Details

Functional Encryption


Functional Encryption


EAI/Springer Innovations in Communication and Computing

von: Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 12.06.2021
ISBN/EAN: 9783030608903
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<p>This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara&nbsp;IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures.</p><p></p><ul><li>Explains the latest functional encryption algorithms in a simple way with examples;</li><li>Includes applications of functional encryption in information security, application security, and network security;</li><li>Relevant to academics, research scholars, software developers, etc.</li></ul><p></p><p> </p><p></p>
<p>Introduction.- &nbsp;Foundations of Functional Encryption.- Mathematical Concepts and Properties.- Elliptic Curve Cryptography.- XTR Algorithm: Efficient and Compact Subgroup Trace Representation.- HECC: Hyperelliptic Curve Cryptography.- Pairing-Based Cryptography.- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units.- Cocks IBE Scheme.- Boneh-Franklin IBE.- Boneh-Boyen IBE.- Sakai-Kasahara IBE.- Hierarchical IBE.- Extensions of IBE and Related Primitives.- Attribute Based Encryption.- Digital Signatures.- Applications of Functional Encryption.- IRON: Functional Encryption Using Intel SGX&nbsp;.- Conclusion.</p><p></p><br>
<p><b>Dr. Khairol Amali bin Ahmad</b>&nbsp;obtained a BSc in Electrical Engineering in 1992 from the United States Military Academy, West Point and an MSc in Military Electronic Systems Engineering in 1999 from Cranfield University. While serving in the Malaysian Army, he was positioned in various posts and units including those dealing with engineering maintenance and procurement consultation of equipment. He then joined the National Defence University of Malaysia (NDUM) and completed his PhD from ISAE-SUPAERO, France in 2015. Currently, he is the Dean of the Engineering Faculty and an associate to Centre for Tropicalization (CENTROP) and Centre of Defence Research and Technology (CODRAT) in NDUM. He serves as a Vice Chairman of Malaysia Radar and Navigation Interest Group (MyRANig) of MySET. He is also a member of the Institution of Engineering and Technology (IET), Board of Engineer Malaysia (BEM) and Malaysia Board of Technologists (MBOT). He has served as Organizing Chair of several international conferences such as DSTC2016 and IntCET2017. He has also delivered an expert talk, guest lecturers in the conference and serving as a reviewer for several conferences and journals. Among his current research interests include signal processing related to signal propagation in Tropical area, mesh networks for IoT applications and Delay\Disruption Tolerant Network (DTN). &nbsp;He is also serving as Guest Editor of International Journal of Innovative Computing and Applications (InderScience), Journal of Recent Patents on Engineering, Bentham Science and Scalable Computing: Practice and Experience (SCPE).</p><p><b>Dr. Khaleel Ahmad</b>&nbsp;is currently an Assistant Professor in the School of Computer Science & Information Technology at Maulana Azad National Urdu University, Hyderabad. He has visited the National Defence University of Malaysia, Malaysia as a visiting faculty. He holds a PhD in Computer Science & Engineering and M.Tech in Information Security. His researcharea is Cyber Security, Cryptography, Blockchain Technology and Opportunistic Network. He has 30 published papers in refereed national/international journals and conferences (viz. Elsevier, ACM, IEEE, and Springer), 10 book chapters (CRC Press, IGI Global, IGI Global, Wiley). He has also edited two books for Taylor & Francis titled “Opportunistic Networks: Mobility Models, Protocols, Security & Privacy” and “Emerging Security Algorithms and Techniques”. In addition, He has also organized special sessions in many International Conferences viz. IEEE GCCE 2016 Japan, IEEE GCCE 2017 Japan. He has completed successfully project of Rs. 1Lakhs and Five Thousand (INR). He has supervised 4 M.Tech and 3 PhD under progress. He has delivered guest lectures at the Central University of Haryana, India and Telangana University, India and also chaired the session at an international conference in Hyderabad. He is also serving as Guest Editor of International Journal of Innovative Computing and Applications (InderScience), Journal of Recent Patents on Engineering, Bentham Science and Scalable Computing: Practice and Experience (SCPE). He is also the life member of various international/national research societies viz. ISTE, CRSI, ISCA, IACSIT (Singapore), IAENG (Hong Kong), IARCS, IAOE (Austria), ISOC (USA) etc. In addition, he is associated with many international research organizations as editorial board member and reviewer.</p><p><b>Dr. Uma N. Dulhare</b>&nbsp;is currently working as a Professor in Department of Computer Science & Engg, MuffaKham Jah College of Engineering, Banjara Hills, Hyderabad. She has more than 20 years teaching experience. She received her Ph.D from Osmania University, Hyderabad Her research interest includes Data Mining, Big Data Analytics and Machine Learning, IOT, Cloud computing, Biomedical Image Processing. She has published more than 30 research papers in reputed National & International Journals & as a book chapter. She is a Member of Computer Science Teachers Association (CSTA), USA, Senior Member of International Association of Engineers (IAENG), Senior member of Universal Association of Computer and Electronics Engineers (UACEE) Life Member of ISTE. She is a member of editorial board for various National and International journals in the field of Computer Science and program committee member/reviewer for various International conferences. She is also a pride recipient of Best Computer Science Faculty, Best Academic Researcher, Teaching & Research Excellence, Outstanding Educator & Scholar award.</p>
<p>This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking.</p><p></p><ul><li>Explains the latest functional encryption algorithms in a simple way with examples;</li><li>Includes applications of functional encryption in information security, application security, and network security;</li><li>Relevant to academics, research scholars, software developers, etc.</li></ul><p></p>
Explains the latest functional encryption algorithms in a simple way with examples Includes applications of functional encryption in information security, application security, and network security Relevant to academics, research scholars, software developers, etc.

Diese Produkte könnten Sie auch interessieren:

Ground Penetrating Radar
Ground Penetrating Radar
von: Mohammed Serhir, Dominique Lesselier
EPUB ebook
142,99 €
Computational Imaging for Scene Understanding
Computational Imaging for Scene Understanding
von: Takuya Funatomi, Takahiro Okabe
EPUB ebook
142,99 €