Abstract
In this chapter, we briefly revisit important knowledge including the cryptographic notions, algorithms, and security models of digital signatures, public-key encryption, and identity-based encryption. For convenience in the presentation, we split the traditional key generation algorithm of digital signatures and public-key encryption into the system parameter generation algorithm and the key generation algorithm, where the system parameters can be shared by all users. Each cryptosystem in this book is composed of four algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Guo, F., Susilo, W., Mu, Y. (2018). Notions, Definitions, and Models. In: Introduction to Security Reduction. Springer, Cham. https://doi.org/10.1007/978-3-319-93049-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-93049-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93048-0
Online ISBN: 978-3-319-93049-7
eBook Packages: Computer ScienceComputer Science (R0)