000 03617nam a22005775i 4500
001 978-3-030-60890-3
003 DE-He213
005 20220801220519.0
007 cr nn 008mamaa
008 210612s2021 sz | s |||| 0|eng d
020 _a9783030608903
_9978-3-030-60890-3
024 7 _a10.1007/978-3-030-60890-3
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aFunctional Encryption
_h[electronic resource] /
_cedited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aX, 309 p. 84 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
505 0 _aIntroduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion.
520 _aThis book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
650 0 _aTelecommunication.
_910437
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aMathematics.
_911584
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aApplications of Mathematics.
_931558
700 1 _aAhmad, Khairol Amali Bin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_950746
700 1 _aAhmad, Khaleel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_919374
700 1 _aDulhare, Uma N.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_950747
710 2 _aSpringerLink (Online service)
_950748
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030608897
776 0 8 _iPrinted edition:
_z9783030608910
776 0 8 _iPrinted edition:
_z9783030608927
830 0 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
_950749
856 4 0 _uhttps://doi.org/10.1007/978-3-030-60890-3
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78644
_d78644