Practical Signcryption
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Information Security and Cryptography,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Security Models for Signcryption
- Security for Signcryption: The Two-User Model
- Security for Signcryption: The Multi-User Model
- Signcryption Schemes
- Signcryption Schemes Based on the Diffie–Hellman Problem
- Signcryption Schemes Based on Bilinear Maps
- Signcryption Schemes Based on the RSA Problem
- Construction Techniques
- Hybrid Signcryption
- Concealment and Its Applications to Authenticated Encryption
- Parallel Signcryption
- Extensions of Signcryption
- Identity-Based Signcryption
- Key Establishment Using Signcryption Techniques
- Applications of Signcryption.