
- English
- PDF
- Available on iOS & Android
About this book
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves.
Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange.
After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Foreword
- Chapter 1. Public-Key Encryption and Security Notions
- Chapter 2. Signatures and Security Notions
- Chapter 3. Zero-Knowledge Proofs
- Chapter 4. Secure Multiparty Computation
- Chapter 5. Pairing-Based Cryptography
- Chapter 6. Broadcast Encryption and Traitor Tracing
- Chapter 7. Attribute-Based Encryption
- Chapter 8. Advanced Signatures
- Chapter 9. Key Exchange
- Chapter 10. Password Authenticated Key Exchange: Protocols and Security Models
- Chapter 11. Verifiable Computation and Succinct Arguments for NP
- List of Authors
- Index
- EULA