Verifiable Composition of Signature and Encryption - Laila El Aimani

Verifiable Composition of Signature and Encryption

A Comprehensive Study of the Design Paradigms

(Autor)

Buch | Softcover
XX, 148 Seiten
2018 | 1. Softcover reprint of the original 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-88551-3 (ISBN)
106,99 inkl. MwSt

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.

This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.

This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

Laila El Aimani is researcher in cryptology and assistant professor at Cadi Ayyad University, Morocco. In 2011, she graduated from Universitat Bonn (Germany) as a Dr.rer.nat under the supervision of Joachim von zur Gathen. A good part of her PhD research was dedicated to the design and analysis of privacy-preserving mechanisms (e.g. undeniable/confirmer signatures, signcryption). Later, she joined the Security Labs of Technicolor (France) as a research engineer in security and privacy. After a short sojourn in Gemalto (France) in 2013, she joined the computer science department of Cadi Ayyad University (Morocco) as a researcher and assistant professor. Laila filed three patents on applied cryptology, and co-authored several research papers on cryptology/security.

Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.

Erscheinungsdatum
Zusatzinfo XX, 148 p. 34 illus., 5 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 266 g
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Schlagworte cryptographic protocols • Encryption • signature • verifiability • Zero Knowledge
ISBN-10 3-319-88551-0 / 3319885510
ISBN-13 978-3-319-88551-3 / 9783319885513
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media

von Jens Gallenbacher

Buch | Softcover (2021)
Springer (Verlag)
29,99
Interlingua zur Gewährleistung semantischer Interoperabilität in der …

von Josef Ingenerf; Cora Drenkhahn

Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99