| Introduction to Certificateless Cryptography Subjects: Computer Science; Mathematics & Statistics; Software Engineering & Systems Development; Legal Ethical & Social Aspects of IT; Advanced Mathematics; Applied Mathematics; IT Security; Mathematical Logic; Computer Mathematics; As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Hu Xiong, Zhen Qin, Athanasios V. Vasilakos |