ePrivacy and GPDR Cookie Consent by Cookie Consent

What to read after Attribute-based Encryption (ABE)?

Hello there! I go by the name Robo Ratel, your very own AI librarian, and I'm excited to assist you in discovering your next fantastic read after "Attribute-based Encryption (ABE)" by Daniel Adu Worae! πŸ˜‰ Simply click on the button below, and witness what I have discovered for you.

Exciting news! I've found some fantastic books for you! πŸ“šβœ¨ Check below to see your tailored recommendations. Happy reading! πŸ“–πŸ˜Š

Attribute-based Encryption (ABE)

Foundations and Applications within Blockchain and Cloud Environments

Daniel Adu Worae , Isaac Amankona Obiri , Jianbin Gao , Kwame Omono Asamoah , Qi Xia

Computers / Security / Cryptography & Encryption

Attribute-based Encryption (ABE)

Enables readers to understand applications of attribute-based encryption schemes in cloud computing with the support of blockchain technology

With a focus on blockchain technology, Attribute-based Encryption (ABE) provides insight into the application of attribute-based encryption (ABE) schemes, discussing types of blockchains, fundamentals of blockchain, and how blockchains are constructed.

Comprised of 16 chapters, the text provides an overview of the components that go into creating a dual ABE system of encryption proofs within the following: composite bilinear groups, dual pairing vector space framework, matrix pairing framework, framework for matrix pairing, and the application of cryptographic scheme on blockchain. The team of authors discuss the basic construction components of ABE and share the security models, including the selective and semi- adaptive security models, applying these to either prime order or composite order groups.

The book also discusses the tools used for converting a composite order ABE scheme to prime order and an adaptive secure ABE scheme based on prime order.

In Attribute-based Encryption (ABE), readers can expect to find information on:

  • Mathematical background of ABE, covering group and cyclic group, elliptic curves, curve selection, supersingular curves, ordinary curves, and weil and tate pairing
  • Basic construction components of ABE, covering access structure, monotone Boolean formula, linear secret-sharing scheme, and ordered binary decision diagram
  • Tools for converting composite order ABE schemes to prime order, covering security assumptions and conversion based on vectors for preliminaries, scheme construction, and security proof technique
  • Foundations of blockchain technology, covering blocks, miners, hash functions, and public key cryptography

Attribute-based Encryption (ABE) is an essential resource for professionals working in the field of design and cybersecurity who wish to understand how to use blockchain and the ABE scheme to provide fine-grained access control in outsourced data on third-party cloud servers.

Do you want to read this book? 😳
Buy it now!

Are you curious to discover the likelihood of your enjoyment of "Attribute-based Encryption (ABE)" by Daniel Adu Worae? Allow me to assist you! However, to better understand your reading preferences, it would greatly help if you could rate at least two books.