| 000 | 02817nam a22003735i 4500 | ||
|---|---|---|---|
| 001 | 22663618 | ||
| 003 | CSPC | ||
| 005 | 20250324150925.0 | ||
| 008 | 220623s2022 nju 000 0 eng | ||
| 010 | _a 2022941485 | ||
| 020 |
_a9781789450965 _q(hardback) |
||
| 040 |
_aDLC _beng _erda _cDLC _dCSPC |
||
| 042 | _apcc | ||
| 050 | 0 | 4 |
_aQA76.9.A25 _bA83 2022 |
| 082 | 0 | 4 |
_a005.824 _bAs99 |
| 245 | 0 | 0 |
_aAsymmetric cryptography : _bprimitives and protocols / _ccoordinated by David Pointcheval. |
| 263 | _a2207 | ||
| 264 | 1 |
_aLondon ; _aHoboken, NJ : _bISTE Ltd / John Wiley and Sons Inc., _c2022. |
|
| 300 |
_axii, 286 pages ; _c24 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | _aSciences. Computer science. Cryptography, data security | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPublic-key encryption and security notions -- Signatures and security notions -- Zero-knowledge proofs -- Secure multiparty computation -- Pairing-based cryptography -- Broadcast encryption and traitor tracing -- Attribute-based encryption -- Advanced signatures -- Key exchange -- Password authenticated key exchange: protocols and security models -- Verifiable computation and succinct arguments for NP. | |
| 520 | _aPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation | ||
| 650 | 0 | _aCryptography. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 700 | 1 |
_aPointcheval, David, _ecoordinator. |
|
| 906 |
_a0 _bibc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
| 942 |
_2ddc _n0 _cBK _h005.824 _iAs99 _kCIR _m2022 |
||
| 999 |
_c29213 _d29213 |
||