|
|
|
|
LEADER |
02678nam a22004455i 4500 |
001 |
978-3-319-68112-2 |
003 |
DE-He213 |
005 |
20171028141855.0 |
007 |
cr nn 008mamaa |
008 |
171028s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319681122
|9 978-3-319-68112-2
|
024 |
7 |
|
|a 10.1007/978-3-319-68112-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a El Aimani, Laila.
|e author.
|
245 |
1 |
0 |
|a Verifiable Composition of Signature and Encryption
|h [electronic resource] :
|b A Comprehensive Study of the Design Paradigms /
|c by Laila El Aimani.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XX, 148 p. 34 illus., 5 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Part I: Background -- 1. Preliminaries -- 2. Case-study primitives -- Part II: the "Sign then Encrypt" (StE) paradigm -- 3. Analysis of StE -- 4. An efficient variant of StE -- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm -- 5. Analysis of CtEaS -- 6. CtEtS: an efficient variant of CtEaS -- Part IV: New paradigms -- 7. EtStE: a new paradigm for verifiable signcryption -- 8. Multi-user security -- 9. Insider privacy.-10. Wrap - up.
|
520 |
|
|
|a This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319681115
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-68112-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|