000 a
999 _c33015
_d33015
008 240408b xxu||||| |||| 00| 0 eng d
020 _a9781789450965
_chbk
082 _a005.82
_bPOI
100 _aPointcheval, David
_eed.
245 _aAsymmetric cryptography : primitives and protocols
260 _bISTE Ltd,
_c2022
_aLondon :
300 _axii,286 p. ;
_bill.,
_c25 cm
365 _b164.95
_c$
_d86.30
490 _aSciences. Computer science. Cryptography, data security
504 _aIncludes index.
520 _aPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves .Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme.
650 _aVerifiable computation
650 _aMulti-recipient encryption schemes
650 _aAnonymous signatures
650 _aAdvanced cryptographic schemes
650 _aEncryption
650 _aCiphertext
942 _2ddc
_cBK