Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.
Summary
"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket.