• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2948695]
• Literatura piękna
 [1824038]

  więcej...
• Turystyka
 [70868]
• Informatyka
 [151073]
• Komiksy
 [35227]
• Encyklopedie
 [23181]
• Dziecięca
 [621575]
• Hobby
 [138961]
• AudioBooki
 [1642]
• Literatura faktu
 [228651]
• Muzyka CD
 [371]
• Słowniki
 [2933]
• Inne
 [445341]
• Kalendarze
 [1243]
• Podręczniki
 [164416]
• Poradniki
 [479493]
• Religia
 [510449]
• Czasopisma
 [502]
• Sport
 [61384]
• Sztuka
 [243086]
• CD, DVD, Video
 [3417]
• Technologie
 [219673]
• Zdrowie
 [100865]
• Książkowe Klimaty
 [124]
• Zabawki
 [2168]
• Puzzle, gry
 [3372]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7838]
Kategorie szczegółowe BISAC

Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments

ISBN-13: 9781119989356 / Angielski / Twarda / 2023 / 200 str.

Qi Xia; Jianbin Gao; Isaac Obiri
Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments Daniel Adu Worae 9781119989356 John Wiley & Sons Inc - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments

ISBN-13: 9781119989356 / Angielski / Twarda / 2023 / 200 str.

Qi Xia; Jianbin Gao; Isaac Obiri
cena 488,52
(netto: 465,26 VAT:  5%)

Najniższa cena z 30 dni: 482,54
Termin realizacji zamówienia:
ok. 30 dni roboczych.

Darmowa dostawa!
Kategorie:
Technologie
Kategorie BISAC:
Computers > Security - Cryptography & Encryption
Computers > Data Science - General
Computers > Distributed Systems - Cloud Computing
Wydawca:
John Wiley & Sons Inc
Język:
Angielski
ISBN-13:
9781119989356
Rok wydania:
2023
Dostępne języki:
Ilość stron:
200
Oprawa:
Twarda

About the Authors xiiiPreface xvAcknowledgments xviiPart I Attribute-Based Encryption (ABE) 11 Foundation of Attribute-Based Encryption 31.1 Introduction 31.1.1 Symmetric Encryption 41.1.2 Asymmetric Key Encryption 41.1.3 Identity-Based Encryption 51.2 Functional Encryption 71.2.1 Applications of Attribute-Based Encryption 81.2.2 Problems with Attribute-Based Encryption 91.2.3 A Brief History of Security Proof of Functional Encryption 91.2.4 Dual System of Encryption 101.2.5 Summary 11References 122 Mathematical Background 152.1 Group Theory 152.1.1 Law of Composition 152.1.2 Groups 152.1.3 Subgroups 162.1.4 Homomorphisms 172.1.5 Cyclic Group 172.2 Ring Theory 202.2.1 Ideals and Quotient Rings 212.2.2 Euler's Totient Function 222.2.3 Polynomial Rings 222.2.4 Irreducible and Monic Polynomials 222.2.5 Field Theory 232.2.5.1 Quotient Field 242.2.6 Field Characteristic 24Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page vi[1][1] [1][1]vi Contents2.2.7 Algebraic Extension Felds 242.3 Elliptic Curves 242.3.1 Plane Curve 242.3.2 Group Operations on Elliptic Curves 262.3.2.1 Point Addition 262.3.2.2 Point Doubling 272.4 Divisors and Bilinear Map 282.4.1 Divisors 282.4.2 The Degree and Support ofD 292.4.3 The Divisor of a Function f onE 292.4.4 Equivalence of Divisors 302.4.5 Bilinear Map 312.4.6 Weil Pairing 312.4.7 Miller's Algorithm 322.4.8 The Tate Pairing 342.5 Summary 36References 363 Attribute-Based Encryption 373.1 Introduction 373.2 Basic Components of ABE Construction 393.2.1 Secret-Sharing Schemes 393.2.2 Polynomial Interpolation 413.2.2.1 Polynomials Over the Reals 413.2.2.2 Polynomials ModulusP 443.2.3 Shamir Secret Sharing 453.2.4 Verifiable Secret Sharing (VSS) 473.2.4.1 Algorithm for Converting Access Structure Into LSSS Matrix 473.2.4.2 Access Structure Example 483.2.4.3 Algorithms in Attribute-Based Encryption 493.2.5 Properties of Attribute-Based Encryption 513.2.6 Prime Order Group 513.3 Cryptographic Hard Assumptions 513.3.1 Composite Order Bilinear Groups 543.3.2 Complexity Assumptions 553.4 Provable Security 563.5 Security Notions 573.5.1 Summary 57References 584 Data Access Control 614.1 Introduction 614.1.1 Coarse-Grained 624.1.2 Fine-Grained Access Control 634.1.3 Importance of Fine-Grained Access Control 644.2 Concerns About Cloud-Based Access Control that Are Trustworthy 654.2.1 Encryption Access Control 65Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page vii[1][1] [1][1]Contents vii4.2.2 Requirements for Encryption-Based Access Control 674.3 Summary 67References 675 Selective Secure ABE Schemes Based on Prime Order Group 695.1 Introduction 695.1.1 Selective Security Model for KP-ABE 705.1.2 Selective Security Model for CP-ABE 705.1.3 ABE Schemes 715.2 The KP-ABE Scheme 715.2.1 Concrete Scheme Construction 715.2.2 Security Proof 735.3 The CP-ABE Scheme 745.3.1 Concrete Scheme Construction 745.3.2 Security Proof 765.4 Summary 77References 776 Fully Secure ABE Schemes Based on Composite and Prime Order Groups 796.1 Introduction 796.2 A Fully Secure CP-ABE from Composite Order Group 816.2.1 CP-ABE Construction 826.2.2 Adaptive Security Proof 836.2.2.1 Description of Hybrids 836.2.3 Security Proof 846.3 A Fully Secure KP-ABE Scheme Based on Dual Vector Space 846.3.1 KP-ABE Construction 856.3.2 Adaptive Security 876.3.3 Security Proof 886.4 KP-ABE Scheme Based on Matrix 896.4.1 The Scheme 896.4.2 Adaptive Security 906.4.3 Security Proof 916.5 Summary 91References 92Part II Concepts of Blockchain Technology 957 Blockchain Technology 977.1 Introduction 977.1.1 History 977.1.2 Preliminary Concepts of Blockchain Technology 987.1.3 Characteristics of Blockchain 1007.1.4 Evolution and Types of Blockchain 1047.1.4.1 The Blockchain 1.0 1047.1.4.2 Blockchain 2.0 104Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page viii[1][1] [1][1]viii Contents7.1.4.3 Blockchain 3.0 1057.1.5 Permissionless vs Permissioned Blockchains 1057.1.6 Types of Blockchain 1057.2 Architecture of Blockchain 1067.2.1 Architecture of Blockchain 1.0 (Cryptocurrencies) 1067.2.2 Block 1067.2.3 Node 1077.2.4 Types of Blockchain Nodes 1077.2.5 Consensus 1107.3 Architecture of Blockchain 2.0 (Smart Contracts) 1107.3.1 Introduction to Smart Contracts 1107.3.2 How Smart ContractsWork 1117.3.3 Example of Smart Contract 1117.3.4 Uses of Smart Contracts 1117.3.5 Advantages of Smart Contracts 1127.3.6 Limitations of Smart Contracts 1127.4 Architecture of Blockchain 3.0 (Blockchain Applications) 1137.4.1 Consensus Mechanism 1137.5 Blockchain 4.0 1187.5.1 Blockchain 4.0 Applications 1197.5.2 Metaverse 1197.5.3 Industrial Revolution 4.0 1207.5.4 Blockchain 4.0 for Businesses 120References 1208 Scaling-Out Blockchains with Sharding 1258.1 Introduction 1258.1.1 Scalability Trilemma 1268.1.2 Nakamoto-Based - Monoxide - Chu-ko-nu Mining 1288.1.3 Elastico 1288.1.4 OmniLedger 1298.1.5 Rapid Chain 1308.1.6 Learnings 1318.1.7 General Improvements 1328.1.7.1 Reducing Transaction Latency 1338.1.7.2 Inter-Communication Protocol 1338.1.7.3 Shards Ledger Pruning 1348.1.7.4 Decentralized Bootstrapping 1348.1.7.5 Securing the Epoch Reconfiguration 1348.1.7.6 Sharded Smart Contract 1358.1.7.7 Replay Attacks and Defenses Against Cross-Shard Protocols 1358.2 Off-Chain Solution: Layer 2 Solutions 1368.2.1 State Channels 1368.2.2 Side Chains of the Plasma 1388.2.3 Problems with Data Accessibility 1398.3 Rollups 139Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page ix[1][1] [1][1]Contents ix8.3.1 Rollups Based on Zero Knowledge 1408.3.2 Proofs of Zero-Knowledge 1408.3.3 Protocol Schnorr 1428.3.4 Protocol Pedersen 1438.3.5 zk-SNARKs 1448.4 Summary 144References 145Part III Applying Blockchain with Real-Time Technologies 1479 Blockchain Technology for Supply Management 1499.1 Introduction 1499.1.1 System Design 1539.1.2 System Architecture 1539.1.3 Entities of the System 1549.1.3.1 Users 1549.1.4 Smart Contract Control 1579.1.5 Blockchain Network 1579.1.5.1 Processing Nodes 1579.1.5.2 System Application Layer 1589.1.5.3 Storage Infrastructure 1589.1.6 System Decryption 1589.1.7 Blocks 1599.1.7.1 Block Design 1609.2 System Flow 1639.2.1 System Advantages 1639.2.2 Conclusion 164References 16510 Satellite Communication 16710.1 Introduction 16710.1.1 Low-Orbit Constellation Communication Networks 16910.1.2 Interstellar Link Length 17110.1.3 Model of Satellite Motion 17110.1.4 Edge Computing Technologies 17210.2 Analysis of Edge Computing Requirements of Low-Orbit ConstellationCommunication Networks 17510.2.1 Design of Edge Computing Architecture for Low-Orbit Constellation CommunicationNetworks 17510.2.2 Satellite 17610.2.3 System Entities 18010.2.4 System Process Flow 18010.2.5 Security Properties 18310.3 Summary 183References 183Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page x[1][1] [1][1]x Contents11 Foundation of Information-Centric Communication 18511.1 Introduction 18511.2 Information-Centric Communication 18511.3 Name-Based Routing of Content 18711.4 Benefits of Using ICN 18711.5 Cost-Efficient and Scalable Distribution of Content Design Principles 18911.6 ICN Design Challenges 19011.6.1 Content Naming 19011.6.2 Caching of Content 19111.6.3 Data Integrity 19211.6.4 Resolution System's Scalability and Name-Based Routing 192References 19312 Security Overall in Information-Centric Networks 19512.1 Introduction 19512.2 Content-Centric Network (CCN) Architecture 19512.3 Naming System Design 19712.4 Secure Naming Scheme for Information-Centric Networks 19812.5 Data Transmission - Content Delivery 19812.6 Traffic Load in Network Caching 19912.6.1 Store Unique Naming of Content in Caches 20012.6.2 Storage Limitation in Caching Space Devices 20112.7 Content's Freshness Detection 20112.8 ICN Security 20112.9 Attacks in ICN Architectures 20212.10 ICN Attributes to Ensure Security Threats 20412.11 Traffic Analysis and Prediction 20412.12 Some Key Problem Statements 20512.13 Blockchain-Based ICN Scheme Improvement 20612.13.1 Protection Against DDos 20612.14 A Secured Information-Centric Network Based on Blockchain 20612.14.1 Blockchain-Based ICN Structure 20712.14.1.1 Data Integrity 20712.15 Attribute-Based Encryption Scheme for the Information-Centric Network 20812.15.1 Applying Ciphertext-Policy ABE (CP-ABE) Scheme in ICN 20912.15.2 System Design of CP-ABE Scheme in ICN 210References 21213 Subscriber Data Management System Based on Blockchain 21513.1 Introduction 21513.1.1 Motivation 21613.1.2 Problem Statement 21613.1.3 Contributions 21613.2 Literature Review 21713.3 System Design Description 21713.3.1 Assumptions 217Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page xi[1][1] [1][1]Contents xi13.3.2 Ciphertext-Policy Attribute-Based Encryption (CP-ABE) 21813.3.3 CP-ABE Construction 21813.3.4 System Components 21913.3.4.1 Data Subscribers (DSs) 21913.3.4.2 Data Providers (DPs) 22013.3.4.3 Key Generation and Distribution Center (KGDC) 22013.3.4.4 IPFS Distributed Storage 22013.3.4.5 Blockchain Platform 22013.3.5 Process Description 22213.3.5.1 Subscriber Registration 22413.3.5.2 Subscriber Data Storage 22413.3.5.3 Subscriber Data Request 22413.3.6 Benefits of Proposed Design 22513.3.7 Security Requirements 22613.4 Summary 227References 22714 A Secure Data-Sharing Blockchain-Based Crowdfunding System 22914.1 Introduction 22914.2 Literature Review 23114.2.1 Present-Day Centralized Crowdfunding 23114.2.2 Crowdfunding Models 23314.2.3 Problems of Traditional Crowdfunding 23414.2.4 Blockchain-Based Crowdfunding 23414.2.5 Advantages of Blockchain-Based Crowdfunding 23514.3 Proposed System 23614.3.1 System Model 23614.3.1.1 Key Components 23714.3.2 System Framework Overview 23814.3.2.1 Application Layer 23914.3.2.2 Blockchain Layer 23914.3.2.3 Data Storage Layer 23914.3.3 System Assumptions and Threat Model 24014.3.4 Process Description 24014.3.5 Smart Contract Interactions 24114.3.5.1 User Registration Contract (URC) 24114.3.5.2 User Verification Contract (UVC) 24114.3.5.3 Project Data Access Contract (PDAC) 24114.3.6 Concrete Implementation 24114.3.6.1 User Register 24214.3.6.2 Data Encrypt 24214.3.6.3 Data Search 24214.3.6.4 Fine-Grained Access Authorization 24214.3.6.5 Data Decrypt 24314.3.6.6 Transaction Confirmation 24314.3.7 Security Requirements 24314.3.7.1 Fine-Grained Access Control 24314.3.7.2 Key Counterfeiting 24314.3.7.3 Data Integrity 24414.4 Summary 244References 244Index 247

Qi Xia received her PhD in Computer Science from the University of Electronic Science and Technology of China in 2010.Jianbin Gao received his PhD in Computer Science from the University of Electronic Science and Technology of China (UESTC) in 2012.Isaac Amankona Obiri received his Master's and PhD in Computer Science and Technology from the University of Electronic Science and Technology of China.Kwame Omono Asamoah received his Master's and PhD in Computer Science and Technology from the University of Electronic Science and Technology of China.Daniel Adu Worae currently pursuing his Master's degree in Computer Science and Technology at the University of Electronic Science and Technology of China.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia