000 02817nam a22003735i 4500
001 22663618
003 CSPC
005 20250324150925.0
008 220623s2022 nju 000 0 eng
010 _a 2022941485
020 _a9781789450965
_q(hardback)
040 _aDLC
_beng
_erda
_cDLC
_dCSPC
042 _apcc
050 0 4 _aQA76.9.A25
_bA83 2022
082 0 4 _a005.824
_bAs99
245 0 0 _aAsymmetric cryptography :
_bprimitives and protocols /
_ccoordinated by David Pointcheval.
263 _a2207
264 1 _aLondon ;
_aHoboken, NJ :
_bISTE Ltd / John Wiley and Sons Inc.,
_c2022.
300 _axii, 286 pages ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 _aSciences. Computer science. Cryptography, data security
504 _aIncludes bibliographical references and index.
505 0 _aPublic-key encryption and security notions -- Signatures and security notions -- Zero-knowledge proofs -- Secure multiparty computation -- Pairing-based cryptography -- Broadcast encryption and traitor tracing -- Attribute-based encryption -- Advanced signatures -- Key exchange -- Password authenticated key exchange: protocols and security models -- Verifiable computation and succinct arguments for NP.
520 _aPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
700 1 _aPointcheval, David,
_ecoordinator.
906 _a0
_bibc
_corignew
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_n0
_cBK
_h005.824
_iAs99
_kCIR
_m2022
999 _c29213
_d29213