Identity-based Cryptography

Identity-based Cryptography

4.11 - 1251 ratings - Source

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the A01s felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.In Dan Boneh, editor, Advances in Cryptology a€“ CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, ... A new algorithm for finding minimum- weight words in a linear code application to primitive narrow-sense BCH codes of anbsp;...

Title:Identity-based Cryptography
Author:Marc Joye, Gregory Neven
Publisher:IOS Press - 2009


You Must CONTINUE and create a free account to access unlimited downloads & streaming