Limit search to available items
Book Cover
E-book
Author Xiong, Hu

Title Introduction to Certificateless Cryptography
Published Boca Raton : CRC Press, 2016

Copies

Description 1 online resource (305 pages)
Contents Cover -- Half title -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgement -- List of Abbreviations -- SECTION I Setting the Stage -- CHAPTER 1 Avoiding Key Escrow -- 1.1 A BRIEF INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY -- 1.2 SETTING OF ASYMMETRIC PKC -- 1.2.1 Traditional PKC -- 1.2.2 Identity-Based PKC -- 1.3 WHY SHOULD I CARE ABOUT CERTIFICATELESS PKC -- 1.4 PLAN OF THE BOOK -- CHAPTER 2 Foundations -- 2.1 INTRODUCTION -- 2.2 MATHEMATICAL CONCEPTS AND PROPERTIES -- 2.2.1 Concepts from Number Theory -- 2.2.1.1 Primes and Divisibility -- 2.2.1.2 Modular Arithmetic -- 2.2.2 Concepts from Abstract Algebra -- 2.2.2.1 Group Theory -- 2.2.2.2 Group ($!*, x) -- 2.2.2.3 Chinese Remainder Theorem -- 2.2.2.4 Cyclic Groups and Generators -- 2.2.3 Elliptic-Curve Groups -- 2.2.4 Bilinear Pairing -- 2.3 PUBLIC-KEY CRYPTOGRAPHY -- 2.3.1 Public-Key Encryption Algorithms -- 2.3.1.1 Framework of Public-Key Encryption -- 2.3.1.2 RSA Encryption Scheme -- 2.3.1.3 ElGamal Encryption Scheme -- 2.3.1.4 Framework of ID-Based Encryption Scheme -- 2.3.1.5 Boneh-Franklin IBE -- 2.3.2 Signature Algorithms -- 2.3.2.1 Framework of Digital Signature -- 2.3.2.2 RSA Signature Scheme -- 2.3.2.3 ElGamal Signature Scheme -- 2.3.2.4 Schnorr Signature Scheme -- 2.3.2.5 Digital Signature Standard -- 2.3.2.6 Framework of ID-Based Signature Scheme -- 2.3.2.7 Cha-Cheon Identity-Based Signature -- 2.3.2.8 Bellare-Namprempre-Neven IBS -- 2.4 PROVABLE SECURITY -- 2.4.1 Public-Key Encryption -- 2.4.1.1 Security against Chosen-Plaintext Attacks -- 2.4.1.2 Security against Chosen-Ciphertext Attacks -- 2.4.2 ID-Based Encryption -- 2.4.2.1 Security against Chosen-Ciphertext-and-Identity Attacks -- 2.4.3 Digital Signature -- 2.4.3.1 Security against Chosen-Message Attacks -- 2.4.4 ID-Based Signature
2.4.4.1 Security against Chosen-Message-and-Identity Attacks -- SECTION II CL-PKC without Random Oracles -- CHAPTER 3 CLE Secure in the Standard Model -- 3.1 INTRODUCTION -- 3.2 MODELING CERTIFICATELESS PUBLIC-KEY ENCRYPTION SCHEMES -- 3.2.1 Al-Riyami and Paterson Formulation -- 3.2.2 Equivalence to the Original Seven-Algorithm Framework -- 3.2.3 Baek, Safavi-Naini, and Susilo's Framework -- 3.3 SECURITY DEFINITIONS FOR CERTIFICATELESS PUBLIC-KEY ENCRYPTION SCHEMES -- 3.3.1 General Security Model -- 3.3.2 Type I Attackers -- 3.3.2.1 Security against a Normal Type I Adversary -- 3.3.2.2 Security against a Strong Type I Adversary -- 3.3.2.3 Security against a Super Type I Adversary -- 3.3.3 Type II Attackers -- 3.3.4 Malicious-but-Passive KGC Attacks -- 3.4 SURVEYING CERTIFICATELESS PUBLIC-KEY ENCRYPTION SCHEMES -- 3.4.1 Concrete Constructions of CLE Schemes -- 3.4.2 Generic Constructions of CLE Schemes -- 3.4.3 Pairing-Free Constructions -- 3.4.4 Constructions Secure against Malicious KGC Attacks -- 3.4.5 Extensions of CLE Schemes -- 3.5 CONCRETE CONSTRUCTION -- 3.5.1 Dent-Libert-Paterson CL-PKE -- 3.5.2 Hwang-Liu-Chow CL-PKE -- 3.5.2.1 Security Analysis -- 3.5.3 Huang-Wong CL-PKE -- CHAPTER 4 CLS Secure in the Standard Model -- 4.1 MODELING CERTIFICATELESS SIGNATURE (CLS) SCHEMES -- 4.1.1 Framework of CLS Schemes -- 4.1.2 Equivalence to the Original Seven-Algorithm Framework -- 4.2 SECURITY DEFINITIONS FOR CLS SCHEMES -- 4.2.1 Adversaries and Oracles -- 4.2.2 Type I Adversaries -- 4.2.2.1 Security against a Normal Type I Adversary -- 4.2.2.2 Security against a Strong Type I Adversary -- 4.2.2.3 Security against a Super Type I Adversary -- 4.2.3 Type II Adversaries -- 4.2.4 Malicious-but-Passive KGC Attack -- 4.3 SURVEYING CLS SCHEMES -- 4.4 CONCRETE CONSTRUCTION -- 4.4.1 Xiong-Qin-Li's Scheme -- 4.4.1.1 Complexity Assumption
4.4.1.2 Concrete Construction -- 4.4.1.3 Security Analysis -- 4.4.2 Yuan-Wang CLS -- SECTION III CL-PKC in Random Oracle Models -- CHAPTER 5 Random Oracle Models -- 5.1 RANDOM ORACLE METHODOLOGY -- 5.2 SECURITY PROOFS IN THE RANDOM ORACLE MODEL -- 5.3 CONTROVERSY ABOUT THE RANDOM ORACLE MODEL -- CHAPTER 6 CLE, CLS, and CLAKE Secure in Random Oracle Models -- 6.1 INTRODUCTION -- 6.2 ALRIYAMI-PATERSON CLE -- 6.2.1 Concrete Construction -- 6.2.1.1 Basic CLE Scheme -- 6.2.1.2 Full CLE Scheme -- 6.3 ZHANG-ZHANG CLS -- 6.3.1 Concrete Construction -- 6.3.2 Security Analysis -- 6.4 ZHANG ET AL.'S CL-AKA -- 6.4.1 Framework of CL-AKA Protocol -- 6.4.2 Security Definitions -- 6.4.3 Concrete Construction -- CHAPTER 7 CL-PKC without Pairings -- 7.1 INTRODUCTION -- 7.2 LAI-KOU CLE -- 7.2.1 Concrete Construction -- 7.2.2 Security Analysis -- 7.3 XIONG-WU-CHEN CERTIFICATELESS AUTHENTICATED KEY AGREEMENT (CL-AKA) -- 7.3.1 Concrete Construction -- 7.3.2 Modular Approach for Security Proof in Modified Bellare-Rogaway (mBR) Model -- 7.3.2.1 mBR Model -- 7.3.2.2 Kudla and Paterson's Modular Approach -- 7.3.2.3 Hard Problems -- 7.3.3 Security Analysis -- 7.3.4 Performance -- SECTION IV Applications, Extensions, and Related Paradigms -- CHAPTER 8 Applications of CL-PKC -- 8.1 INTRODUCTION -- 8.2 ONION ROUTING -- 8.2.1 Motivation -- 8.2.2 Catalano-Fiore-Gennaro Scheme -- 8.2.2.1 Framework of Onion Routing -- 8.2.2.2 Security of Onion Routing -- 8.2.2.3 Building Blocks -- 8.2.2.4 Concrete Construction -- 8.2.2.5 Security Analysis -- 8.3 ANONYMOUS REMOTE AUTHENTICATION FOR WBANs -- 8.3.1 Motivation -- 8.3.2 Xiong's Protocol -- 8.3.2.1 Notations -- 8.3.2.2 System Model -- 8.3.2.3 Objectives -- 8.3.2.4 Concrete Construction -- 8.3.2.5 Security Analysis -- 8.3.2.6 Comparison with Previous Protocols -- 8.4 SECURE DATA SHARING IN CLOUD COMPUTING -- 8.4.1 Motivation
8.4.2 Qin-Wu-Xiong Scheme -- 8.4.2.1 Formal Definition -- 8.4.2.2 Security Model -- 8.4.2.3 Concrete Construction -- 8.4.2.4 Security Analysis -- 8.4.2.5 Performance Evaluation -- CHAPTER 9 Extensions of CL-PKC -- 9.1 INTRODUCTION -- 9.2 CERTIFICATELESS SIGNCRYPTION -- 9.2.1 Related Work -- 9.2.2 Formal Definition -- 9.2.3 Xiong's Scheme -- 9.2.4 Analysis -- 9.3 CERTIFICATELESS AGGREGATE SIGNATURE -- 9.3.1 Related Work -- 9.3.2 Formal Definition -- 9.3.3 Xiong-Wu-Chen's Scheme -- 9.3.4 Security Proof -- 9.4 CERTIFICATELESS RING SIGNATURE -- 9.4.1 Related Work -- 9.4.2 Formal Definition -- 9.4.3 Qin et al.'s Scheme -- 9.4.4 Analysis -- 9.5 CERTIFICATELESS THRESHOLD SIGNATURE -- 9.5.1 Related Work -- 9.5.2 Formal Definition -- 9.5.3 Xiong-Li-Qin Scheme -- 9.5.4 Analysis -- CHAPTER 10 Comparisons between CL-PKC, SGC-PKC, and CB-PKC -- SECTION V Future Directions -- CHAPTER 11 Perspectives -- References -- Index
Notes Print version record
Subject Public key infrastructure
Public key cryptography.
Identification.
Data encryption
Computer networks -- Security measures.
Computer networks -- Security measures
Identification
Public key cryptography
Form Electronic book
Author Qin, Zhen
Vasilakos, Athanasios V
ISBN 9781315355399
1315355396
1482248611
9781482248616
9781315336336
1315336332
9781315372693
131537269X