Practical Signcryption

Nonfiction, Computers, Advanced Computing, Theory, General Computing, Internet
Cover of the book Practical Signcryption by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783540894117
Publisher: Springer Berlin Heidelberg Publication: November 11, 2010
Imprint: Springer Language: English
Author:
ISBN: 9783540894117
Publisher: Springer Berlin Heidelberg
Publication: November 11, 2010
Imprint: Springer
Language: English

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

More books from Springer Berlin Heidelberg

Cover of the book Infinitesimalrechnung by
Cover of the book Multiscale Computer Modeling in Biomechanics and Biomedical Engineering by
Cover of the book Compiler Design by
Cover of the book Mercury in the Biogeochemical Cycle by
Cover of the book Nanostructured Materials for Next-Generation Energy Storage and Conversion by
Cover of the book A Concise Guide to Endodontic Procedures by
Cover of the book Transactions on Computational Science XXVI by
Cover of the book Prosopagnosia by
Cover of the book Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 by
Cover of the book The Seven Principles of WOM and Buzz Marketing by
Cover of the book Biomedical Optical Imaging Technologies by
Cover of the book Intrinsic Neuronal Organization of the Vestibular Nuclear Complex in the cat by
Cover of the book Uncertainties and Limitations in Simulating Tropical Cyclones by
Cover of the book Aufgabensammlung Analysis 1 by
Cover of the book Lesen und Schreiben lernen by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy