Lattice-Based Cryptosystems: A Design Perspective Jiang Zhang, Zhenfeng Zhang

By: Contributor(s): Material type: TextTextPublication details: Singapore Springer 2020Description: 174ISBN:
  • 9789811584268
DDC classification:
  • 621.381 ZHA
Contents:
1 Introduction 1.1 Cryptography based on number theory problems 1.2 Post-quantum cryptography 1.3 Lattice-based cryptosystems 2. Lattices 2.1 Definition 2.2 Discrete Gaussian 2.3 Small Integer Solutions 2.4 Learning with Errors 2.5 Trapdoor Generation 3. Public-key encryption 3.1 Definition 3.2 PKE against CPA attacks 3.2 Achieving CCA-Security in the random oracle model 3.3 CCA-secure PKE in the standard model 4. Identity-based encryption 4.1 Definition 4.2 The GPV IBE scheme 4.3 Short IBE in the standard model 5. Attribute-based encryption 5.1 Definition 5.2 ABE supporting and-gate policy 5.3 ABE supporting flexible threshold policy 5.4 Functional encryption 6. Key Exchanges 6.1 Definition 6.2 Key exchange against passive attacks 6.3 Implicit authenticated key exchange 6.4 Password-based authenticate key exchange 7. Digital signatures 7.1 Definition 7.2 Signatures in the random oracle model 7.3 Short signatures with tight security 7.4 Group signatures
Summary: This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.
List(s) this item appears in: NEW ARRIVALS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books IIITDM Kurnool COMPUTER SCIENCE ENGINEERING Non-fiction 621.381 (Browse shelf(Opens below)) Available 0005960
Books Books IIITDM Kurnool COMPUTER SCIENCE ENGINEERING Non-fiction 621.381 (Browse shelf(Opens below)) Available 0005961
Reference Reference IIITDM Kurnool Reference Reference 621.381 (Browse shelf(Opens below)) Not For Loan 0005962

1 Introduction

1.1 Cryptography based on number theory problems

1.2 Post-quantum cryptography

1.3 Lattice-based cryptosystems

2. Lattices

2.1 Definition

2.2 Discrete Gaussian

2.3 Small Integer Solutions

2.4 Learning with Errors

2.5 Trapdoor Generation

3. Public-key encryption

3.1 Definition

3.2 PKE against CPA attacks

3.2 Achieving CCA-Security in the random oracle model

3.3 CCA-secure PKE in the standard model

4. Identity-based encryption

4.1 Definition

4.2 The GPV IBE scheme

4.3 Short IBE in the standard model

5. Attribute-based encryption

5.1 Definition

5.2 ABE supporting and-gate policy

5.3 ABE supporting flexible threshold policy

5.4 Functional encryption

6. Key Exchanges

6.1 Definition

6.2 Key exchange against passive attacks

6.3 Implicit authenticated key exchange

6.4 Password-based authenticate key exchange

7. Digital signatures

7.1 Definition

7.2 Signatures in the random oracle model

7.3 Short signatures with tight security

7.4 Group signatures

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.

There are no comments on this title.

to post a comment.
LIBRARY HOURS
Mon - Sat : 9:00 AM - 5.30 PM
Library will remain closed on public holidays
Contact Us

Librarian
Central Libray
Indian Institute of Information Technology Design and Manufacturing Kurnool
Andhra Pradesh - 518 007

Library Email ID: library@iiitk.ac.in

Copyright @ Central Library | IIITDM Kurnool

Powered by Koha