Lattice-Based Cryptosystems: (Record no. 2361)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02147nam a22001817a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240802122948.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240802b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789811584268 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 621.381 |
Edition number | ZHA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Zhang, Jiang |
245 ## - TITLE STATEMENT | |
Title | Lattice-Based Cryptosystems: |
Remainder of title | A Design Perspective |
Statement of responsibility, etc. | Jiang Zhang, Zhenfeng Zhang |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Singapore |
Name of publisher, distributor, etc. | Springer |
Date of publication, distribution, etc. | 2020 |
300 ## - PHYSICAL DESCRIPTION | |
Page number | 174 |
505 ## - FORMATTED CONTENTS NOTE | |
Title | 1 Introduction<br/><br/>1.1 Cryptography based on number theory problems<br/><br/>1.2 Post-quantum cryptography<br/><br/>1.3 Lattice-based cryptosystems<br/><br/>2. Lattices<br/><br/>2.1 Definition<br/><br/>2.2 Discrete Gaussian<br/><br/>2.3 Small Integer Solutions<br/><br/>2.4 Learning with Errors<br/><br/>2.5 Trapdoor Generation<br/><br/>3. Public-key encryption<br/><br/>3.1 Definition<br/><br/>3.2 PKE against CPA attacks<br/><br/>3.2 Achieving CCA-Security in the random oracle model<br/><br/>3.3 CCA-secure PKE in the standard model<br/><br/>4. Identity-based encryption<br/><br/>4.1 Definition<br/><br/>4.2 The GPV IBE scheme<br/><br/>4.3 Short IBE in the standard model<br/><br/>5. Attribute-based encryption<br/><br/>5.1 Definition<br/><br/>5.2 ABE supporting and-gate policy<br/><br/>5.3 ABE supporting flexible threshold policy<br/><br/>5.4 Functional encryption<br/><br/>6. Key Exchanges<br/><br/>6.1 Definition<br/><br/>6.2 Key exchange against passive attacks<br/><br/>6.3 Implicit authenticated key exchange<br/><br/>6.4 Password-based authenticate key exchange<br/><br/>7. Digital signatures<br/><br/>7.1 Definition<br/><br/>7.2 Signatures in the random oracle model<br/><br/>7.3 Short signatures with tight security<br/><br/>7.4 Group signatures |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area. |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhenfeng Zhang |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
-- | 7057 |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
-- | 7058 |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
-- | 7059 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Currency | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | IIITDM Kurnool | IIITDM Kurnool | COMPUTER SCIENCE ENGINEERING | 02.08.2024 | Narendra Publishing House | 149.99 | NPH/24-25/IN-00122 DT 22/7/2024 | 621.381 | 0005960 | 02.08.2024 | 149.99 | 02.08.2024 | EURO | Books | |||||
Dewey Decimal Classification | Non-fiction | IIITDM Kurnool | IIITDM Kurnool | COMPUTER SCIENCE ENGINEERING | 02.08.2024 | Narendra Publishing House | 149.99 | NPH/24-25/IN-00122 DT 22/7/2024 | 621.381 | 0005961 | 02.08.2024 | 149.99 | 02.08.2024 | EURO | Books | |||||
Dewey Decimal Classification | Not For Loan | Reference | IIITDM Kurnool | IIITDM Kurnool | Reference | 02.08.2024 | Narendra Publishing House | 149.99 | NPH/24-25/IN-00122 DT 22/7/2024 | 621.381 | 0005962 | 02.08.2024 | 149.99 | 02.08.2024 | EURO | Reference |