Asymmetric cryptography : primitives and protocols /

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been develo...

Full description

Saved in:
Bibliographic Details
Other Authors: Pointcheval, David (Editor)
Format: Electronic eBook
Language:English
Published: London, UK : Hoboken, NJ : ISTE, Ltd. ; John Wiley & Sons, Inc., 2022.
Series:Sciences. Computer science: Cryptography, data security.
Subjects:
Online Access:CONNECT
Table of Contents:
  • Front Matter
  • Public-Key Encryption and Security Notions / Nuttapong ATTRAPADUNG, Takahiro MATSUDA
  • Signatures and Security Notions / Marc FISCHLIN
  • Zero-Knowledge Proofs / Ivan VISCONTI
  • Secure Multiparty Computation / Yehuda LINDELL
  • Pairing-Based Cryptography / Olivier BLAZY
  • Broadcast Encryption and Traitor Tracing / Duong HIEU PHAN
  • Attribute-Based Encryption / Romain GAY
  • Advanced Signatures / Olivier SANDERS
  • Key Exchange / Colin BOYD
  • Password Authenticated Key Exchange / Stanislaw JARECKI
  • Verifiable Computation and Succinct Arguments for NP / Dario FIORE
  • List of Authors
  • Index