Verifiable Composition of Signature and Encryption A Comprehensive Study of the Design Paradigms /

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signat...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: El Aimani, Laila (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02678nam a22004455i 4500
001 978-3-319-68112-2
003 DE-He213
005 20171028141855.0
007 cr nn 008mamaa
008 171028s2017 gw | s |||| 0|eng d
020 |a 9783319681122  |9 978-3-319-68112-2 
024 7 |a 10.1007/978-3-319-68112-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D35 
072 7 |a UMB  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 005.74  |2 23 
100 1 |a El Aimani, Laila.  |e author. 
245 1 0 |a Verifiable Composition of Signature and Encryption  |h [electronic resource] :  |b A Comprehensive Study of the Design Paradigms /  |c by Laila El Aimani. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XX, 148 p. 34 illus., 5 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I: Background -- 1. Preliminaries -- 2. Case-study primitives -- Part II: the "Sign then Encrypt" (StE) paradigm -- 3. Analysis of StE -- 4.  An efficient variant of StE -- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm -- 5. Analysis of CtEaS -- 6. CtEtS: an efficient variant of CtEaS -- Part IV: New paradigms -- 7. EtStE: a new paradigm for verifiable signcryption -- 8. Multi-user security -- 9. Insider privacy.-10. Wrap - up. 
520 |a This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals. 
650 0 |a Computer science. 
650 0 |a Data structures (Computer science). 
650 0 |a Computer science  |x Mathematics. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Mathematics of Computing. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319681115 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-68112-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)