12FUNDAMENTALS OF IDENTITY-BASED CRYPTOGRAPHY
AYMEN BOUDGUIGA, MARYLINE LAURENT, AND MOHAMED HAMDI
Contents
12.1 Introduction to Cryptography
12.1.2 Asymmetric Cryptography
12.1.3 Diffie–Hellman (DH) Algorithms
12.1.4 Rivest, Shamir, and Adleman (RSA) Algorithms
12.1.5 Elliptic Curve Cryptography (ECC)
12.1.5.2 Elliptic Curve Digital Signature Algorithm
12.2.1 ID-Based Key Construction
12.2.3 Examples of ID-Based Encryption Schemes
12.2.3.1 Boneh and Franklin Encryption Scheme
12.2.3.2 Boneh and Boyen Encryption Schemes
12.2.3.3 Chen et al. Encryption Scheme
Get Practical Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.