|
Showing 1 - 4 of
4 matches in All Departments
As an intermediate model between conventional PKC and ID-PKC,
CL-PKC can avoid the heavy overhead of certificate management in
traditional PKC as well as the key escrow problem in ID-PKC
altogether. Since the introduction of CL-PKC, many concrete
constructions, security models, and applications have been proposed
during the last decade. Differing from the other books on the
market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security
are provided in a manner that makes them easy to understand.
As one of the most important group-oriented signatures, ring
signatures were initially formalised by Rivet et al. and allows an
entity to conscript a group of ring members at will and sign a
message in the name of the group without revealing a real identity.
Featured with spontaneity and unconditional anonymity, ring
signatures have found widespread applications in fair exchange,
electronic commerce, wireless sensor networks and vehicular ad-hoc
networks. A survey of ring signatures is presented in this book to
provide researchers and scholars with a better understanding of
this primitive cryptography. To be specific, we survey
state-of-the-art ring signature schemes insightfully according to
the design philosophies of these schemes. The existing schemes have
also been classified in view of various perspectives. Furthermore,
the security model and efficiency of existing schemes have been
compared. On the other hand, the extensions of ring signature
schemes, such as proxy ring signature, threshold ring signature,
ring signcryption, deniable ring signature, linkable ring signature
and conditional anonymous ring signature, are also investigated.
Finally, the challenges and future directions of ring signatures,
such as the construction with constant-size, the efficiency and
provably-secure construction in the standard model, and new
application scenarios have also been given.
As an intermediate model between conventional PKC and ID-PKC,
CL-PKC can avoid the heavy overhead of certificate management in
traditional PKC as well as the key escrow problem in ID-PKC
altogether. Since the introduction of CL-PKC, many concrete
constructions, security models, and applications have been proposed
during the last decade. Differing from the other books on the
market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security
are provided in a manner that makes them easy to understand.
|
You may like...
She Said
Carey Mulligan, Zoe Kazan, …
DVD
R93
Discovery Miles 930
The Northman
Alexander Skarsgard, Nicole Kidman, …
Blu-ray disc
(1)
R210
Discovery Miles 2 100
|