Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Practitioners and engineers who have to implement real-world IBE schemes, and need a proper understanding of the basic IBE techniques, will find this book a valuable asset
Covers Elliptic Curves and Pairings, obtaining security against chosen Ciphertext Attacks, standards and more
Peter Wild, Editor and Chief of Springer’s Journal Designs Codes and Cryptography, remarks “This is a very active area, and it would be useful to have a reference text and to provide a common basis for the study of these systems. This would be a pioneering contribution in book form.”
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.
Content Level »Research
Keywords »(identity-based) signature and key agreement protocols - Public key cryptography - certificate-less and certificate-based encryption - dual system encryption - hierarchical identity-based encryption - identity-based encryption - lattice based cryptography - pairing based cryptography - products and standards for IBE - provable security