ABSTRACT
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
TABLE OF CONTENTS
part I|56 pages
Setting the Stage
part II|70 pages
CL-PKC without Random Oracles
part III|42 pages
CL-PKC in Random Oracle Models
part IV|100 pages
Applications, Extensions, and Related Paradigms
part V|4 pages
Future Directions