ABSTRACT

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

part I|56 pages

Setting the Stage

chapter 1|10 pages

Avoiding Key Escrow

chapter 2|44 pages

Foundations

part II|70 pages

CL-PKC without Random Oracles

chapter 3|41 pages

CLE Secure in the Standard Model

chapter 4|26 pages

CLS Secure in the Standard Model

part III|42 pages

CL-PKC in Random Oracle Models

chapter 5|6 pages

Random Oracle Models

chapter 7|16 pages

CL-PKC without Pairings

part IV|100 pages

Applications, Extensions, and Related Paradigms

chapter 8|41 pages

Applications of CL-PKC

chapter 9|54 pages

Extensions of CL-PKC

part V|4 pages

Future Directions

chapter 11|2 pages

Perspectives