-graduate courses.” (Jaak Henno, Zentralblatt MATH, Vol. 1218, 2011)

“This book addresses a variety of approaches to identity-based encryption (IBE), along with their constructions and security aspects. … The book could also serve as a textbook for a course on IBE. For new researchers, the book is a good survey of IBE. Professionals who are trying to design an encryption solution will find it to be a good source on the underlying mathematics.” (Maulik A. Dave, ACM Computing Reviews, July, 2012)