Normal view MARC view ISBD view

Functional Encryption [electronic resource] / edited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare.

Contributor(s): Ahmad, Khairol Amali Bin [editor.] | Ahmad, Khaleel [editor.] | Dulhare, Uma N [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: EAI/Springer Innovations in Communication and Computing: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021.Description: X, 309 p. 84 illus., 18 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030608903.Subject(s): Telecommunication | Data structures (Computer science) | Information theory | Mathematics | Communications Engineering, Networks | Data Structures and Information Theory | Applications of MathematicsAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.
In: Springer Nature eBookSummary: This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
    average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.

There are no comments for this item.

Log in to your account to post a comment.