About this book
If you're looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE have only been found in cumbersome, hard-to-follow journal articles and conference proceedings. This is the first book to offer you complete, easy-to-understand guidance on the subject. Comparing and contrasting IBE with traditional public-key technologies, the book clearly explains how and why IBE systems are secure. You find a wealth of practical techniques, algorithms and numerous worked examples that enable you to create a secure IBE system.From basic mathematical concepts and properties, properties of elliptic curves, divisors and the Tate pairing, and cryptography and computational complexity, to related cryptographic algorithms, various IBE schemes, hierarchical IBE and master secret planning, and calculating pairings, this comprehensive volume serves as a clear guide to this increasingly important security technology. This hands-on volume includes detailed pseudocode for identity-based encryption algorithms and supporting algorithms that help save you time and simplify your challenging projects in the field.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Contents
- Preface
- 1 Introduction
- 2 Basic Mathematical Concepts and Properties
- 3 Properties of Elliptic Curves
- 4 Divisors and the Tate Pairing
- 5 Cryptography and Computational Complexity
- 6 Related Cryptographic Algorithms
- 7 The Cocks IBE Scheme
- 8 Boneh-Franklin IBE
- 9 Boneh-Boyen IBE
- 10 Sakai-Kasahara IBE
- 11 Hierarchical IBE and Master Secret Sharing
- 12 Calculating Pairings
- Appendix: Useful Test Data
- About the Author
